<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bogus MAC addresses generated from docks/dongles in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217160#M592807</link>
    <description>&lt;P&gt;no need port-security&amp;nbsp;&lt;BR /&gt;run&amp;nbsp;&lt;BR /&gt;host mode single host&amp;nbsp;&lt;BR /&gt;this make port accept one MAC per one Port for data domain&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you seem use multi-auth or multi-host that make problem&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 30 Oct 2024 07:03:09 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-10-30T07:03:09Z</dc:date>
    <item>
      <title>Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5216791#M592777</link>
      <description>&lt;P&gt;I have been investigating this issue for a while now. I have about 20-30 different switchports around my campus where thousands of bogus mac addresses show up in ISE attached to specific ports. We're talking about MACs like '00:00:00:00:00:01'. Ones that are clearly bogus. Until now, I've had to develop profiles matching everything from those switchports so I could purge them nightly. I purge something between 2,000-6,000 each night.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We believe to be narrowing in on certain docks or dongles causing this. One in general has been the Dell 'hockey puck' style dongle. It seems especially problematic. I would love to just eliminate the dongles but that's not always going to work. What other ways can I use to deal with this? Port-security would work, but it seems silly to just add mac address limitations on only a few ports across campus.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 13:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5216791#M592777</guid>
      <dc:creator>Josh Morris</dc:creator>
      <dc:date>2024-10-29T13:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217064#M592801</link>
      <description>&lt;P&gt;I see this too. Apart from purging them, there's nothing else you could do from the switch or ISE. And you're also forced to use muti-auth mode on the switch, due to all the additional MAC addresses in the DATA domain.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a support contract with Dell to bring this to their attention?&lt;/P&gt;
&lt;P&gt;I see all sorts of misbehaviour on end devices, that you normally wouldn't see or care about in a non-NAC environment - e.g. devices that come with 802.1X enabled from factory and just send garbage EAPOL requests every 60 seconds. That causes a lot of noise in ISE and I am constantly fighting to have these supplicants disabled (for customers who use MAB instead). The other perennial pain is the broken Ethernet device drivers in Windows that cause workstations to create 100 to 1000 successful 802.1X requests a day. Normally one requests is enough, but if the device driver is broken it will decide at random intervals to start over again.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you look closely at your failed RADIUS requests in ISE, you'll see this underworld in action.&amp;nbsp; And if you also look at your top 10 busiest endpoints, you might be amazed at how many Windows supplicants are just spamming all day long.&lt;/P&gt;
&lt;P&gt;it's a waste of resources on ISE, and it's not ISE's job to be a type of NMS - but I often report these issues to the end user, because it creates a better experience all around.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 22:03:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217064#M592801</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-29T22:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217076#M592804</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;When you have AUTH enabled on layer 2 port, don't recommend using port-security, as AUTH is a dynamic port security method in the end, you might run into weird challenges along the way. You either let those dongles get network access and face the consequences, or configure auth violation action to restrict traffic.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 22:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217076#M592804</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-29T22:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217160#M592807</link>
      <description>&lt;P&gt;no need port-security&amp;nbsp;&lt;BR /&gt;run&amp;nbsp;&lt;BR /&gt;host mode single host&amp;nbsp;&lt;BR /&gt;this make port accept one MAC per one Port for data domain&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you seem use multi-auth or multi-host that make problem&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 07:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217160#M592807</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-30T07:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217296#M592815</link>
      <description>I have to disagree with the point about host-mode. Host-mode will not prevent the problem of the endpoints generating spurious MAC addresses.  If anything, host-mode will err-disable the interface as soon as the 2nd MAC address comes along. Which will cut the user off. That’s not viable.&lt;BR /&gt;The problem cannot be solved by any config on the switch itself or the RADIUS server. It’s an endpoint issue.&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Oct 2024 10:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217296#M592815</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-30T10:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217300#M592816</link>
      <description>&lt;P&gt;But if he additional add authc violations restrict&amp;nbsp; the port will not go to err-disable.&lt;/P&gt;
&lt;P&gt;Correct me if I am wrong&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 10:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217300#M592816</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-30T10:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217325#M592822</link>
      <description>&lt;P&gt;The problem with detecting "violations" is that the Ethernet frames can arrive in any order - the arrival is non-deterministic. For example, assume that MAC address A0 is the valid one, and that A1-A255 are the invalid/spurious MAC addresses. Josh doesn't tell us when this problem occurs (i.e. immediately, or over a long period of time, or just randomly). Anyway ... the switch has no way of knowing that MAC address A0 is the only valid one - that's ISE's job.&amp;nbsp; So if MAC A1 arrives first, followed by A0, then the err-disable/violation kicks in. Err-disable or restrict has the same end result - the innocent end user is blocked. That is bad news. It's possible that this could happen, especially since we cannot control what order the endpoint generates the traffic - and - this is a genuine case, if a switch reboots while the endpoint is connected, you will have connected end stations still generating frames, and once the interfaces are ready to process frames, you will have no idea what frame is going to come first - A0 or A1-255. Hence, chances are you will lock up that interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trust me - I have been there and done that with customers who have ESXi servers on access layer. They didn't want to add a MAB entry into ISE for all the VMs, because it was a very dynamic environment, and MAB was the only auth method.&amp;nbsp; I thought I was smart by using multi-host mode (the vmKernel frames Authorize the interface, and the VM traffic piggy backs on that).&amp;nbsp; It all worked according to plan until someone rebooted the switch. After switch came up, the VMs are still sending traffic like crazy, and guess which frames arrives first ... and lock up the interface.&amp;nbsp; it gets even worse with NIC teaming, because the secondary interface is UP/UP (no MAC address) and only when NIC Teaming is activated, the first MAC address will arrive ... but which one?&amp;nbsp; You have no control over that. Bottom line ... don't use multi-host mode if you don't know the ORDER in which traffic will arrive to authorize the interface.&lt;/P&gt;
