<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAB in  ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4927286#M584179</link>
    <description>&lt;P data-source-line="409"&gt;Our recent webinar explains how MAB works. MAB simply establishes a RADIUS session without active authentication of an endpoint or user.&amp;nbsp;&lt;/P&gt;
&lt;P data-source-line="409"&gt;&lt;STRONG&gt;▷&amp;nbsp;&lt;A class="" title="https://youtu.be/IzUpgL-zPVE" href="https://youtu.be/IzUpgL-zPVE" data-from-md="" target="_blank"&gt;MAC Authentication Bypass (MAB) with ISE&lt;/A&gt;&amp;nbsp;2023/07/20&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-source-line="415"&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=30s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=30s" data-from-md="" target="_blank"&gt;00:30&lt;/A&gt;&amp;nbsp;Media Access Control (MAC) Addresses by the Byte&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=160s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=160s" data-from-md="" target="_blank"&gt;02:40&lt;/A&gt;&amp;nbsp;OUI &amp;amp; MAC Formatting&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=279s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=279s" data-from-md="" target="_blank"&gt;04:39&lt;/A&gt;&amp;nbsp;Network Authentication Options&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=345s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=345s" data-from-md="" target="_blank"&gt;05:45&lt;/A&gt;&amp;nbsp;Multi-Factor Authentication and IOT&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=374s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=374s" data-from-md="" target="_blank"&gt;06:14&lt;/A&gt;&amp;nbsp;RADIUS with 802.1X Flow&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=463s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=463s" data-from-md="" target="_blank"&gt;07:43&lt;/A&gt;&amp;nbsp;RADIUS with MAB Flow&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=555s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=555s" data-from-md="" target="_blank"&gt;09:15&lt;/A&gt;&amp;nbsp;RADIUS Packet Captures: Wired &amp;amp; Wireless MAB&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=720s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=720s" data-from-md="" target="_blank"&gt;12:00&lt;/A&gt;&amp;nbsp;ISE Segmentation Options with RADIUS&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=774s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=774s" data-from-md="" target="_blank"&gt;12:54&lt;/A&gt;&amp;nbsp;ISE MAB Authorization Solutions: Filtering, Profiling, Endpoint Groups, Custom Attributes, CMDBs&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=936s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=936s" data-from-md="" target="_blank"&gt;15:36&lt;/A&gt;&amp;nbsp;Frequently Used RADIUS Attributes Reference&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=986s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=986s" data-from-md="" target="_blank"&gt;16:26&lt;/A&gt;&amp;nbsp;ISE Secure Wired Access Deployment Guide for Cisco Catalyst Configuration&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1103s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1103s" data-from-md="" target="_blank"&gt;18:23&lt;/A&gt;&amp;nbsp;How To Integrate Meraki Networks with ISE&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1207s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1207s" data-from-md="" target="_blank"&gt;20:07&lt;/A&gt;&amp;nbsp;ISE Policy Set Authentication Default Behavior and Recommended Changes&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1380s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1380s" data-from-md="" target="_blank"&gt;23:00&lt;/A&gt;&amp;nbsp;ISE Policy Set Examples for MAB&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1414s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1414s" data-from-md="" target="_blank"&gt;23:34&lt;/A&gt;&amp;nbsp;Demo: ISE MAB Default Authentication Policy Behavior&lt;BR /&gt;Note: the MAB Authentication worked because ISE knew the MAC from previous failed auths!&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1623s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1623s" data-from-md="" target="_blank"&gt;27:03&lt;/A&gt;&amp;nbsp;- the MAB auth worked because the endpoint was known from the previous MAB failures&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1654s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1654s" data-from-md="" target="_blank"&gt;27:34&lt;/A&gt;&amp;nbsp;- MAB with If-user-not-found: Continue&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1704s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1704s" data-from-md="" target="_blank"&gt;28:24&lt;/A&gt;&amp;nbsp;ISE Local &amp;amp; Global