<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE along with SCCM in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617825#M574960</link>
    <description>&lt;P&gt;Use SCCM to push certificates to your managed Windows machines.&amp;nbsp; Use those certificates to perform EAP-TLS authentication via 802.1X to ISE.&lt;/P&gt;</description>
    <pubDate>Wed, 25 May 2022 20:10:30 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-05-25T20:10:30Z</dc:date>
    <item>
      <title>Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617697#M574959</link>
      <description>&lt;P&gt;We have already Microsoft SCCM and we have Cisco ISE, our design now is built on MAB authentication, but we need now to move to DOT1X, the problem we see is that we use SCCM to deploy Windows images to the new machines so they will be just a bare metal without any system on them, so how can we do it without using MAB because MAB is less secure and it can be lead to MAC spoofing.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 16:36:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617697#M574959</guid>
      <dc:creator>Amr Moussa</dc:creator>
      <dc:date>2022-05-25T16:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617825#M574960</link>
      <description>&lt;P&gt;Use SCCM to push certificates to your managed Windows machines.&amp;nbsp; Use those certificates to perform EAP-TLS authentication via 802.1X to ISE.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 20:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617825#M574960</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-05-25T20:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617831#M574961</link>
      <description>&lt;P&gt;I am not taking about managed Windows machines, I am asking about the unmanaged machines that doesn't have a Windows system yet and we are need sccm to push and deploy Windows to them.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 20:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617831#M574961</guid>
      <dc:creator>Amr Moussa</dc:creator>
      <dc:date>2022-05-25T20:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617891#M574964</link>
      <description>&lt;P&gt;Got it, so you are talking about provision new machines that do not have any supplicant configuration.&amp;nbsp; This is a classic chicken and egg scenario.&amp;nbsp; You have a couple of options here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure specialized "build ports" inside of locked room for example that do not have any authentication enabled.&amp;nbsp; Build PC, remove from room, and deploy.&lt;/LI&gt;
&lt;LI&gt;Continue to use MAB with a whitelist.&amp;nbsp; Place MAC address of PC in whitelist.&amp;nbsp; Once SCCM build complete, remove MAC address from Whitelist.&amp;nbsp; Always leave whitelist empty except during builds.&lt;/LI&gt;
&lt;LI&gt;Deploy a default authz that only allows access to SCCM.&amp;nbsp; If 802.1x succeeds: full access.&amp;nbsp; If 802.1X fails: dACL/pre-auth/named ACL that only allows DHCP, DNS, and access to SCCM.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 25 May 2022 23:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617891#M574964</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-05-25T23:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617894#M574965</link>
      <description>&lt;P&gt;I think your first solution may be applicable but it will cause some confusion because now we will have a vulenrabilbe room that if any one know about it can access our network.&lt;/P&gt;&lt;P&gt;for the other solution (Deploy a default authz that only allows access to SCCM.&amp;nbsp; If 802.1x succeeds: full access.&amp;nbsp; If 802.1X fails: dACL/pre-auth/named ACL that only allows DHCP, DNS, and access to SCCM.) this is not enough because those machines are gonna join the domain so they will ne access also to the domain controllers and this will be a very dangerous something to leave.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 23:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617894#M574965</guid>
      <dc:creator>Amr Moussa</dc:creator>
      <dc:date>2022-05-25T23:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617897#M574966</link>
      <description>&lt;P&gt;Well you have to make some concessions somewhere because you cannot do 802.1X without a proper supplicant configuration or credentials.&amp;nbsp; You won't get your supplicant configuration or credentials until you can talk to SCCM and AD.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another option would be to do something like InTune or MS Autopilot and join the new machine to a guest network for example and provision over the internet.&amp;nbsp; Once provisioning has taken place, then connect the machine to your corporate network as normal.&lt;/P&gt;
&lt;P&gt;If an unauthorized user can access a locked/secured room then that is a physical security problem, not a NAC problem.&lt;/P&gt;
&lt;P&gt;What is wrong with the whitelist MAB idea?&amp;nbsp; If the whitelist is normally empty any unknown MAC address would be denied.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 23:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617897#M574966</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-05-25T23:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617898#M574967</link>
      <description>&lt;P&gt;See a similar discussion with some additional detail and options here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/pc-imaging-on-nac-secured-ports/td-p/3486098" target="_blank" rel="noopener"&gt;PC Imaging on NAC secured ports&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 23:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617898#M574967</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-05-25T23:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE along with SCCM</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617904#M574968</link>
      <description>&lt;P&gt;the only problem with the MAB idea is the headache, we need to add and remove the MAC on any deployment.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 23:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-along-with-sccm/m-p/4617904#M574968</guid>
      <dc:creator>Amr Moussa</dc:creator>
      <dc:date>2022-05-25T23:39:39Z</dc:date>
    </item>
  </channel>
</rss>