&lt;P&gt;Single-host mode is in a similar situation of falling foul of the non-determinism issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fix the end devices. Basta!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 11:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217325#M592822</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-30T11:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217382#M592832</link>
      <description>&lt;P&gt;I read about dongle in one of ISE cisco doc. But I forget where' if I found doc. I will share here.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 12:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217382#M592832</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-30T12:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217728#M592857</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291510"&gt;@Josh Morris&lt;/a&gt;&amp;nbsp;have you looked into firmware updates for the dock?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try that first. If still persists, then update the Ethernet Device drivers on your PC.&lt;/P&gt;
&lt;P&gt;A Dell laptop on a Dell dock should be using MAC passthrough mode, where the source Ethernet MAC address seen on the switch, is that contained in the laptop's BIOS. If passthrough is not enabled, then the MAC address of the dock would appear on the switch, which is not ideal.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a theory that these bogus endpoints are actually valid Ethernet frames from the host, but where the dock (or device driver) has overwritten the source MAC address with some random register value. You could run a circular buffer "monitor capture" on that interface and analyse in Wireshark, to see what data is actually contained in one of these frames that have weird source MAC addresses. If it looks like traffic from the PC (check the source IP address in Wireshark) then my theory could be correct.&lt;/P&gt;
&lt;P&gt;I would update things in this order, testing each time after each update to see what solved it (if that were the case)&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Dock FW&lt;/LI&gt;
&lt;LI&gt;PC BIOS update&lt;/LI&gt;
&lt;LI&gt;Ethernet Device Driver update (preferably from the PC vendor website, not Microsoft)&lt;/LI&gt;
&lt;LI&gt;Force a Windows Update&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Changing dock types/models might also resolve it - the device driver chosen for the Windows Ethernet Adapter is based on the chipset used in the dock (Realtek or Intel, etc)&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 21:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5217728#M592857</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-30T21:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5271131#M595471</link>
      <description>&lt;P&gt;Have also come across this with Apple Mac laptops and HP Docks, G2 shaped ones.&lt;BR /&gt;They can generate up to 4500 mac addresses on a port or just a few hundred.&lt;/P&gt;&lt;P&gt;As mentioned the only fix I've found is sometimes a firmware update on dock and laptop sometimes fixes it, if not replace the dock.&lt;/P&gt;&lt;P&gt;Pretty annoying to fluff around with a purge policy or manually deleting them.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2025 01:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5271131#M595471</guid>
      <dc:creator>Mark Potter</dc:creator>
      <dc:date>2025-03-14T01:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5344158#M598794</link>
      <description>&lt;P&gt;I too have been trying to figure out a way to purge these things.&amp;nbsp; Has anyone found a way to purge based upon authorization policy.&amp;nbsp; Seems that would be the only way to do it vs going and finding these manually.&amp;nbsp; All of these should land on your lowest MAB policy but doesn't see the endpoint purge can use that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 19:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5344158#M598794</guid>
      <dc:creator>ryanmbess</dc:creator>
      <dc:date>2025-11-03T19:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5359987#M599489</link>
      <description>&lt;P&gt;I have discovered that certain docks and USB to Ethernet dongles do this. You get hundreds, thousands or even 10's of thousands of MAC addresses all on one port. I think the highest I have seen was &amp;gt; 30,000!&lt;BR /&gt;&lt;BR /&gt;Swapping the docks/dongles for sensible non-brain damaged ones seems to fix the problem. I had another one only today, 11,000 MAC addresses on one port..&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2026 15:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5359987#M599489</guid>
      <dc:creator>barryvdean</dc:creator>
      <dc:date>2026-01-08T15:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5366894#M599705</link>
      <description>&lt;P&gt;Have you managed to reproduce the issue?&lt;/P&gt;
&lt;P&gt;how can you be sure that it is not a MAC address flooding attack?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 16:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5366894#M599705</guid>
      <dc:creator>Tal Elgrabli</dc:creator>
      <dc:date>2026-02-02T16:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: Bogus MAC addresses generated from docks/dongles</title>
      <link>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5542332#M600163</link>
      <description>&lt;P&gt;Reproducing this is not easy. I see them come and go and pop up all over the network. Ideally I need to get my hands on a faulty adaptor/dock and see if it reliably misbehaves or not. It seems to me that more and more equipment comes along that has poor quality network code/hardware. Spurious MAC addresses, 802.1x enabled with duff config that can't work, devices that can't DHCP!!! Devices that ignore DHCP NAK.&lt;BR /&gt;&lt;BR /&gt;When you enable NAC, it's like lifting a log in the woods, all kinds of nasty creepy crawlies emerge!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 08:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bogus-mac-addresses-generated-from-docks-dongles/m-p/5542332#M600163</guid>
      <dc:creator>barryvdean</dc:creator>
      <dc:date>2026-04-02T08:31:48Z</dc:date>
    </item>
  </channel>
</rss>