Exceptions&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1751s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1751s" data-from-md="" target="_blank"&gt;29:11&lt;/A&gt;&amp;nbsp;MAC Filtering Authorization Rules using MAC_* Operators&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1804s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1804s" data-from-md="" target="_blank"&gt;30:04&lt;/A&gt;&amp;nbsp;Demo: Local and Global Exceptions&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1913s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1913s" data-from-md="" target="_blank"&gt;31:53&lt;/A&gt;&amp;nbsp;- ISE Endpoint Identity Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1975s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1975s" data-from-md="" target="_blank"&gt;32:55&lt;/A&gt;&amp;nbsp;- Add/Remove Endpoints to Identity Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2024s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2024s" data-from-md="" target="_blank"&gt;33:44&lt;/A&gt;&amp;nbsp;- Override Global Exception with Policy Set Local Exception&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2100s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2100s" data-from-md="" target="_blank"&gt;35:00&lt;/A&gt;&amp;nbsp;- Random MAC Address Filtering&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2153s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2153s" data-from-md="" target="_blank"&gt;35:53&lt;/A&gt;&amp;nbsp;- Matching with EQUALS vs MAC_EQUALS using :'s and -'s&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2279s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2279s" data-from-md="" target="_blank"&gt;37:59&lt;/A&gt;&amp;nbsp;- MAC OUI matching using MAC_STARTS operator&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2341s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2341s" data-from-md="" target="_blank"&gt;39:01&lt;/A&gt;&amp;nbsp;- MAC_* Operators in Authorization Rules&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2413s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2413s" data-from-md="" target="_blank"&gt;40:13&lt;/A&gt;&amp;nbsp;Demo: Static Endpoint Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2466s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2466s" data-from-md="" target="_blank"&gt;41:06&lt;/A&gt;&amp;nbsp;- Endpoint Purging will remove endpoints from Endpoint Identity Groups!&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2559s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2559s" data-from-md="" target="_blank"&gt;42:39&lt;/A&gt;&amp;nbsp;- Profiling Raspberry Pis&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2698s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2698s" data-from-md="" target="_blank"&gt;44:58&lt;/A&gt;&amp;nbsp;ISE Endpoint Profiling &amp;amp; Demo&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2856s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2856s" data-from-md="" target="_blank"&gt;47:36&lt;/A&gt;&amp;nbsp;ISE Endpoint Custom Attributes &amp;amp; Demo&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3116s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3116s" data-from-md="" target="_blank"&gt;51:56&lt;/A&gt;&amp;nbsp;Configuration Management Database (CMDB) and Demo with iPSKs&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3410s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3410s" data-from-md="" target="_blank"&gt;56:50&lt;/A&gt;&amp;nbsp;Question: What is the best method to define a policy set? Spoiler: It depends!&lt;/P&gt;
&lt;P data-source-line="452"&gt;Resources:&lt;BR /&gt;&lt;A title="https://cs.co/ise-wired" href="https://cs.co/ise-wired" data-from-md="" target="_blank"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt;&amp;nbsp;(&lt;A title="https://cs.co/ise-wired" href="https://cs.co/ise-wired" data-from-md="" target="_blank"&gt;https://cs.co/ise-wired&lt;/A&gt;)&lt;BR /&gt;&lt;A title="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-meraki-networks-with-ise/ta-p/3618650" href="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-meraki-networks-with-ise/ta-p/3618650" data-from-md="" target="_blank"&gt;How To Integrate Meraki Networks with ISE&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://www.ermitacode.com/eaptest/" href="https://www.ermitacode.com/eaptest/" data-from-md="" target="_blank"&gt;RADIUS EAPTest Client&lt;/A&gt;&amp;nbsp;(macOS only)&lt;BR /&gt;▷&amp;nbsp;&lt;A class="" title="https://youtu.be/ivfP1rJrtfU" href="https://youtu.be/ivfP1rJrtfU" data-from-md="" target="_blank"&gt;802.1X Simplification &amp;amp; Automation with IBNS 2.0&lt;/A&gt;&lt;/P&gt;
&lt;P data-source-line="452"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-source-line="452"&gt;Profiling is separate and covered in another recent webinar:&lt;/P&gt;
