<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: client cannot use MAC authentication with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530922#M510238</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you see you there are invalid radius attributes .In cisco switch we define attributes like:&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 6 support-multiple&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;radius-server attribute 31 mac format ietf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I never configured switch on WEB i always do on cli.ANd this is the commands for cisco switch i don't know is your switch support it .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 May 2018 06:59:30 GMT</pubDate>
    <dc:creator>ognyan.totev</dc:creator>
    <dc:date>2018-05-04T06:59:30Z</dc:date>
    <item>
      <title>client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530910#M510226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi , PC want to use MAC authentication with ISE but fail , i made the document for detail process and result (as attachment) , Could you help me to figure it out ? thx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2018 03:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530910#M510226</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-03T03:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530911#M510227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The trick here is on authentication rule for MAB change if user not found continue&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/116855_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2018 05:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530911#M510227</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-05-03T05:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530912#M510228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply , i adjust setting follow your suggestion :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="add one more auth policy.jpg" class="image-1 jive-image" src="/legacyfs/online/fusion/116858_add one more auth policy.jpg" style="height: 349px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;i add one more policy in authentication for "wired_MAB" but i got the same result , and i found the hits=0 , that is meaning this policy does not active when communicate period between switch &amp;amp; ISE , right ?&lt;/P&gt;&lt;P&gt;do i miss something to configure ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2018 06:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530912#M510228</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-03T06:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530913#M510229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please try attached NAD profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.      Import attached NAD profile into your ISE ( under  Administration &amp;gt; network resources &amp;gt; network Device Profiles)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.      Configure the network device using this NAD profile  in network devices page&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.      Change in authentication policy options “If user not found &amp;gt; Continue”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.      Do MAB authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2018 11:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530913#M510229</guid>
      <dc:creator>smashash</dc:creator>
      <dc:date>2018-05-03T11:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530914#M510230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the profile that Salomon uploaded looks correct.&amp;nbsp; In my quick analysis the Service-Type was originally not being matched. And also the hard coding of MAC addresses in profiles is a no no.&amp;nbsp; With the new device profile attached, you can use a Normalised Smart Condition "Wired_MAB" which will now include the new DLINK Device Profile.&amp;nbsp; Create a Policy Set Condition using Wired_MAB as your condition and that's that.&lt;/P&gt;&lt;P&gt;If the MAC address is in the Endpoint Identity Group then return access-accept (and remember that the Result Policy either has to be the same Vendor Type (i.e. DLINK) or vendor neutral (i.e. remove the vendor icon).&amp;nbsp; The default PermitAccess should do the job (unless of course you need other attributes returned).&lt;/P&gt;&lt;P&gt;As for the Continue if not found - that is a logic trick that we use all the time in Guest redirection, where it is IMPERATIVE that every request passes, because you HAVE to force the user to a portal even if MAC address is unknown.&lt;/P&gt;&lt;P&gt;In your case I don't know if that logic applies, since I think you only want to send an access-accept back to your switch if, and only if, the MAC address is in ISE.&amp;nbsp; Is that right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2018 22:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530914#M510230</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-05-03T22:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530915#M510231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply , but after i imported DlinkWired switch NAD profile , the testing result is still fail and got the same log :&lt;/P&gt;&lt;TABLE class="auth_detail_container" style="font-size: 15px; background: #fafafa; border: 1px solid #999999; margin-left: 10px; color: #333333; font-family: Arial, Helvetica, sans-serif;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;H3 class="title" style="margin-top: 20px; margin-bottom: 10px; font-family: tahoma; color: #f47a00; background: none;"&gt;verview&lt;/H3&gt;&lt;TABLE border="0" class="content_table" style="font-size: 12px; font-family: Arial; border: 1px solid #ffffff;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666; border-top: none;" width="31%"&gt;Event&lt;/TD&gt;&lt;TD style="padding: 5px; color: red; border-top: none;" width="69%"&gt;5400 Authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Username&lt;/TD&gt;&lt;TD class="endPointClass" style="padding: 5px; color: #666666;" width="69%"&gt;54E1AD9478BB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Endpoint Id&lt;/TD&gt;&lt;TD class="endPointClass" style="padding: 5px; color: #666666;" width="69%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Endpoint Profile&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Windows10-Workstation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Authentication Policy&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Default &amp;gt;&amp;gt; Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Authorization Policy&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Authorization Result&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="auth_detail_container" style="font-size: 15px; background: #fafafa; border: 1px solid #999999; margin-left: 10px; color: #333333; font-family: Arial, Helvetica, sans-serif;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;H3 class="title" style="margin-top: 20px; margin-bottom: 10px; font-family: tahoma; color: #f47a00; background: none;"&gt;Authentication Details&lt;/H3&gt;&lt;TABLE border="0" class="content_table" style="font-size: 12px; font-family: Arial; border: 1px solid #ffffff;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666; border-top: none;" width="31%"&gt;Source Timestamp&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666; border-top: none;" width="69%"&gt;2018-05-04 02:04:31.124&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Received Timestamp&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;2018-05-04 02:04:31.125&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Policy Server&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;ise&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Event&lt;/TD&gt;&lt;TD style="padding: 5px; color: red;" width="69%"&gt;5400 Authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Failure Reason&lt;/TD&gt;&lt;TD style="padding: 5px; color: red;" width="69%"&gt;22040 Wrong password or invalid shared secret&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Resolution&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Check the Device shared secret in Administration &amp;gt; Network Resources &amp;gt; Network Devices and user for credentials.