<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x mac based authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382468#M433354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the ACS will do Mac authentication, I am confused as to why this would not solve the rouge AP problem.  If any device was plugged into the switch that was not configured for access in the ACS server, could you not force it into some sort of guest vlan?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Oct 2004 00:47:43 GMT</pubDate>
    <dc:creator>Billy Dodson</dc:creator>
    <dc:date>2004-10-21T00:47:43Z</dc:date>
    <item>
      <title>802.1x mac based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382466#M433352</link>
      <description>&lt;P&gt;We have Cisco ACS 3.3  is there a way to do authentication based on mac address, instead of username and password?  We are looking to stop things such as user purchased access points and what not.  Any info would be great.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 20:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382466#M433352</guid>
      <dc:creator>Billy Dodson</dc:creator>
      <dc:date>2019-03-10T20:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x mac based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382467#M433353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACS will do Mac authentication, but it will not solve the rouge AP problem. To accomplish MAC authentication it is neccessary to configure the ACS and the AP.  Any attemps made to connect through an AP that has been configured for MAC authentication will not be allowed unless they hav an account on ACS.  As for controlling the rouges, I can only suggest using port security on your swtiches.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Oct 2004 19:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382467#M433353</guid>
      <dc:creator>scottosan</dc:creator>
      <dc:date>2004-10-20T19:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x mac based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382468#M433354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the ACS will do Mac authentication, I am confused as to why this would not solve the rouge AP problem.  If any device was plugged into the switch that was not configured for access in the ACS server, could you not force it into some sort of guest vlan?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2004 00:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382468#M433354</guid>
      <dc:creator>Billy Dodson</dc:creator>
      <dc:date>2004-10-21T00:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x mac based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382469#M433355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you are right, I misunderstood you.  I was under the impression that you were talking about doing MAC based authentication on your AP's, not the switches.  That is why I made mention to port security.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2 options would be standard port security or 802.1x port security if you switches support this.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to use the 802.1X port security, your switch would need to support it and the clients connecting to the switch would require a supplicant (EAP-TLS, EAP-TTLS, etc) in order for them to work, not by MAC address alone.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure standard port security on the switch which will accomplish your intentions and not even need to use the ACS server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;standard port base security by MAC:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_guide_chapter09186a008007d3ce.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_guide_chapter09186a008007d3ce.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;802.1x port based security:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00801a6c72.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00801a6c72.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2004 13:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-based-authentication/m-p/382469#M433355</guid>
      <dc:creator>scottosan</dc:creator>
      <dc:date>2004-10-21T13:07:09Z</dc:date>
    </item>
  </channel>
</rss>