&lt;P data-source-line="258"&gt;&lt;STRONG&gt;▷&amp;nbsp;&lt;A title="https://youtu.be/OKPGBEMb0w4" href="https://youtu.be/OKPGBEMb0w4" data-from-md="" target="_blank"&gt;Getting Started with ISE Profiling&lt;/A&gt;&amp;nbsp;2023/09/05&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-source-line="262"&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=35s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=35s" data-from-md="" target="_blank"&gt;00:35&lt;/A&gt;&amp;nbsp;Unknowns ... to Knowns ... to Classified&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=90s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=90s" data-from-md="" target="_blank"&gt;01:30&lt;/A&gt;&amp;nbsp;Audience Poll Questions&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=435s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=435s" data-from-md="" target="_blank"&gt;07:15&lt;/A&gt;&amp;nbsp;Organizational vs Behavioral Endpoint Source&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=515s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=515s" data-from-md="" target="_blank"&gt;08:35&lt;/A&gt;&amp;nbsp;Static Endpoint Groups, Endpoint Custom Attributes, and ISE pxGrid Direct with CMDBs&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=623s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=623s" data-from-md="" target="_blank"&gt;10:23&lt;/A&gt;&amp;nbsp;ISE Visibility Setup Wizard&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=654s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=654s" data-from-md="" target="_blank"&gt;10:54&lt;/A&gt;&amp;nbsp;ISE Context Visibility&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=698s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=698s" data-from-md="" target="_blank"&gt;11:38&lt;/A&gt;&amp;nbsp;Profiling : Sources ▹ Attributes ▹ Profiles ▹ Authorization Profiles ▹ Segmentation&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=914s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=914s" data-from-md="" target="_blank"&gt;15:14&lt;/A&gt;&amp;nbsp;ISE Profiling Probes Configuration&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1062s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1062s" data-from-md="" target="_blank"&gt;17:42&lt;/A&gt;&amp;nbsp;ISE Profiling Design Guide |&amp;nbsp;&lt;A title="https://cs.co/ise-profiling" href="https://cs.co/ise-profiling" data-from-md="" target="_blank"&gt;https://cs.co/ise-profiling&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1120s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1120s" data-from-md="" target="_blank"&gt;18:40&lt;/A&gt;&amp;nbsp;Profiling Probe Selection Best Practice&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1230s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1230s" data-from-md="" target="_blank"&gt;20:30&lt;/A&gt;&amp;nbsp;Profiler Global Settings: RADIUS Change of Authorization (CoA)&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1452s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1452s" data-from-md="" target="_blank"&gt;24:12&lt;/A&gt;&amp;nbsp;Network Device Capabilities for Profiling:&amp;nbsp;&lt;A title="https://cs.co/nad-capabilities" href="https://cs.co/nad-capabilities" data-from-md="" target="_blank"&gt;https://cs.co/nad-capabilities&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1548s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1548s" data-from-md="" target="_blank"&gt;25:48&lt;/A&gt;&amp;nbsp;Demo: Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1632s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1632s" data-from-md="" target="_blank"&gt;27:12&lt;/A&gt;&amp;nbsp;Demo: Profiling Feed Service Online &amp;amp; Offline Updates&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1770s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1770s" data-from-md="" target="_blank"&gt;29:30&lt;/A&gt;&amp;nbsp;Demo: Review Updated Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1868s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1868s" data-from-md="" target="_blank"&gt;31:08&lt;/A&gt;&amp;nbsp;Re-Profiling After Feed Updates&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1911s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1911s" data-from-md="" target="_blank"&gt;31:51&lt;/A&gt;&amp;nbsp;Customizing Profiling Policies : Global CoA vs Per-Profile CoA&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2115s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2115s" data-from-md="" target="_blank"&gt;35:15&lt;/A&gt;&amp;nbsp;Creating Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2198s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2198s" data-from-md="" target="_blank"&gt;36:38&lt;/A&gt;&amp;nbsp;WiFi Edge Analytics for Catalyst Wireless Controllers (WLCs) with Apple, Intel, Samsung&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2392s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2392s" data-from-md="" target="_blank"&gt;39:52&lt;/A&gt;&amp;nbsp;AI-Proposed Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2547s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2547s" data-from-md="" target="_blank"&gt;42:27&lt;/A&gt;&amp;nbsp;Demo: ISE AI Analytics for Profiling Proposals&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2772s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2772s" data-from-md="" target="_blank"&gt;46:12&lt;/A&gt;&amp;nbsp;AI Analytics - Advantage License Required (No Evaluation Support!)