<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC address whitelisting/Scripts for automation. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674823#M576862</link>
    <description>&lt;P&gt;Rob's right. It is easy enough.&amp;nbsp; I did a Postman "Runner" where you input the MAC address and it sets things up for you.&amp;nbsp; Mine was just a proof-of-concept for using ERS to quarantine an endpoint for our SOC (now there is pxGrid for that too). There are lots of ways to use ERS (for fun!). If you plan to static map the Identity Group, be careful if you are using Custom Attributes, as i think I recall one bug scrub for some ISE v2.X version where static mapping groups erased custom attributes (maybe?). Always check your version's known bugs for your patch level.&amp;nbsp; It may well be you're on a newer version where that vague recollection of an issue was solved, or I may have some of that point of concern wrong in my head after all this time.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Regards,&lt;BR /&gt;&lt;/SPAN&gt;David&lt;/P&gt;</description>
    <pubDate>Wed, 24 Aug 2022 18:46:27 GMT</pubDate>
    <dc:creator>davidgfriedman</dc:creator>
    <dc:date>2022-08-24T18:46:27Z</dc:date>
    <item>
      <title>MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674809#M576859</link>
      <description>&lt;P&gt;Team,&lt;BR /&gt;Has anyone tried adding MAC address for whitelisting using any script or API?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What I really want to do is add a policy which should allow MAC addresses to get authorized to the Network, but we cannot add these MAC address manually. We are looking at some API or some command to do this. Is this even possible on the ISE?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;N!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 17:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674809#M576859</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-08-24T17:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674818#M576860</link>
      <description>&lt;LI-CODE lang="markup"&gt;MAC address whitelisting/Scripts for automation.&lt;/LI-CODE&gt;
&lt;P&gt;possible many difference ways ?&lt;/P&gt;
&lt;P&gt;On what device you are trying ? what IOS code it running.&lt;/P&gt;
&lt;P&gt;if you have ISE you can Manage MAC address list.&lt;/P&gt;
&lt;P&gt;again we need to know more details here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 18:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674818#M576860</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-08-24T18:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674820#M576861</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/47004"&gt;@network_geek1979&lt;/a&gt; yes ISE supports API. You can create the MAC address endpoint and add this to an Identity Group, you can then use this Identity Group in an Authorisation rule to whitelist the group of MAC addresses.&lt;/P&gt;
&lt;P&gt;Here is the API guide, in particular how to create endpoints - &lt;A href="https://developer.cisco.com/docs/identity-services-engine/latest/#!endpoint" target="_blank" rel="noopener"&gt;https://developer.cisco.com/docs/identity-services-engine/latest/#!endpoint&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can expand on this to import MAC addresses in bulk&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 18:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674820#M576861</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-24T18:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674823#M576862</link>
      <description>&lt;P&gt;Rob's right. It is easy enough.&amp;nbsp; I did a Postman "Runner" where you input the MAC address and it sets things up for you.&amp;nbsp; Mine was just a proof-of-concept for using ERS to quarantine an endpoint for our SOC (now there is pxGrid for that too). There are lots of ways to use ERS (for fun!). If you plan to static map the Identity Group, be careful if you are using Custom Attributes, as i think I recall one bug scrub for some ISE v2.X version where static mapping groups erased custom attributes (maybe?). Always check your version's known bugs for your patch level.&amp;nbsp; It may well be you're on a newer version where that vague recollection of an issue was solved, or I may have some of that point of concern wrong in my head after all this time.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Regards,&lt;BR /&gt;&lt;/SPAN&gt;David&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 18:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4674823#M576862</guid>
      <dc:creator>davidgfriedman</dc:creator>
      <dc:date>2022-08-24T18:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675051#M576873</link>
      <description>&lt;P&gt;Hi BB, I believe you are asking about Cisco switches. Is yes, we run different versions in the network.&lt;/P&gt;&lt;P&gt;Actually, my use case is running a script on the end user machine itself which will reach out to ISE and add a static MAC as a whitelist on the ISE. Eventually, I also want to delete this static MAC address entry though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!!&lt;/P&gt;&lt;P&gt;N.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 07:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675051#M576873</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-08-25T07:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675108#M576880</link>
      <description>&lt;P&gt;Hi Rob, Yes, this is something I will have to try. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;I'll work on some script to add this endpoint to a manually created Identity Group. Let me see how it works.&lt;/P&gt;&lt;P&gt;This helps me.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 08:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675108#M576880</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-08-25T08:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675109#M576881</link>
      <description>&lt;P&gt;Thanks David.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 08:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675109#M576881</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-08-25T08:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: MAC address whitelisting/Scripts for automation.</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675700#M576898</link>
      <description>&lt;P&gt;Another cool approach for small networks is to use the Vanilla ISE python application, which you can run on any box that has Python 3 interpreter, and access to the Admin node and switches. It has a nice graphical display of your switch (or switch stack) and you can just right click on a port to make it NAC Exempt. Easy as that. No MAC address involved. This approach is nice if you know which port you want to make exempt for that user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/obrigg/Vanilla-ISE" target="_blank"&gt;GitHub - obrigg/Vanilla-ISE: Vanilla ISE is a lightweight, simplified UI for operating Cisco's Identity Services Engine (Cisco ISE)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 23:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-address-whitelisting-scripts-for-automation/m-p/4675700#M576898</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-25T23:45:07Z</dc:date>
    </item>
  </channel>
</rss>

