<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configure ISE MAB to allow devices on vendor ID part of mac address ? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957526#M585134</link>
    <description>&lt;P&gt;Is it possible to setup ISE to recognize devices for MAB based on the vendor ID part of their mac addresses ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My company builds robot solutions and uses it's own vendor code. I want to recognize our robot products as the are plugged into the network in our various test and development areas so they get assigned to the test network via NAC &amp;amp; ISE/MAB instead of having to register their mac addresses all the time. Those developers and test guys are busy bees and always in a rush and will plug all kinds of stuff into any outlet they see fit.&lt;/P&gt;</description>
    <pubDate>Sun, 12 Nov 2023 14:31:01 GMT</pubDate>
    <dc:creator>Redguy</dc:creator>
    <dc:date>2023-11-12T14:31:01Z</dc:date>
    <item>
      <title>Configure ISE MAB to allow devices on vendor ID part of mac address ?</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957526#M585134</link>
      <description>&lt;P&gt;Is it possible to setup ISE to recognize devices for MAB based on the vendor ID part of their mac addresses ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My company builds robot solutions and uses it's own vendor code. I want to recognize our robot products as the are plugged into the network in our various test and development areas so they get assigned to the test network via NAC &amp;amp; ISE/MAB instead of having to register their mac addresses all the time. Those developers and test guys are busy bees and always in a rush and will plug all kinds of stuff into any outlet they see fit.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 14:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957526#M585134</guid>
      <dc:creator>Redguy</dc:creator>
      <dc:date>2023-11-12T14:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configure ISE MAB to allow devices on vendor ID part of mac addres</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957528#M585136</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1631942"&gt;@Redguy&lt;/a&gt; yes, you can use the ISE profiling to profile the device based on the MAC OUI and/or other attributes learnt about the device. You can then return a dynamic VLAN or other settings such as DACL to the devices that match your specific profiled devices.&lt;/P&gt;
&lt;P&gt;You may need to create a specific profiling policy to match your require MAC OUI (if not built-in to ISE already), you can combine multiple attributes in the policy.&lt;/P&gt;
&lt;P&gt;ISE Profiling Guide for more information - &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#toc-hId--368844690" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#toc-hId--368844690&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 14:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957528#M585136</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-11-12T14:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configure ISE MAB to allow devices on vendor ID part of mac addres</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957533#M585137</link>
      <description>&lt;P&gt;Ah great !,&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I haven't reached the profiling part of my ISE training yet, but that will save me a lot of time setting up the test networks.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 14:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957533#M585137</guid>
      <dc:creator>Redguy</dc:creator>
      <dc:date>2023-11-12T14:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Configure ISE MAB to allow devices on vendor ID part of mac addres</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957629#M585144</link>
      <description>&lt;P&gt;In addition to what Rob mentioned (ISE profiling), you can also achieve this without Profiling. Remember that Profiling requires the medium tier license (Plus/Advantage). If you only have the Base/Essentials license you can create simple MAB Authorization Policy Rules that match on the MAC prefix hex digits. That only consumes a base license.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 22:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-ise-mab-to-allow-devices-on-vendor-id-part-of-mac/m-p/4957629#M585144</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-12T22:22:16Z</dc:date>
    </item>
  </channel>
</rss>