&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2868s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2868s" data-from-md="" target="_blank"&gt;47:48&lt;/A&gt;&amp;nbsp;ISE Profiling Integrations with Cisco Endpoint Analytics, Cisco CyberVision, Armis, Medigate, Ordr using pxGrid&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3000s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3000s" data-from-md="" target="_blank"&gt;50:00&lt;/A&gt;&amp;nbsp;Which Profiling Method is Best&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3175s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3175s" data-from-md="" target="_blank"&gt;52:55&lt;/A&gt;&amp;nbsp;ISE Endpoint Analysis Tool (EAT) |&amp;nbsp;&lt;A title="https://iseeat.cisco.com" href="https://iseeat.cisco.com" data-from-md="" target="_blank"&gt;https://iseeat.cisco.com&lt;/A&gt;&amp;nbsp;| End of Support&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3279s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3279s" data-from-md="" target="_blank"&gt;54:39&lt;/A&gt;&amp;nbsp;Profiling APIs and Automation |&amp;nbsp;&lt;A title="https://cs.co/ise-api" href="https://cs.co/ise-api" data-from-md="" target="_blank"&gt;https://cs.co/ise-api&lt;/A&gt;&amp;nbsp;| profilerprofile, endpoint, endpoints, customattributes&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3395s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3395s" data-from-md="" target="_blank"&gt;56:35&lt;/A&gt;&amp;nbsp;ISE Community &amp;amp; Resources&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-source-line="290"&gt;ISE Profiling Design Guide :&lt;/LI&gt;
&lt;LI data-source-line="291"&gt;ISE Profiling Design Guide :&amp;nbsp;&lt;A title="https://cs.co/ise-profiling" href="https://cs.co/ise-profiling" data-from-md="" target="_blank"&gt;https://cs.co/ise-profiling&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-source-line="292"&gt;TECSEC-3416 Walking on Solid ISE :&amp;nbsp;&lt;A title="https://cs.co/ise-training#CiscoLive" href="https://cs.co/ise-training#CiscoLive" data-from-md="" target="_blank"&gt;https://cs.co/ise-training#CiscoLive&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-source-line="293"&gt;ISE Security Ecosystem Integrations :&amp;nbsp;&lt;A title="https://cs.co/ise-guides" href="https://cs.co/ise-guides" data-from-md="" target="_blank"&gt;https://cs.co/ise-guides&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-source-line="452"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Sep 2023 14:45:24 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2023-09-21T14:45:24Z</dc:date>
    <item>
      <title>MAB in  ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4926877#M584167</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have a question regarding ISE. We want to profile various devices in the IoT sector. These devices cannot use dot1x, so we are using MAB. My question is, what is the most efficient way to create these MAC groups? Is it sufficient to leave "Authentication open" on the switch under the respective interfaces so that the MAC address of the devices connected to these interfaces can be learned in ISE? Or does ISE also need to do something to register these unknown MAC addresses in the ISE database or profile them?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 22:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4926877#M584167</guid>
      <dc:creator>IbrahimElbagouri57340</dc:creator>
      <dc:date>2023-09-20T22:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: MAB in  ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4926957#M584170</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1112485"&gt;@IbrahimElbagouri57340&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You are basically talking about 2 different things. One option for you is to do profiling, where you don't really care about MAC addresses and MAB (you could, in order to increase security, but it would be administrative burden), so devices can connect based on profile, something like "If device is HP printer or Lexmark printer then do something". Here you don't specify any MAC address or static endpoint group apart from endpoint profile (which is essentially endpoint group), which is learned dynamically by ISE. By doing profiling, ISE will assign certain MAC address into specific profile group, which is done dynamically. This gives you an option not to care when someone replaces printer, as new printer would probably be same vendor and it will have same profile signature.&lt;/P&gt;
