<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Preauthorizing Apple Computers at Login Screen in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864696#M472639</link>
    <description>Isn't there a pre-auth ACL to work for all computers?&lt;BR /&gt;What about machine certs?&lt;BR /&gt;</description>
    <pubDate>Wed, 29 May 2019 19:28:54 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2019-05-29T19:28:54Z</dc:date>
    <item>
      <title>Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3863410#M472636</link>
      <description>&lt;P&gt;When a computer is sitting at the login screen, user authentication will not work and the machine will be kicked off the network without having a failback for machine pre-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a policy that has a condition for "Domain Computers" and gives them access to the corporate VN as well as a dACL for limited access to DNS, DHCP and AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to work great for Windows machines, but our major problem right now is with Apple Mac computers.&lt;/P&gt;&lt;P&gt;Even though they are bound to AD, the Mac computers do not advertise themselves and being members of “Domain Computers” so this machine authentication policy does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have a recommendation for setting up a similar machine authentication policy for Mac computers so they do not get kicked off the network when sitting at the login window?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Possible solutions that I would like to avoid:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Giving pre-auth to all Apple Computers based on OUI MAC&lt;/LI&gt;&lt;LI&gt;Using MDM to set Login Window Mode (we have tried this in a limited capacity and MDM is unreliable and complex to set up)&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 27 May 2019 14:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3863410#M472636</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-05-27T14:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864696#M472639</link>
      <description>Isn't there a pre-auth ACL to work for all computers?&lt;BR /&gt;What about machine certs?&lt;BR /&gt;</description>
      <pubDate>Wed, 29 May 2019 19:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864696#M472639</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-29T19:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864700#M472642</link>
      <description>Like &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt; mentioned machine certs and certain conditions could do the trick. Why do you want to avoid this:&lt;BR /&gt;Giving pre-auth to all Apple Computers based on OUI MAC&lt;BR /&gt;&lt;BR /&gt;If you have profiling in use technically you could utilize the AD-Probe and setup a scenario like this:&lt;BR /&gt;Parent Policy (Policy1) leverages and uses AD-Host-Exists EQUALS true. Then create a child policy(Policy-1-Child) that matches based on OUI MAC or some other attribute you can narrow down to your apple computers. Then use the profiled endpoint group in your condition to meet your requirement. Then you would know that any host profiled as Policy-1-Child (or whatever you name it) is a member of AD and an apple comp.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 May 2019 19:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864700#M472642</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-29T19:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864736#M472643</link>
      <description>&lt;P&gt;Hey Mike&lt;/P&gt;&lt;P&gt;I appreciate this response. Its the first time someone has presented this as a possible solution.&lt;/P&gt;&lt;P&gt;I have not used AD-Probe before for profiling. Do you know the syntax? Is it AD-Host-Exists EQUALS true?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked my deployment and see that AD probe is enabled. But when I look an an endpoint detail, I dont see AD-Host-Exists as a attribute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="attributes.png" style="width: 186px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/37673iF9D7C11A9662D69E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="attributes.png" alt="attributes.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 21:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3864736#M472643</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-05-29T21:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3865123#M472644</link>
      <description>Ensure that you are getting the host-name option from DHCP options. Check your sensor and ensure that option name host-name is configured.</description>
      <pubDate>Thu, 30 May 2019 12:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3865123#M472644</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-30T12:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Preauthorizing Apple Computers at Login Screen</title>
      <link>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3865136#M472693</link>
      <description>&lt;P&gt;I am getting host-name in the attributes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried profiling based on AD-host-exists equals true and I don't see the devices getting profiled correctly in live logs&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2019 13:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/preauthorizing-apple-computers-at-login-screen/m-p/3865136#M472693</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-05-30T13:13:30Z</dc:date>
    </item>
  </channel>
</rss>

