<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISR 1100 MAC Address Filtering in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5005974#M586742</link>
    <description>&lt;P&gt;Remove sticky&lt;/P&gt;
&lt;P&gt;1- shut port that learn sticky mac&lt;/P&gt;
&lt;P&gt;2- add NO to command line&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;switchport port-security mac-address sticky 0800.270f.b6e6
 switchport port-security mac-address sticky 0800.2772.bdec
 switchport port-security mac-address d8bb.c101.e888
 switchport port-security mac-address sticky d8bb.c101.e88b&lt;/PRE&gt;
&lt;P&gt;3- Then clear port-secuirty mac&lt;/P&gt;
&lt;P&gt;Above is manaul you can make sticky mac auto clean by config port-secuirty aging static&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jan 2024 22:22:36 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-01-25T22:22:36Z</dc:date>
    <item>
      <title>Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5005967#M586741</link>
      <description>&lt;P&gt;I'm trying to enable MAC Address Filtering on my Cisco ISR 1111x-8p and I can't seem to get it working correctly. I tried adding my PC to the port-security list and removing it, but my PC is still connected to the internet. Is this the best way to manage access to the network, and if so, can I manage access through the Cisco ISR 1111x-8p when another router (Home router) is connected to the port that provides wifi access?&lt;/P&gt;&lt;P&gt;MAC of my eth0 is:&amp;nbsp;D8-BB-C1-01-E8-8B&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried removing the MAC from my port-security but I can't seem to get it removed, or I don't know how.&lt;/P&gt;&lt;P&gt;I have attached a network diagram of how my network will be setup as well as my Cisco config file, and port-security settings....&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 22:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5005967#M586741</guid>
      <dc:creator>whughes123</dc:creator>
      <dc:date>2024-01-25T22:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5005974#M586742</link>
      <description>&lt;P&gt;Remove sticky&lt;/P&gt;
&lt;P&gt;1- shut port that learn sticky mac&lt;/P&gt;
&lt;P&gt;2- add NO to command line&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;switchport port-security mac-address sticky 0800.270f.b6e6
 switchport port-security mac-address sticky 0800.2772.bdec
 switchport port-security mac-address d8bb.c101.e888
 switchport port-security mac-address sticky d8bb.c101.e88b&lt;/PRE&gt;
&lt;P&gt;3- Then clear port-secuirty mac&lt;/P&gt;
&lt;P&gt;Above is manaul you can make sticky mac auto clean by config port-secuirty aging static&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 22:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5005974#M586742</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-25T22:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006004#M586743</link>
      <description>&lt;P&gt;I was able to remove the MAC addresses from the interface, but can you tell me why my PC is still connected to the internet when I have MAC Filtering enabled but there are no MAC addresses being allowed? It should only connect to the internet if I add the MAC for the device I want to connect, right?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 23:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006004#M586743</guid>
      <dc:creator>whughes123</dc:creator>
      <dc:date>2024-01-25T23:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006008#M586744</link>
      <description>&lt;P&gt;EDIT :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After looking your Attached Drawing your PC MAC not directly connected to that port right ?&lt;/P&gt;
&lt;P&gt;you have NAT in place on the Device ? where is this PC connected ? (in WIFI ?)&lt;/P&gt;
&lt;P&gt;Physically connected to port Gig0/1/0 refer below :&lt;/P&gt;
&lt;P&gt;When you remove the MAC address from the sticky and the port shutdown and no shutdown - the device still connected to same port and able to access internet ?&lt;/P&gt;
&lt;P&gt;after removed the stick MAC from the port - can you post mac address table and configuration again ?&lt;/P&gt;
&lt;P&gt;check on the port - show port-security interface gig0/1/0 (post output here)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 00:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006008#M586744</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-26T00:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006013#M586745</link>
      <description>&lt;P&gt;What you meaning mac filtering? Do you mean port secuirty?&lt;/P&gt;
&lt;P&gt;If you can access with old mac&lt;/P&gt;
&lt;P&gt;Can i see&lt;/P&gt;