&lt;P&gt;Another option, which is more static, is to keep your own groups and input MAC addresses for each device. After that, you can invoke these groups under authorization, and work with them, as per your needs. Problem with this approach is that ig gets hard to maintain it with large environment - imagine you are retail shop, where you have so many different device types (POS terminals, IP cameras, different printers, etc.) and each one is maintained by different or even multiple subcontractors. Each time they need to replace a device, they would need to let you know about new MAC, but also about old one (to do cleanup), and this is slowing them down. Alternatively, if you have such system, ISE can be integrated with CMDB where this type of information can be stored in centralized way, so you wont need to maintain in multiple places.&lt;/P&gt;
&lt;P&gt;Either way, you need to configure MAB authentication on ISE. Leaving it with authentication open option would essentially do nothing, as switch will not enforce any authentication.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 06:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4926957#M584170</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2023-09-21T06:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: MAB in  ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4927286#M584179</link>
      <description>&lt;P data-source-line="409"&gt;Our recent webinar explains how MAB works. MAB simply establishes a RADIUS session without active authentication of an endpoint or user.&amp;nbsp;&lt;/P&gt;
&lt;P data-source-line="409"&gt;&lt;STRONG&gt;▷&amp;nbsp;&lt;A class="" title="https://youtu.be/IzUpgL-zPVE" href="https://youtu.be/IzUpgL-zPVE" data-from-md="" target="_blank"&gt;MAC Authentication Bypass (MAB) with ISE&lt;/A&gt;&amp;nbsp;2023/07/20&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-source-line="415"&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=30s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=30s" data-from-md="" target="_blank"&gt;00:30&lt;/A&gt;&amp;nbsp;Media Access Control (MAC) Addresses by the Byte&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=160s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=160s" data-from-md="" target="_blank"&gt;02:40&lt;/A&gt;&amp;nbsp;OUI &amp;amp; MAC Formatting&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=279s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=279s" data-from-md="" target="_blank"&gt;04:39&lt;/A&gt;&amp;nbsp;Network Authentication Options&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=345s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=345s" data-from-md="" target="_blank"&gt;05:45&lt;/A&gt;&amp;nbsp;Multi-Factor Authentication and IOT&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=374s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=374s" data-from-md="" target="_blank"&gt;06:14&lt;/A&gt;&amp;nbsp;RADIUS with 802.1X Flow&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=463s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=463s" data-from-md="" target="_blank"&gt;07:43&lt;/A&gt;&amp;nbsp;RADIUS with MAB Flow&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=555s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=555s" data-from-md="" target="_blank"&gt;09:15&lt;/A&gt;&amp;nbsp;RADIUS Packet Captures: Wired &amp;amp; Wireless MAB&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=720s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=720s" data-from-md="" target="_blank"&gt;12:00&lt;/A&gt;&amp;nbsp;ISE Segmentation Options with RADIUS&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=774s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=774s" data-from-md="" target="_blank"&gt;12:54&lt;/A&gt;&amp;nbsp;ISE MAB Authorization Solutions: Filtering, Profiling, Endpoint Groups, Custom Attributes, CMDBs&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=936s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=936s" data-from-md="" target="_blank"&gt;15:36&lt;/A&gt;&amp;nbsp;Frequently Used RADIUS Attributes Reference&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=986s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=986s" data-from-md="" target="_blank"&gt;16:26&lt;/A&gt;&amp;nbsp;ISE Secure Wired Access Deployment Guide for Cisco Catalyst Configuration&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1103s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1103s" data-from-md="" target="_blank"&gt;18:23&lt;/A&gt;&amp;nbsp;How To Integrate Meraki Networks with