<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC Pass-Through with EAP TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4581516#M573735</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/202309"&gt;@Anthony O'Reilly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You asked: "&lt;SPAN&gt;When we are using EAP-TLS, is there any requirement for enabling mac pass-through? Do we still need this?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The MAC Passthrough is primarily there to stop the docking station from interfering with its own MAC address during any kind of authentication where the MAC address of the endpoint is important (and used in Authorization). If you're doing good old EAP-TLS then I don't believe the MAC address of the endpoint&amp;nbsp;is of any concern. You might find though that if MAC Passthrough is not enabled then ISE might collect more endpoints than required, since it will also collect the MAC address of the docking station. Either way, the sooner we get away from using MAC addresses for any kind of authentication, the better. A unique device identifier would be much more useful, but it requires the endpoints to supply that data to the Authenticating Server (ISE).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Mar 2022 22:51:36 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-03-29T22:51:36Z</dc:date>
    <item>
      <title>MAC Pass-Through with EAP TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4579926#M573721</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a two-node ISE deployment. Version 2.7 Patch 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Originally we deployed dot1x using MAR. We were also using ISE for Guest, BYOD and Corporate Access. We had mixed results using MAR. We also had to enable mac pass-through on Lenovo laptops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Due to the issues with MAR, we deployed EAP-TLS for all dot1x supplicants. The customer is now deploying new Lenovo laptops.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We am having connectivity issues when going via Docking station to direct Ethernet connectivity and back to the Docking station.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we are using EAP-TLS, is there any requirement for enabling mac pass-through? Do we still need this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2022 20:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4579926#M573721</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-28T20:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Pass-Through with EAP TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4581516#M573735</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/202309"&gt;@Anthony O'Reilly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You asked: "&lt;SPAN&gt;When we are using EAP-TLS, is there any requirement for enabling mac pass-through? Do we still need this?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The MAC Passthrough is primarily there to stop the docking station from interfering with its own MAC address during any kind of authentication where the MAC address of the endpoint is important (and used in Authorization). If you're doing good old EAP-TLS then I don't believe the MAC address of the endpoint&amp;nbsp;is of any concern. You might find though that if MAC Passthrough is not enabled then ISE might collect more endpoints than required, since it will also collect the MAC address of the docking station. Either way, the sooner we get away from using MAC addresses for any kind of authentication, the better. A unique device identifier would be much more useful, but it requires the endpoints to supply that data to the Authenticating Server (ISE).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2022 22:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4581516#M573735</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-03-29T22:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Pass-Through with EAP TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4591042#M574112</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;Thanks Arne,&lt;/P&gt;&lt;P&gt;I've tested this over the last week and it is working ok. Thanks for your quick response.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 15:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-pass-through-with-eap-tls/m-p/4591042#M574112</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-04-12T15:35:12Z</dc:date>
    </item>
  </channel>
</rss>