&lt;P&gt;Show interface port-secuirty&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 00:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5006013#M586745</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-26T00:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008363#M586855</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; Here is my port-security show command output:&lt;/P&gt;&lt;P&gt;cisco#show port-security interface gig 0/1/0&lt;BR /&gt;Port Security : Enabled&lt;BR /&gt;Port Status : Secure-up&lt;BR /&gt;Violation Mode : Restrict&lt;BR /&gt;Aging Time : 1 mins&lt;BR /&gt;Maximum MAC Addresses : 50&lt;BR /&gt;Total MAC Addresses : 1&lt;BR /&gt;Configured MAC Addresses : 0&lt;BR /&gt;Sticky MAC Addresses : 0&lt;BR /&gt;Last Source Address:Vlan : d8bb.c101.e88b:1&lt;BR /&gt;Security Violation Count : 0&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 18:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008363#M586855</guid>
      <dc:creator>whughes123</dc:creator>
      <dc:date>2024-01-29T18:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008364#M586856</link>
      <description>&lt;P&gt;Port secuirty is enable&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;d8bb.c101.e88b:1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This mac was sticky learn before now I think it dynamic learn and allow to access SW.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And for mac filtering' sorry but as I know it only for wireless client not for wire client' or am I wrong?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 18:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008364#M586856</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-29T18:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008368#M586858</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;I have updated my network diagram to show my Windows 10 PC, it's connected to the Cisco router via ethernet on GigabitEthernet 0/1/0. Here is the output to my mac address-table show command:&lt;/P&gt;&lt;P&gt;Mac Address Table&lt;/P&gt;&lt;P&gt;cisco#show port-security interface gig 0/1/0&lt;BR /&gt;Port Security : Enabled&lt;BR /&gt;Port Status : Secure-up&lt;BR /&gt;Violation Mode : Restrict&lt;BR /&gt;Aging Time : 1 mins&lt;BR /&gt;Maximum MAC Addresses : 50&lt;BR /&gt;Total MAC Addresses : 1&lt;BR /&gt;Configured MAC Addresses : 0&lt;BR /&gt;Sticky MAC Addresses : 0&lt;BR /&gt;Last Source Address:Vlan : d8bb.c101.e88b:1&lt;BR /&gt;Security Violation Count : 0&lt;/P&gt;&lt;P&gt;cisco#show port-security interface gig 0/1/0 address&lt;BR /&gt;Secure Mac Address Table&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Vlan Mac Address Type Ports Remaining Age&lt;BR /&gt;(mins)&lt;BR /&gt;---- ----------- ---- ----- -------------&lt;BR /&gt;1 d8bb.c101.e88b SecureDynamic Gi0/1/0 &amp;lt; 1&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Total Addresses: 1&lt;/P&gt;&lt;P&gt;cisco#show port-security interface gig 0/1/0 vlan&lt;BR /&gt;Default maximum: not set, using 2048&lt;BR /&gt;VLAN Maximum Current&lt;BR /&gt;1 default 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;Vlan Mac Address Type Ports&lt;BR /&gt;---- ----------- -------- -----&lt;BR /&gt;All 0100.0ccc.cccc STATIC CPU&lt;BR /&gt;All 0100.0ccc.cccd STATIC CPU&lt;BR /&gt;All 0100.0ccc.ccce STATIC CPU&lt;BR /&gt;All 0180.c200.0000 STATIC CPU&lt;BR /&gt;All 0180.c200.0001 STATIC CPU&lt;BR /&gt;All 0180.c200.0002 STATIC CPU&lt;BR /&gt;All 0180.c200.0003 STATIC CPU&lt;BR /&gt;All 0180.c200.0004 STATIC CPU&lt;BR /&gt;All 0180.c200.0005 STATIC CPU&lt;BR /&gt;All 0180.c200.0006 STATIC CPU&lt;BR /&gt;All 0180.c200.0007 STATIC CPU&lt;BR /&gt;All 0180.c200.0008 STATIC CPU&lt;BR /&gt;All 0180.c200.0009 STATIC CPU&lt;BR /&gt;All 0180.c200.000a STATIC CPU&lt;BR /&gt;All 0180.c200.000b STATIC CPU&lt;BR /&gt;All 0180.c200.000c STATIC CPU&lt;BR /&gt;All 0180.c200.000d STATIC CPU&lt;BR /&gt;All 0180.c200.000e STATIC CPU&lt;BR /&gt;All 0180.c200.000f STATIC CPU&lt;BR /&gt;All 0180.c200.0010 STATIC CPU&lt;BR /&gt;1 60b9.c0a5.7ef4 STATIC CPU&lt;BR /&gt;1 d8bb.c101.e88b STATIC Gi0/1/0&lt;BR /&gt;Total Mac Addresses for this criterion: 22&lt;/P&gt;&lt;P&gt;Here is the output for showing all port-security commands:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 18:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008368#M586858</guid>
      <dc:creator>whughes123</dc:creator>
      <dc:date>2024-01-29T18:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008377#M586859</link>
      <description>&lt;P&gt;If MAC filtering only works on WIFI then I will have to find another way to whitelist access to the router. I guess I could assign static IP's to the devices I need to connect to the router, then setup an ACL to only allow those static IP's.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 19:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008377#M586859</guid>
      <dc:creator>whughes123</dc:creator>
      <dc:date>2024-01-29T19:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISR 1100 MAC Address Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008415#M586861</link>
      <description>&lt;P&gt;Yes I think this solution will work.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 20:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-isr-1100-mac-address-filtering/m-p/5008415#M586861</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-29T20:21:12Z</dc:date>
    </item>
  </channel>
</rss>