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Root cause&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Wrong password or invalid shared secret&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Username&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;54E1AD9478BB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;User Type&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Host&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Endpoint Profile&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Windows10-Workstation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Authentication Identity Store&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Identity Group&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Profiled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Authentication Method&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;PAP_ASCII&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Authentication Protocol&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;PAP_ASCII&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Service Type&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Framed&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Network Device&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;DGS1210&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Device Type&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;All Device Types#Dlink1210&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Location&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;All Locations&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;NAS IPv4 Address&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;192.168.1.21&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;NAS Port Type&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Virtual&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Response Time&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;18 milliseconds&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="auth_detail_container" style="font-size: 15px; background: #fafafa; border: 1px solid #999999; margin-left: 10px; color: #333333; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;H3 class="title" style="margin-top: 20px; margin-bottom: 10px; font-family: tahoma; color: #f47a00; background: none;"&gt;Other Attributes&lt;/H3&gt;&lt;TABLE border="0" class="content_table" style="font-size: 12px; font-family: Arial; border: 1px solid #ffffff;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666; border-top: none;" width="33%"&gt;ConfigVersionId&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666; border-top: none;" width="67%"&gt;245&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Device Port&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;49154&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;DestinationPort&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;1812&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;RadiusPacketType&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;AccessRequest&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Protocol&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Radius&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;NAS-Port&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;NetworkDeviceProfileId&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;580baaf4-4e28-49ca-81fd-63ca390392e9&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;IsThirdPartyDeviceFlow&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;true&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;AcsSessionID&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;ise/314001139/451&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;SelectedAuthenticationIdentityStores&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;IdentityPolicyMatchedRule&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;CPMSessionID&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;c0a80113CHtDpU5IigKqw6bFOQrqHJ5ERXON1ldelSNxpGMZ9rg&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;ISEPolicySetName&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;IdentitySelectionMatchedRule&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;DTLSSupport&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Unknown&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;HostIdentityGroup&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Endpoint Identity Groups:Profiled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Model Name&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;DGS1210ME&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Software Version&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;7.01.B021&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Network Device Profile&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;DlinkWired_Switch&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Location&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Location#All Locations&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Device Type&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;Device Type#All Device Types#Dlink1210&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;IPSEC&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;IPSEC#Is IPSEC Device#No&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;RADIUS Username&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;54:E1:AD:94:78:BB&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;NAS-Identifier&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;D-LINK&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="33%"&gt;Device IP Address&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="67%"&gt;192.168.1.21&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="auth_detail_container" style="font-size: 15px; background: #fafafa; border: 1px solid #999999; margin-left: 10px; color: #333333; font-family: Arial, Helvetica, sans-serif;" width="1005"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;H3 class="title" style="margin-top: 20px; margin-bottom: 10px; font-family: tahoma; color: #f47a00; background: none;"&gt;Result&lt;/H3&gt;&lt;TABLE border="0" class="content_table" style="font-size: 12px; font-family: Arial; border: 1px solid #ffffff;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666; border-top: none;" width="31%"&gt;RadiusPacketType&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666; border-top: none;" width="69%"&gt;AccessReject&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;AuthenticationResult&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;Failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;UserName&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;54:E1:AD:94:78:BB&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have some questions want to confirm :&lt;/P&gt;&lt;P&gt;a. i add one more authentication entry like this :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="add wiredMAB entry in Auth.jpg" class="image-1 jive-image" src="/legacyfs/online/fusion/116875_add wiredMAB entry in Auth.jpg" style="height: 349px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the hits still display zero , do i need add this policy ?if yes , what is wrong with this setting ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. Where i can configure PC MAC can accept in ISE server ?&lt;/P&gt;&lt;P&gt;for example , if i testing this function between switch &amp;amp; ISE server ,&amp;nbsp; i should configure "54E1AD9478BB Auth-Type := Accept " in user file of freeRadius server , then it can work fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 02:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530915#M510231</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-04T02:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530916#M510232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Thanks for your reply , as your mentioned "&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;In your case I don't know if that logic applies, since I think you only want to send an access-accept back to your switch if, and only if, the MAC address is in ISE.&amp;nbsp; Is that right? " &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;yes , and do you know where i can configure this MAC can accept in ISE side ? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;thx&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 03:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530916#M510232</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-04T03:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530917#M510233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks to me that the shared secret configured on the network access device is not matching with the NAD configuration on ISE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 04:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530917#M510233</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-05-04T04:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530918#M510234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is how you load static MAC addresses into an Identity Group.&amp;nbsp; Click on each image because of the resolution is reduced in this forum view.