<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I think i have got it figured in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057278#M24063</link>
    <description>&lt;P&gt;I think i have got it figured out. I will try and use end device filters to filter by mac address after certificate authentication. I can apply the end device filters in the authorization policy and that should do it.&lt;/P&gt;</description>
    <pubDate>Sun, 12 Feb 2017 01:20:01 GMT</pubDate>
    <dc:creator>darknair</dc:creator>
    <dc:date>2017-02-12T01:20:01Z</dc:date>
    <item>
      <title>802.1x certificate authentication &amp; MAC authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057276#M24061</link>
      <description>&lt;P&gt;I have ACS 5.8 and I am trying to use x509 authentication but use the devices mac addresses to identify which authorization policy the devices would match. I am not having any issues getting them to authenticate with the certificates but I can not figure out how to reasonably get them to uniquely match an authorization policy.&lt;/P&gt;
&lt;P&gt;There are approx 3K devices and they are all separated throughout the network and require different vlan assignments. I would like to use their MAC addresses to uniquely identify each device for its authorization policy but I am uncertain how to do that with X509 authentication. I want all of my authentication and authorization to be handled by ACS with no external identity stores. If I could use the internal host identity store for authorization policy selection and x509 certificates for authentication then that would be ideal.&lt;/P&gt;
&lt;P&gt;Is there a way to have an internal database of MACs or other uniquely identified information I could reference in the authorization policy? I have used MAB which references an identity group that is used in the authorization policy for uniquely assigning each device that connects.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Perfect scenario: A device starts 802.1x authentication and presents its certificate to ACS then ACS uses the devices MAC address to match it to an authorization policy to be assigned a authorization profile.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for any help!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057276#M24061</guid>
      <dc:creator>darknair</dc:creator>
      <dc:date>2019-03-26T00:35:39Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057277#M24062</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm sorry but not understood what you want to achieve.&lt;/P&gt;
&lt;P&gt;You have 3k devices and would like to apply 1 rule out mac address?&lt;/P&gt;
&lt;P&gt;Anyhow, ACS have internal identity store for hosts and users.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're authenticating your devices through certificates. Who is your CA? Your AD? If yes, why not using group membership of hosts to apply specific authorization rules?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What type of certificates are you using? User or machine?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Sat, 11 Feb 2017 21:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057277#M24062</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-02-11T21:51:09Z</dc:date>
    </item>
    <item>
      <title>I think i have got it figured</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057278#M24063</link>
      <description>&lt;P&gt;I think i have got it figured out. I will try and use end device filters to filter by mac address after certificate authentication. I can apply the end device filters in the authorization policy and that should do it.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2017 01:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057278#M24063</guid>
      <dc:creator>darknair</dc:creator>
      <dc:date>2017-02-12T01:20:01Z</dc:date>
    </item>
    <item>
      <title>Ok. Let me know if you need</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057279#M24064</link>
      <description>&lt;P&gt;Ok. Let me know if you need further help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2017 02:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-certificate-authentication-mac-authorization/m-p/3057279#M24064</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-02-12T02:38:49Z</dc:date>
    </item>
  </channel>
</rss>

