<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenticating machines using {USER PASS MAC [IP]} or Active Directory in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336484#M546100</link>
    <description>&lt;P&gt;Thank you for confirming this it is possible to do it using radius.&lt;/P&gt;
&lt;P&gt;Now, I can go ahead with worrying if it is realizable.&lt;/P&gt;
&lt;P&gt;I'm so exited to test this solution.&lt;/P&gt;
&lt;P&gt;Kind regards.&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2018 09:15:33 GMT</pubDate>
    <dc:creator>a.m</dc:creator>
    <dc:date>2018-02-23T09:15:33Z</dc:date>
    <item>
      <title>Authenticating machines using {USER PASS MAC [IP]} or Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336280#M546098</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I'm a beginner, I'm working on Cisco switch 2960s, and I need some advice about authentication methods to access the LAN (and not the switch).&lt;BR /&gt;&lt;BR /&gt;I have a set of vlans that can be divided into two subset according to the authentication methods.&lt;BR /&gt;&lt;BR /&gt;In the First vlan subset, I want to authorize only the AD domain members to access the LAN. My objective isn't to get the user-name and the password from the user, but to be sure that the machines belong to the domain. &lt;BR /&gt;I want to prevent users from connecting their own machines to the LAN, or to fool the switch using cloned MAC addresses of existing machines. We are against BYOD here X) &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;In the second vlan subset, I want to authenticate machines that are not members of AD domain, and to be sure that the users won't able to connect new machines.&lt;BR /&gt;I thought about combining&amp;nbsp; the following elements:&lt;BR /&gt;1-Username&lt;BR /&gt;2-Password&lt;BR /&gt;3-MAC address&lt;BR /&gt;4-Ip address ( If possible)&lt;BR /&gt;&lt;BR /&gt;With this combination, I can be sure that the user will have only one machines connected, but the user will be able to replace the machine without my authorization.&lt;BR /&gt;&lt;BR /&gt;Is that realizable with 2960s switches ? If not what can I do to get closer to those objectives ?&lt;BR /&gt;&lt;BR /&gt;I have seen some articles about TACACS+ and RADIUS but I'm not very sure that if I can express this constraint using those protocols.&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336280#M546098</guid>
      <dc:creator>a.m</dc:creator>
      <dc:date>2020-02-21T18:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating machines using {USER PASS MAC [IP]} or Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336289#M546099</link>
      <description>&lt;P&gt;You'll be wanting to use wired 802.1x.&amp;nbsp; This authenticates using RADIUS.&amp;nbsp; You can use a basic RADIUS server like NPS (Network Policy Server) on your AD controller or Cisco ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is quite a bit of work involved to get all of this going.&amp;nbsp; I wouldn't take this on if you are a beginner at Cisco networking.&amp;nbsp; I would get someone in to help you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Otherwise, start reading this guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 22:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336289#M546099</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2018-02-22T22:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating machines using {USER PASS MAC [IP]} or Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336484#M546100</link>
      <description>&lt;P&gt;Thank you for confirming this it is possible to do it using radius.&lt;/P&gt;
&lt;P&gt;Now, I can go ahead with worrying if it is realizable.&lt;/P&gt;
&lt;P&gt;I'm so exited to test this solution.&lt;/P&gt;
&lt;P&gt;Kind regards.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 09:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-machines-using-user-pass-mac-ip-or-active/m-p/3336484#M546100</guid>
      <dc:creator>a.m</dc:creator>
      <dc:date>2018-02-23T09:15:33Z</dc:date>
    </item>
  </channel>
</rss>

