<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: mac binding and 802.1x in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4489501#M570544</link>
    <description>&lt;P&gt;MAC randomization could throw a spanner in the works if the user ends up fiddling with the WLAN settings on the device (i.e. turn private MAC on/off) - in the case of Cisco BYOD onboarding the MAC address that was used at the time of onboarding is baked into the client certificate and you may wish to use that as an extra Authorization step in ISE. That is not MAB, and now I understand your question about "binding" the MAC to the supplicant authentication, by means of embedding it in the client certificate.&amp;nbsp; A better mechanism would be some kind of device serial or UDID which doesn't change and is unrelated to MAC address. This is already happening with MDM vendors (Microsoft Intune) and ISE 3.1 - hopefully other MDM vendors will do the same.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Oct 2021 21:46:34 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2021-10-20T21:46:34Z</dc:date>
    <item>
      <title>mac binding and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4482784#M570280</link>
      <description>&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Hi Experts,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Is configuring mac binding and 802.1x together a good idea?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Has anyone done this kind of deployment earlier? Any side effects if these both are working together on the switch?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Also, can this be configured for Wireless network?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Also what are the use cases where this deployment would make sense?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 18:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4482784#M570280</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-10-08T18:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: mac binding and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4487582#M570453</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I used to believe that MAB and 802.1X were not possible for the same sessions (mutually exclusive). But you can indeed (at least I have done this with wireless SSID) combine the two. I can't recall which auth method the Cisco WLC performs first. I seem to recall it was 802.1X, followed by MAB. I have not had that use case but there was a question on the Community a long time ago where someone asked the question and I tested it.&lt;/P&gt;
&lt;P&gt;Perhaps it could be considered an extra level of access control - I would not use "security" because MAB should never be considered secure. More like, "level of difficulty". Due to MAC randmomisation, I also don't believe that we should tie too much logic to MAC addresses. The MDM world has already moved on to UDID instead of MAC address because of randomisation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 20:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4487582#M570453</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-10-17T20:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: mac binding and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4489154#M570528</link>
      <description>&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Yes, this makes sense why it should not be solely used for restricting access to the users.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="trebuchet ms,geneva"&gt;But then in case of BYOD flow, if I am able to just require only one mac address per user, then in that case does the user device have a fixed mac address to be used for network access?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="trebuchet ms,geneva"&gt;Or atleast the turn off mac randomization on their devices?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 12:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4489154#M570528</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-10-20T12:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: mac binding and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4489501#M570544</link>
      <description>&lt;P&gt;MAC randomization could throw a spanner in the works if the user ends up fiddling with the WLAN settings on the device (i.e. turn private MAC on/off) - in the case of Cisco BYOD onboarding the MAC address that was used at the time of onboarding is baked into the client certificate and you may wish to use that as an extra Authorization step in ISE. That is not MAB, and now I understand your question about "binding" the MAC to the supplicant authentication, by means of embedding it in the client certificate.&amp;nbsp; A better mechanism would be some kind of device serial or UDID which doesn't change and is unrelated to MAC address. This is already happening with MDM vendors (Microsoft Intune) and ISE 3.1 - hopefully other MDM vendors will do the same.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 21:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-binding-and-802-1x/m-p/4489501#M570544</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-10-20T21:46:34Z</dc:date>
    </item>
  </channel>
</rss>

