<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE guest access controlled by MAC address in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361628#M549442</link>
    <description>Yes you can do that on ise.&lt;BR /&gt;You need to create at the top a rule saying your mac group containing all your internal hosts + your wlan id = deny.&lt;BR /&gt;Instead of wlan id you can also use normalisedradius contains ssidname&lt;BR /&gt;</description>
    <pubDate>Fri, 06 Apr 2018 04:02:47 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-04-06T04:02:47Z</dc:date>
    <item>
      <title>ISE guest access controlled by MAC address</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3358795#M549432</link>
      <description>&lt;P&gt;Hi Expert,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a problem, we have wifi guest and &lt;SPAN&gt;wifi&amp;nbsp;&lt;/SPAN&gt;internal network. but i found that many of our internal usage use the guest wifi rather than internal wifi since the internal wifi block some web page.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On this moment, i have our internal user's device Mac address only. Can I control on guest wifi that if the mac address match the list (internal's device list), then this device cannot access the guest network? Can ISE do that?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3358795#M549432</guid>
      <dc:creator>osw200051</dc:creator>
      <dc:date>2020-02-21T18:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE guest access controlled by MAC address</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3358798#M549436</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a group containing all your internal hosts mac&amp;nbsp;addresses?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, you can duplicate the guest rule internal hosts are hitting above it&amp;nbsp;and add your internal mac addresses group as condition and switch the rule as denied instead of permit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 03:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3358798#M549436</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-04-02T03:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE guest access controlled by MAC address</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361012#M549438</link>
      <description>Hi Francesco,&lt;BR /&gt;&lt;BR /&gt;Very happy for see your reply that can help me.&lt;BR /&gt;Your suggestion can be done on ISE?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 05 Apr 2018 08:58:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361012#M549438</guid>
      <dc:creator>osw200051</dc:creator>
      <dc:date>2018-04-05T08:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE guest access controlled by MAC address</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361628#M549442</link>
      <description>Yes you can do that on ise.&lt;BR /&gt;You need to create at the top a rule saying your mac group containing all your internal hosts + your wlan id = deny.&lt;BR /&gt;Instead of wlan id you can also use normalisedradius contains ssidname&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Apr 2018 04:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361628#M549442</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-04-06T04:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE guest access controlled by MAC address</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361834#M549443</link>
      <description>&lt;P&gt;What version are you running?.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen endpoint group value being modified after successful or failed authentication so even though you have the internal MAC addresses in an specific endpoint group, that value could change to Unknown, Blank or Profiled so they would eventually be authenticated using again the Guest SSID because you would not hit the new Authz policy for internal users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am assuming you have a guest network with only an AUP page or similar, no authentication. I would suggest you to evaluate modifying that to something like webauth so you can actually control who get access to that SSID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 14:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-controlled-by-mac-address/m-p/3361834#M549443</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-04-06T14:17:48Z</dc:date>
    </item>
  </channel>
</rss>

