<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x and Mab same policy in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4830109#M581586</link>
    <description>&lt;P&gt;Yes. You should have just tried it.&amp;nbsp; 8-)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183988i1C6DB930FA47FF81/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 07 May 2023 17:15:39 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2023-05-07T17:15:39Z</dc:date>
    <item>
      <title>802.1x and Mab same policy</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823229#M581418</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;I’ve got a specific use case whereby we need to use peap-mschapv2 and add a condition where by the device has to be in a endpoint identity group by mac.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example the workflow - User connects to wireless with an ssid that is 802.1x enabled and then authenticated like usual with peap + mschapv2. The authorisation policy then needs to to include the group they are in AD I.e domain users AND also the device needs to be an endpoint identity group with their MAC address. They then get the authorisation result I.e Permit.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is this possible or am I overthinking&amp;nbsp;&lt;/P&gt;&lt;P&gt;BW&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jon&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 17:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823229#M581418</guid>
      <dc:creator>JonathanC1</dc:creator>
      <dc:date>2023-04-27T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and Mab same policy</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823242#M581423</link>
      <description>&lt;P&gt;You can create an authentication policy with AD as identity source and in the authorization policy put endpoint group as the condition. This should cover your scenario&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 17:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823242#M581423</guid>
      <dc:creator>Nancy Saini</dc:creator>
      <dc:date>2023-04-27T17:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and Mab same policy</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823339#M581425</link>
      <description>&lt;P&gt;So can’t do both with the condition? E.g if user is in a certain group in ad. Thx&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 20:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823339#M581425</guid>
      <dc:creator>JonathanC1</dc:creator>
      <dc:date>2023-04-27T20:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and Mab same policy</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823347#M581426</link>
      <description>&lt;P&gt;authentication would be one of the conditions to get to the policies IE, user is a user in AD, then use the conditions in the policy rules to verify any group membership etc.&lt;/P&gt;&lt;P&gt;Example for us is for a wireless device to go on internal network, we have ISE keep a record of devices themselves and call to check that the MAC is a domain PC with the WasMachineAuthenticated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-04-27 152846.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183164iC4CD4E5E7DD6F14E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-04-27 152846.jpg" alt="Screenshot 2023-04-27 152846.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If, you are looking to check both in AD, you can do EAP chaining, but that will just check a user and that it's a domain PC, not check for specific groups.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 20:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4823347#M581426</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2023-04-27T20:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and Mab same policy</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4830109#M581586</link>
      <description>&lt;P&gt;Yes. You should have just tried it.&amp;nbsp; 8-)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183988i1C6DB930FA47FF81/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 17:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-same-policy/m-p/4830109#M581586</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-05-07T17:15:39Z</dc:date>
    </item>
  </channel>
</rss>

