<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC address whitelist in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734739#M488968</link>
    <description>&lt;P&gt;Right now I just need a Authz rule for&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If mac-address in Identity group ABC then allow vlan 20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Oct 2018 10:10:31 GMT</pubDate>
    <dc:creator>Capricorn</dc:creator>
    <dc:date>2018-10-29T10:10:31Z</dc:date>
    <item>
      <title>MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734697#M488964</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco ISE version 2.4.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have created a Endpoint identity group name whitelist and then added the few MAC address in it. The plan is to use this as whitelist of few devices we have. I created policy authorization policy for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Radius:Calling-Station-ID MAC_IN Whitelist.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This works but when I tried for another MAC with same way then it didnt work and after weekend the computer that was working is not getting the policy and its going to default deny policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It was kind of suprising but then I looks like I used a policy as below for MAC address and as that MAC address was authenticated with below policy then it worked for whitelist policy but once is cache is expired then its not working.&lt;/P&gt;
&lt;P&gt;Radius: calling-Station-ID EQUALS 5c-5f-67-c8-58-7f&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I looked into the documentation below and my understanding is that as the MAC was authenticated with above policy then it i worked for MAC_IN policy for some time and after expiration it didnt work.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_010010.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_010010.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I enabled&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Radius: calling-Station-ID EQUALS 5c-5f-67-c8-58-7f&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;and then disabled it and now below is working.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Radius:Calling-Station-ID MAC_IN Whitelist.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I only want that if MAC exist in Whitelist should be authorize.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for your suggestion and help in this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 08:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734697#M488964</guid>
      <dc:creator>Capricorn</dc:creator>
      <dc:date>2018-10-29T08:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734723#M488966</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;why dont you&amp;nbsp; create a profiling group and add the mac address, this will allow you to add multiple mac addresses whenever its needed&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 09:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734723#M488966</guid>
      <dc:creator>ma.alsaffar</dc:creator>
      <dc:date>2018-10-29T09:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734725#M488967</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue with that is let say if I profile for Huwai phones then anyone from outside with that model or vendor can join it as I have open SSID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now I have 10 devices so I can use MAC address as restriction. I know its not sure but thats the best thing I have in mind and quick solution as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 09:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734725#M488967</guid>
      <dc:creator>Capricorn</dc:creator>
      <dc:date>2018-10-29T09:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734739#M488968</link>
      <description>&lt;P&gt;Right now I just need a Authz rule for&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If mac-address in Identity group ABC then allow vlan 20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 10:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734739#M488968</guid>
      <dc:creator>Capricorn</dc:creator>
      <dc:date>2018-10-29T10:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734759#M488969</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can create a authz rule like&amp;nbsp;&lt;STRONG&gt;IdentityGroup Name EQUALS Endpoint Identity Groups:ABC&amp;nbsp;&lt;/STRONG&gt;then vlan 20.&lt;/P&gt;
&lt;P&gt;Then you can add the required mac address in&amp;nbsp;&lt;STRONG&gt;ABC&amp;nbsp;&lt;/STRONG&gt;identity group Administration&amp;gt; Identity management &amp;gt; Groups &amp;gt; Endpoint Identity group &amp;gt; ABC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Aravind&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 10:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734759#M488969</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2018-10-29T10:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734760#M488970</link>
      <description>&lt;P&gt;I tried this kind of option. The problem with this is that if this condition will become true and it will in any case then it will allow the access automatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;IdentityGroup Name EQUALS Endpoint Identity Groups:ABC&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;As I see the logic is that if there is matching ABC endpoint group exist then Authorize VLAN. It will not check the MAC address in side.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 10:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734760#M488970</guid>
      <dc:creator>Capricorn</dc:creator>
      <dc:date>2018-10-29T10:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734820#M488971</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&lt;STRONG&gt;As I see the logic is that if there is matching ABC endpoint group exist then Authorize VLAN. It will not check the MAC address in side.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;It does not work that way. The endpoint needs assigned to the endpoint group for the condition to hold true.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 12:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734820#M488971</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-29T12:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734829#M488972</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&amp;nbsp;...&amp;nbsp;and as that MAC address was authenticated with below policy then it worked for whitelist policy but once is cache is expired then its not working. ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You might run into either CSCvi73782 or&amp;nbsp;CSCvk55076.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 12:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734829#M488972</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-29T12:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734900#M488973</link>
      <description>&lt;P&gt;ok. I did test but not sure I did see Auth succesful and then thought it shouldnt be that way. Auth will be a success as the MAC exist as internal endpoint. I am pretty sure you guys have tested it :).&lt;/P&gt;
&lt;P&gt;Just need to double check this for AuthZ.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 13:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelist/m-p/3734900#M488973</guid>
      <dc:creator>Capricorn</dc:creator>
      <dc:date>2018-10-29T13:43:31Z</dc:date>
    </item>
  </channel>
</rss>