ISE&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1207s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1207s" data-from-md="" target="_blank"&gt;20:07&lt;/A&gt;&amp;nbsp;ISE Policy Set Authentication Default Behavior and Recommended Changes&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1380s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1380s" data-from-md="" target="_blank"&gt;23:00&lt;/A&gt;&amp;nbsp;ISE Policy Set Examples for MAB&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1414s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1414s" data-from-md="" target="_blank"&gt;23:34&lt;/A&gt;&amp;nbsp;Demo: ISE MAB Default Authentication Policy Behavior&lt;BR /&gt;Note: the MAB Authentication worked because ISE knew the MAC from previous failed auths!&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1623s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1623s" data-from-md="" target="_blank"&gt;27:03&lt;/A&gt;&amp;nbsp;- the MAB auth worked because the endpoint was known from the previous MAB failures&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1654s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1654s" data-from-md="" target="_blank"&gt;27:34&lt;/A&gt;&amp;nbsp;- MAB with If-user-not-found: Continue&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1704s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1704s" data-from-md="" target="_blank"&gt;28:24&lt;/A&gt;&amp;nbsp;ISE Local &amp;amp; Global Exceptions&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1751s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1751s" data-from-md="" target="_blank"&gt;29:11&lt;/A&gt;&amp;nbsp;MAC Filtering Authorization Rules using MAC_* Operators&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1804s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1804s" data-from-md="" target="_blank"&gt;30:04&lt;/A&gt;&amp;nbsp;Demo: Local and Global Exceptions&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1913s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1913s" data-from-md="" target="_blank"&gt;31:53&lt;/A&gt;&amp;nbsp;- ISE Endpoint Identity Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1975s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=1975s" data-from-md="" target="_blank"&gt;32:55&lt;/A&gt;&amp;nbsp;- Add/Remove Endpoints to Identity Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2024s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2024s" data-from-md="" target="_blank"&gt;33:44&lt;/A&gt;&amp;nbsp;- Override Global Exception with Policy Set Local Exception&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2100s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2100s" data-from-md="" target="_blank"&gt;35:00&lt;/A&gt;&amp;nbsp;- Random MAC Address Filtering&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2153s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2153s" data-from-md="" target="_blank"&gt;35:53&lt;/A&gt;&amp;nbsp;- Matching with EQUALS vs MAC_EQUALS using :'s and -'s&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2279s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2279s" data-from-md="" target="_blank"&gt;37:59&lt;/A&gt;&amp;nbsp;- MAC OUI matching using MAC_STARTS operator&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2341s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2341s" data-from-md="" target="_blank"&gt;39:01&lt;/A&gt;&amp;nbsp;- MAC_* Operators in Authorization Rules&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2413s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2413s" data-from-md="" target="_blank"&gt;40:13&lt;/A&gt;&amp;nbsp;Demo: Static Endpoint Groups&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2466s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2466s" data-from-md="" target="_blank"&gt;41:06&lt;/A&gt;&amp;nbsp;- Endpoint Purging will remove endpoints from Endpoint Identity Groups!&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2559s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2559s" data-from-md="" target="_blank"&gt;42:39&lt;/A&gt;&amp;nbsp;- Profiling Raspberry Pis&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2698s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2698s" data-from-md="" target="_blank"&gt;44:58&lt;/A&gt;&amp;nbsp;ISE Endpoint Profiling &amp;amp; Demo&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2856s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=2856s" data-from-md="" target="_blank"&gt;47:36&lt;/A&gt;&amp;nbsp;ISE Endpoint Custom Attributes &amp;amp; Demo&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3116s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3116s" data-from-md="" target="_blank"&gt;51:56&lt;/A&gt;&amp;nbsp;Configuration Management Database (CMDB) and Demo with iPSKs&lt;BR /&gt;&lt;A title="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3410s" href="https://youtu.be/IzUpgL-zPVE&amp;amp;t=3410s" data-from-md="" target="_blank"&gt;56:50&lt;/A&gt;&amp;nbsp;Question: What is the best method to define a policy set? Spoiler: It depends!&lt;/P&gt;