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You add the MAC addresses via Context visibility&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Static01.png" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/116879_Static01.png" style="width: 620px; height: 250px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also verify that they are in the Endpoint identity Group that you have chosen.&amp;nbsp; Please don't use my example of Profiled/Axis-Device.&amp;nbsp; Choose something meaningful off the root Group, like, MAB-Printers or whatever.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Static02.png" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/116880_Static02.png" style="width: 620px; height: 267px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 05:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530918#M510234</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-05-04T05:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530919#M510235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason is right not same shared secret ,and i wonder in ise 2.2 we have a option to enable radius for third party vendors i dont know in ISE 2.4 there is same option &lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/116882_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 05:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530919#M510235</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-05-04T05:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530920#M510236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply , i am sure the secret value are the same between switch &amp;amp; ISE , it probably some other things going wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 06:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530920#M510236</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-04T06:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530921#M510237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply , my PC MAC existed in Endpoint list :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="mac in endpoint list.jpg" class="image-1 jive-image" src="/legacyfs/online/fusion/116883_mac in endpoint list.jpg" style="height: 349px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;and existed in identity group :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="mac in identity group.jpg" class="jive-image image-2" src="/legacyfs/online/fusion/116884_mac in identity group.jpg" style="height: 349px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but testing result is still fail ,&lt;/P&gt;&lt;P&gt;above settings are meaning this MAC already be accept in ISE !? or any other configurations i need to adjust ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 06:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530921#M510237</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-04T06:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530922#M510238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you see you there are invalid radius attributes .In cisco switch we define attributes like:&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 6 support-multiple&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;radius-server attribute 31 mac format ietf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I never configured switch on WEB i always do on cli.ANd this is the commands for cisco switch i don't know is your switch support it .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 06:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530922#M510238</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-05-04T06:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530923#M510239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The endpoint ID is empty so it seems the auth request does not have calling-station-id, which is likely why it not matching the Wired MAB condition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try a wired capture to confirm what attributes are sent in the auth requests and then modify the NAD profile and the network access policy set accordingly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2018 06:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530923#M510239</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-05T06:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530924#M510240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After reviewing your word doc, I am now thinking the user-password is not the same as the user-name. This RSA doc &lt;A href="https://community.rsa.com/docs/DOC-76568"&gt;000035182 - How to decrypt RADIUS traffic using... | RSA Link&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; might help decrypting it.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2018 17:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530924#M510240</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-05T17:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530925#M510241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px; font-style: normal; font-weight: 400; text-align: left; text-indent: 0px;"&gt;thanks for your reply .Yes, my original auth request does not have calling-station-id , and after i change another switch that has calling-station-id , it's work , so i have some questions like this :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px; font-style: normal; font-weight: 400; text-align: left; text-indent: 0px;"&gt;1. When i want to run MAC aurh with ISE , it's only support that Pkts include ""calling-station-id" !? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px; font-style: normal; font-weight: 400; text-align: left; text-indent: 0px;"&gt;2. Or it also support without "calling-station-id" ? if yes , what's configurations i should adjust ? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px; font-style: normal; font-weight: 400; text-align: left; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; to modify NAD profile in wired MAB detected? or in wired 802.1x detected? and what's content i need to configure ?　&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2018 01:49:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530925#M510241</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-07T01:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530926#M510242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE may authenticate without calling-station-id in the requests. However, ISE features, such as CWA or posture, would not work without calling-station-id. ISE session directory is keying off calling-station-ID in most cases.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2018 02:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530926#M510242</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-07T02:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530927#M510243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Following NAD Profile settings should allow you to match against wired MAB. However, it does not have wired 802.1X, since I am not sure what attributes gets sent from D-Link during 802.1X. Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:howon@cisco.com"&gt;howon@cisco.com&lt;/A&gt;&lt;SPAN&gt; and I can assist with creating the NAD profile that works with both MAB and 802.1X.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2018-05-07 at 10.19.53 AM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/116921_Screen Shot 2018-05-07 at 10.19.53 AM.png" style="height: 868px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2018 15:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530927#M510243</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-05-07T15:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530928#M510244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it can work after follow your setting!! Thanks u very much!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 08:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530928#M510244</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-11T08:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: client cannot use MAC authentication with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530929#M510245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry , after i double confirm , if i just enable PAP/ASCII in my profile (as attachment ) ,&lt;/P&gt;&lt;P&gt;then all clients can pass through 802.1x MAC auth even there is no this MAC exist ISE endpoint profile table , it is abnormally , what's configurations should i need to adjust ?&lt;IMG alt="only enable PAP and ASCII.jpg" class="image-1 jive-image" src="/legacyfs/online/fusion/117026_only enable PAP and ASCII.jpg" style="height: 349px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 10:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-cannot-use-mac-authentication-with-ise/m-p/3530929#M510245</guid>
      <dc:creator>sbmc014</dc:creator>
      <dc:date>2018-05-11T10:01:07Z</dc:date>
    </item>
  </channel>
</rss>

