<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC computer as a AD domain machine in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539136#M528681</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It ended up being that the profile I created had less points than another profile.  I changed the point assignment in the profile condition that I created. I thought I would see the AD-Host-Exists in the authentication because I was seeing the 5 other AD attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Nov 2017 03:01:49 GMT</pubDate>
    <dc:creator>Alex Pfeil</dc:creator>
    <dc:date>2017-11-29T03:01:49Z</dc:date>
    <item>
      <title>MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539128#M528671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;Hi Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;Customer would like to know a MAC computer is an AD domain machine or not. And define different policy based on it. How can we do it in ISE? We found MAC did not send host authentication in ISE live log. And no register table to check it’s domain computer or not.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;Your help will be very appreciated!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;DL&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jul 2017 14:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539128#M528671</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2017-07-05T14:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539129#M528674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use AD probe's 'AD-Hosts-Exists' attribute to automatically create an endpoint group. Once created you can use it in your AuthZ policy to provide different AuthZ profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jul 2017 14:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539129#M528674</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2017-07-05T14:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539130#M528675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The AD Host Exists flag in checking to see if the reverse lookup for the IP learned is an object in AD.&amp;nbsp; That is a decent indicator that the device is probably a domain joined object.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can definitely get Macs that are joined to the domain to present domain computer credentials during PEAP authentication.&amp;nbsp; If they are using JAMF/Casper to manage their Macs this is pretty straight forward and documented here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.jamf.com/jamf-nation/discussions/8721/802-1x-machine-based-authentication" title="https://www.jamf.com/jamf-nation/discussions/8721/802-1x-machine-based-authentication"&gt;https://www.jamf.com/jamf-nation/discussions/8721/802-1x-machine-based-authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they aren't managing the Macs with JAMF they can use that article as a guide to manually configuring the Macs to do this.&amp;nbsp; It isn't easy but doable without JAMF.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jul 2017 04:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539130#M528675</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-07-06T04:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539131#M528676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have any docs to show how to do it? I mean AD-probe and automatically add endpoint into a group, does it need API to do it? many thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jul 2017 15:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539131#M528676</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2017-07-06T15:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539132#M528677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use the JAMF link I provided as a guide.  There are other links out there if you Google PEAP Computer Auth OSX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jul 2017 15:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539132#M528677</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-07-06T15:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539133#M528678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you, let me try it first.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jul 2017 07:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539133#M528678</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2017-07-07T07:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539134#M528679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was looking at the live Radius log, and I do not see the AD probe returning AD-Host-Exists.&amp;nbsp; I see it returning all of the other probes. Does it have to be a functional 2012 domain, or is there something else I could have missed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2017 18:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539134#M528679</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2017-11-28T18:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539135#M528680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is ISE learning the hostname of the Mac from DHCP or FQDN from DNS profiler (if you have it enabled… you should0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2017 02:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539135#M528680</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-11-29T02:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: MAC computer as a AD domain machine</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539136#M528681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It ended up being that the profile I created had less points than another profile.  I changed the point assignment in the profile condition that I created. I thought I would see the AD-Host-Exists in the authentication because I was seeing the 5 other AD attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2017 03:01:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-computer-as-a-ad-domain-machine/m-p/3539136#M528681</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2017-11-29T03:01:49Z</dc:date>
    </item>
  </channel>
</rss>