&lt;P data-source-line="452"&gt;Resources:&lt;BR /&gt;&lt;A title="https://cs.co/ise-wired" href="https://cs.co/ise-wired" data-from-md="" target="_blank"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt;&amp;nbsp;(&lt;A title="https://cs.co/ise-wired" href="https://cs.co/ise-wired" data-from-md="" target="_blank"&gt;https://cs.co/ise-wired&lt;/A&gt;)&lt;BR /&gt;&lt;A title="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-meraki-networks-with-ise/ta-p/3618650" href="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-meraki-networks-with-ise/ta-p/3618650" data-from-md="" target="_blank"&gt;How To Integrate Meraki Networks with ISE&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://www.ermitacode.com/eaptest/" href="https://www.ermitacode.com/eaptest/" data-from-md="" target="_blank"&gt;RADIUS EAPTest Client&lt;/A&gt;&amp;nbsp;(macOS only)&lt;BR /&gt;▷&amp;nbsp;&lt;A class="" title="https://youtu.be/ivfP1rJrtfU" href="https://youtu.be/ivfP1rJrtfU" data-from-md="" target="_blank"&gt;802.1X Simplification &amp;amp; Automation with IBNS 2.0&lt;/A&gt;&lt;/P&gt;
&lt;P data-source-line="452"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-source-line="452"&gt;Profiling is separate and covered in another recent webinar:&lt;/P&gt;
&lt;P data-source-line="258"&gt;&lt;STRONG&gt;▷&amp;nbsp;&lt;A title="https://youtu.be/OKPGBEMb0w4" href="https://youtu.be/OKPGBEMb0w4" data-from-md="" target="_blank"&gt;Getting Started with ISE Profiling&lt;/A&gt;&amp;nbsp;2023/09/05&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-source-line="262"&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=35s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=35s" data-from-md="" target="_blank"&gt;00:35&lt;/A&gt;&amp;nbsp;Unknowns ... to Knowns ... to Classified&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=90s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=90s" data-from-md="" target="_blank"&gt;01:30&lt;/A&gt;&amp;nbsp;Audience Poll Questions&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=435s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=435s" data-from-md="" target="_blank"&gt;07:15&lt;/A&gt;&amp;nbsp;Organizational vs Behavioral Endpoint Source&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=515s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=515s" data-from-md="" target="_blank"&gt;08:35&lt;/A&gt;&amp;nbsp;Static Endpoint Groups, Endpoint Custom Attributes, and ISE pxGrid Direct with CMDBs&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=623s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=623s" data-from-md="" target="_blank"&gt;10:23&lt;/A&gt;&amp;nbsp;ISE Visibility Setup Wizard&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=654s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=654s" data-from-md="" target="_blank"&gt;10:54&lt;/A&gt;&amp;nbsp;ISE Context Visibility&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=698s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=698s" data-from-md="" target="_blank"&gt;11:38&lt;/A&gt;&amp;nbsp;Profiling : Sources ▹ Attributes ▹ Profiles ▹ Authorization Profiles ▹ Segmentation&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=914s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=914s" data-from-md="" target="_blank"&gt;15:14&lt;/A&gt;&amp;nbsp;ISE Profiling Probes Configuration&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1062s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1062s" data-from-md="" target="_blank"&gt;17:42&lt;/A&gt;&amp;nbsp;ISE Profiling Design Guide |&amp;nbsp;&lt;A title="https://cs.co/ise-profiling" href="https://cs.co/ise-profiling" data-from-md="" target="_blank"&gt;https://cs.co/ise-profiling&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1120s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1120s" data-from-md="" target="_blank"&gt;18:40&lt;/A&gt;&amp;nbsp;Profiling Probe Selection Best Practice&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1230s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1230s" data-from-md="" target="_blank"&gt;20:30&lt;/A&gt;&amp;nbsp;Profiler Global Settings: RADIUS Change of Authorization (CoA)&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1452s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1452s" data-from-md="" target="_blank"&gt;24:12&lt;/A&gt;&amp;nbsp;Network Device Capabilities for Profiling:&amp;nbsp;&lt;A