<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE  wired NAC bypass using MAC in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812953#M581107</link>
    <description>&lt;P&gt;so users whose machine fail to authenticate using NAC (802.1x EAP-TLS), this bypass will provide them temporary access using MAC address.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Apr 2023 15:20:03 GMT</pubDate>
    <dc:creator>ali007</dc:creator>
    <dc:date>2023-04-12T15:20:03Z</dc:date>
    <item>
      <title>Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812917#M581105</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;the business doesn't want us to use the portal included in ISE for NAC bypass using MAC so wondering is there any other way of doing this i.e. using a script, or Service now integration etc.? or integration with sponsor portal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 14:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812917#M581105</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-12T14:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812945#M581106</link>
      <description>&lt;P&gt;To do what exactly?&amp;nbsp; Bypass authentication?&amp;nbsp; Is this wired or wireless?&amp;nbsp; Guest?&amp;nbsp; Something else?&amp;nbsp; Do you mean you don't want to do MAB?&amp;nbsp; Or rely on some other attribute for non-802.1X devices?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-ask-the-community-for-help/ta-p/3704356&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 15:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812945#M581106</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-12T15:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812953#M581107</link>
      <description>&lt;P&gt;so users whose machine fail to authenticate using NAC (802.1x EAP-TLS), this bypass will provide them temporary access using MAC address.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 15:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812953#M581107</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-12T15:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812956#M581108</link>
      <description>&lt;P&gt;So how would the MAC address get added to ISE?&amp;nbsp; Is that what you are asking?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 15:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4812956#M581108</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-12T15:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4813483#M581118</link>
      <description>&lt;P&gt;Exactly... I know how its done through ISE GUI but is it possible to either script it using API or integrate serviceNow or ISE sponsor portal etc.?&lt;/P&gt;&lt;P&gt;if so, do you have document that explains this part?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 08:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4813483#M581118</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-13T08:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4813673#M581125</link>
      <description>&lt;P&gt;API is probably your best/most scalable way to do this:&amp;nbsp;&lt;A href="https://developer.cisco.com/identity-services-engine/" target="_blank"&gt;https://developer.cisco.com/identity-services-engine/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you are going to do this with the Sponsor Portal then you might as well just use the regular GUI.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 12:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4813673#M581125</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-13T12:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815797#M581186</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your help so far. cant seem to find anyone with good scripting skill to utilise API. so came across BYOD portal.. and it ticks all the boxes however I can't seem to find a way to control access to the BYOD portal. Any ideas? can we somehow restrict this portal access to an AD group or perhaps a local ISE user group?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 09:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815797#M581186</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-17T09:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815969#M581189</link>
      <description>&lt;P&gt;How is BYOD portal any different than just going to Context Visibility and manually placing the endpoint in the "bypass" group?&amp;nbsp; Do you mean the My Devices portal?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815969#M581189</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-17T12:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815972#M581190</link>
      <description>&lt;P&gt;Hi, yes I meant the device portal. apologies.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4815972#M581190</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-17T12:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816005#M581194</link>
      <description>&lt;P&gt;Again though, how is this different than just going to Context Visibility and placing the endpoint in the bypass group?&amp;nbsp; Is the idea that this portal will be used by non-technical users?&amp;nbsp; You can enable AD login to the My Devices portal but you have better RBAC through the regular admin GUI.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816005#M581194</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-17T13:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816024#M581197</link>
      <description>&lt;P&gt;yh with devices portal you can capture more information plus the view is better.&amp;nbsp; can you please share the steps on how to enable AD login to Devices porta? been looking from a while now but struggling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816024#M581197</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-17T13:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816083#M581199</link>
      <description>&lt;P&gt;Put your Active Directory Join Point here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ahollifield_0-1681743688867.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182188i79C3F47D5C5C6336/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ahollifield_0-1681743688867.png" alt="ahollifield_0-1681743688867.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Administration -&amp;gt; Device Portal Management -&amp;gt; My Devices -&amp;gt; [select your portal] -&amp;gt; Portal Settings&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 15:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816083#M581199</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-17T15:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816791#M581236</link>
      <description>&lt;P&gt;Hi Mate, thanks once again. wondering what would my policy look like, I have figured this part out. Just don;t know where to start with the policy. as AD Join Point, will allow the entire domain or the groups defined in that domain join point but I want to restrict access to a particular group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;appreciate all your help.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2023 09:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816791#M581236</guid>
      <dc:creator>ali007</dc:creator>
      <dc:date>2023-04-18T09:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  wired NAC bypass using MAC</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816907#M581241</link>
      <description>&lt;P&gt;So if I am understanding your use-case correctly, you would have two Policy Sets.&amp;nbsp; One for 802.1X and one for MAB.&amp;nbsp; In your 802.1X policy you would use conditions to place different enforcement profiles based on AD Group (dACLS, VLANs, etc.).&amp;nbsp; In your MAB policy you would have a condition for your My Devices Whitelist like "Endpoint ID group = [whatever your Endpoint ID group specified in the My Devices Portal]".&amp;nbsp; Then a simple PermitAccess or whatever enforcement you like for this bypass list.&lt;/P&gt;
&lt;P&gt;I would also suggest checking out the ISE YouTube content here:&amp;nbsp;&lt;A href="https://www.youtube.com/@CiscoISENetworkSecurity" target="_blank"&gt;https://www.youtube.com/@CiscoISENetworkSecurity&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2023 11:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wired-nac-bypass-using-mac/m-p/4816907#M581241</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-18T11:46:29Z</dc:date>
    </item>
  </channel>
</rss>

