<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Solution Needed for Port Blocking in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872204#M218004</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the policy is about having the right mac address or right credentials, you are looking for 802.1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest reading the switch config guide talking about flexible authentication : 802.1x and mac-address bypass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By configuring MAB (mac address bypass) you will authenticate the devices mac addresses against a radius server. If not in the database, they are blocked all access to the network&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Dec 2011 12:58:00 GMT</pubDate>
    <dc:creator>Nicolas Darchis</dc:creator>
    <dc:date>2011-12-27T12:58:00Z</dc:date>
    <item>
      <title>Solution Needed for Port Blocking</title>
      <link>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872203#M218003</link>
      <description>&lt;P&gt;HI Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any solution or device are there to do&amp;nbsp; port blocking????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e I will configure one policy, if anyone violate that policy, that port automatically needs to block. Then administrator only needs to enable that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example i will configure MAC filtering. So i will maintain MAC address database if anyone connects then first the device need to check against to this database. If others connected, then the ports need to block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Janardhan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872203#M218003</guid>
      <dc:creator>Janardhan Meesala</dc:creator>
      <dc:date>2019-03-11T01:39:29Z</dc:date>
    </item>
    <item>
      <title>Solution Needed for Port Blocking</title>
      <link>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872204#M218004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the policy is about having the right mac address or right credentials, you are looking for 802.1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest reading the switch config guide talking about flexible authentication : 802.1x and mac-address bypass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By configuring MAB (mac address bypass) you will authenticate the devices mac addresses against a radius server. If not in the database, they are blocked all access to the network&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 12:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872204#M218004</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-12-27T12:58:00Z</dc:date>
    </item>
    <item>
      <title>Solution Needed for Port Blocking</title>
      <link>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872205#M218006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are talking about port-security with sticky mac-addresses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_37_se/command/reference/cli3.html#wp1948361"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_37_se/command/reference/cli3.html#wp1948361&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 14:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/solution-needed-for-port-blocking/m-p/1872205#M218006</guid>
      <dc:creator>Chris Illsley</dc:creator>
      <dc:date>2011-12-28T14:50:40Z</dc:date>
    </item>
  </channel>
</rss>

