<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BOYD with IOS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365956#M599665</link>
    <description>&lt;P&gt;I know your mac randomization is answered but on a separate note, won't recommend doing BYOD, it's not as smooth as it used to be because of all added security, I did it recently for a customer and users had to go through about 20 clicks before they are issued a cert and can connect, back in the day it use to be about 6 clicks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jan 2026 03:41:30 GMT</pubDate>
    <dc:creator>Ambuj M</dc:creator>
    <dc:date>2026-01-29T03:41:30Z</dc:date>
    <item>
      <title>BOYD with IOS</title>
      <link>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365940#M599663</link>
      <description>&lt;P&gt;Dear all ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have problem with BOYD with IOS&amp;nbsp;&lt;/P&gt;&lt;P&gt;i implement BYOD with Dual SSID&amp;nbsp; with mscap not tls (customer need &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;)and in the authiz policy i put condition the endpoint must be in the group called registered device .&lt;/P&gt;&lt;P&gt;the problem is when the user try to reg for the guest SSID he regi with mac address than when he redirect to the new SSID he use another mac address that not reg .. i&amp;nbsp; solve this problem by edit the setting of the phone to use off in the mac address ..&lt;/P&gt;&lt;P&gt;is there any another solution i can make from ISE side ?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SaeedAbdElhalimHamada_0-1769649419238.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/258768i97BE93469ED8DE5A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SaeedAbdElhalimHamada_0-1769649419238.png" alt="SaeedAbdElhalimHamada_0-1769649419238.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 01:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365940#M599663</guid>
      <dc:creator>Saeed Abd Elhalim Hamada</dc:creator>
      <dc:date>2026-01-29T01:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: BOYD with IOS</title>
      <link>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365951#M599664</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/random-mac-address-how-to-deal-with-it-using-ise/ta-p/4049321" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/random-mac-address-how-to-deal-with-it-using-ise/ta-p/4049321&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 02:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365951#M599664</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2026-01-29T02:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: BOYD with IOS</title>
      <link>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365956#M599665</link>
      <description>&lt;P&gt;I know your mac randomization is answered but on a separate note, won't recommend doing BYOD, it's not as smooth as it used to be because of all added security, I did it recently for a customer and users had to go through about 20 clicks before they are issued a cert and can connect, back in the day it use to be about 6 clicks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 03:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5365956#M599665</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2026-01-29T03:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: BOYD with IOS</title>
      <link>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5366094#M599670</link>
      <description>&lt;P&gt;Exactly this ^ Never attempt BYOD in 2026. OS vendors have (correctly) implemented security controls that essentially make BYOD on modern endpoints a non-starter. Use an MDM instead.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 16:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/boyd-with-ios/m-p/5366094#M599670</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2026-01-29T16:11:06Z</dc:date>
    </item>
  </channel>
</rss>