title="https://cs.co/nad-capabilities" href="https://cs.co/nad-capabilities" data-from-md="" target="_blank"&gt;https://cs.co/nad-capabilities&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1548s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1548s" data-from-md="" target="_blank"&gt;25:48&lt;/A&gt;&amp;nbsp;Demo: Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1632s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1632s" data-from-md="" target="_blank"&gt;27:12&lt;/A&gt;&amp;nbsp;Demo: Profiling Feed Service Online &amp;amp; Offline Updates&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1770s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1770s" data-from-md="" target="_blank"&gt;29:30&lt;/A&gt;&amp;nbsp;Demo: Review Updated Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1868s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1868s" data-from-md="" target="_blank"&gt;31:08&lt;/A&gt;&amp;nbsp;Re-Profiling After Feed Updates&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1911s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=1911s" data-from-md="" target="_blank"&gt;31:51&lt;/A&gt;&amp;nbsp;Customizing Profiling Policies : Global CoA vs Per-Profile CoA&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2115s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2115s" data-from-md="" target="_blank"&gt;35:15&lt;/A&gt;&amp;nbsp;Creating Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2198s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2198s" data-from-md="" target="_blank"&gt;36:38&lt;/A&gt;&amp;nbsp;WiFi Edge Analytics for Catalyst Wireless Controllers (WLCs) with Apple, Intel, Samsung&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2392s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2392s" data-from-md="" target="_blank"&gt;39:52&lt;/A&gt;&amp;nbsp;AI-Proposed Profiling Policies&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2547s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2547s" data-from-md="" target="_blank"&gt;42:27&lt;/A&gt;&amp;nbsp;Demo: ISE AI Analytics for Profiling Proposals&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2772s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2772s" data-from-md="" target="_blank"&gt;46:12&lt;/A&gt;&amp;nbsp;AI Analytics - Advantage License Required (No Evaluation Support!)&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2868s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=2868s" data-from-md="" target="_blank"&gt;47:48&lt;/A&gt;&amp;nbsp;ISE Profiling Integrations with Cisco Endpoint Analytics, Cisco CyberVision, Armis, Medigate, Ordr using pxGrid&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3000s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3000s" data-from-md="" target="_blank"&gt;50:00&lt;/A&gt;&amp;nbsp;Which Profiling Method is Best&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3175s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3175s" data-from-md="" target="_blank"&gt;52:55&lt;/A&gt;&amp;nbsp;ISE Endpoint Analysis Tool (EAT) |&amp;nbsp;&lt;A title="https://iseeat.cisco.com" href="https://iseeat.cisco.com" data-from-md="" target="_blank"&gt;https://iseeat.cisco.com&lt;/A&gt;&amp;nbsp;| End of Support&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3279s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3279s" data-from-md="" target="_blank"&gt;54:39&lt;/A&gt;&amp;nbsp;Profiling APIs and Automation |&amp;nbsp;&lt;A title="https://cs.co/ise-api" href="https://cs.co/ise-api" data-from-md="" target="_blank"&gt;https://cs.co/ise-api&lt;/A&gt;&amp;nbsp;| profilerprofile, endpoint, endpoints, customattributes&lt;BR /&gt;&lt;A title="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3395s" href="https://youtu.be/OKPGBEMb0w4&amp;amp;t=3395s" data-from-md="" target="_blank"&gt;56:35&lt;/A&gt;&amp;nbsp;ISE Community &amp;amp; Resources&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-source-line="290"&gt;ISE Profiling Design Guide :&lt;/LI&gt;
&lt;LI data-source-line="291"&gt;ISE Profiling Design Guide :&amp;nbsp;&lt;A title="https://cs.co/ise-profiling" href="https://cs.co/ise-profiling" data-from-md="" target="_blank"&gt;https://cs.co/ise-profiling&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-source-line="292"&gt;TECSEC-3416 Walking on Solid ISE :&amp;nbsp;&lt;A title="https://cs.co/ise-training#CiscoLive" href="https://cs.co/ise-training#CiscoLive" data-from-md="" target="_blank"&gt;https://cs.co/ise-training#CiscoLive&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-source-line="293"&gt;ISE Security Ecosystem Integrations :&amp;nbsp;&lt;A title="https://cs.co/ise-guides" href="https://cs.co/ise-guides" data-from-md="" target="_blank"&gt;https://cs.co/ise-guides&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-source-line="452"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 14:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-in-ise/m-p/4927286#M584179</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-09-21T14:45:24Z</dc:date>
    </item>
  </channel>
</rss>

