<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I haven't done it with ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542456#M72850</link>
    <description>&lt;P&gt;I haven't done it with ACS but it should be similar to ISE:&lt;/P&gt;&lt;P&gt;1. You configure your WLAN settings with the appropriate 802.1x settings. However, in addition, under &amp;gt;Security &amp;gt; Layer 2 &amp;gt; You need to check "Mac Filtering." Then under the AAA servers tab, make sure that your ISE server(s) is listed under both authentication and accounting&lt;/P&gt;&lt;P&gt;2. In ACS, you will need to:&lt;/P&gt;&lt;P&gt;2.1. Create an Identity Store Sequence that includes both AD and Internal Endpoints/hosts&lt;/P&gt;&lt;P&gt;2.2. Create all of the hosts/static MACs under Users and Identity Stores &amp;gt; Internal Identity Stores &amp;gt; Hosts&lt;/P&gt;&lt;P&gt;2.3. Create an Authentication policy that allows MAB (PAP/ASCII &amp;gt; Detec PAP as Host Lookup) and the protocol that you are using for AD authentication (Usually PEAP or EAP-MD5). The policy should be using the previously created Identity Store Sequence that includes both AD and Internal Hosts&lt;/P&gt;&lt;P&gt;2.3. Create an Authorization policy that checks for both the membership of an AD group (For instance, domain computers or domain users) AND for device membership in "Local Hosts"&lt;/P&gt;&lt;P&gt;2.4. Return an "Authorization Profile" with desired permissions&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Sep 2014 06:38:40 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2014-09-30T06:38:40Z</dc:date>
    <item>
      <title>Dual Authentication with MAC and radius server</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542448#M72840</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can any one clarify whether we can do the MAC address authentication and the Radius server authentication in the Wireless network. In my network i have WLC, ACS and AD server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jayaprakash.K.V&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542448#M72840</guid>
      <dc:creator>jayapraki</dc:creator>
      <dc:date>2019-03-11T05:03:54Z</dc:date>
    </item>
    <item>
      <title>What do you mean by "Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542449#M72842</link>
      <description>&lt;P&gt;What do you mean by "Radius Server Authentication" ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Sep 2014 07:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542449#M72842</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-26T07:00:09Z</dc:date>
    </item>
    <item>
      <title>I mean the AD authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542450#M72844</link>
      <description>&lt;P&gt;I mean the AD authentication.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Sep 2014 07:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542450#M72844</guid>
      <dc:creator>jayapraki</dc:creator>
      <dc:date>2014-09-26T07:05:35Z</dc:date>
    </item>
    <item>
      <title>Ah ok :) So yes, you should</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542451#M72845</link>
      <description>&lt;P&gt;Ah ok &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; So yes, you should be able to perform your user or machine based authentication against AD and also check the MAC address against the database of your Radius server. I have personally done this with both ISE and ACS. In the WLC you will set your regular 802.1x settings and also check "mac filtering." Then you have to make sure that your Radius servers are configured on the WLC and set to be used by that SSD, otherwise the mac filtering mechanism will use the WCL's local database.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2014 09:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542451#M72845</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-28T09:07:50Z</dc:date>
    </item>
    <item>
      <title>Thank you Neno Spasov.  Will</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542452#M72846</link>
      <description>&lt;P&gt;Thank you Neno Spasov.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will this work without ISE. Can you please share any relevent document.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 04:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542452#M72846</guid>
      <dc:creator>jayapraki</dc:creator>
      <dc:date>2014-09-29T04:58:10Z</dc:date>
    </item>
    <item>
      <title>What do you plan to use for</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542453#M72847</link>
      <description>&lt;P&gt;What do you plan to use for Radius server?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 06:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542453#M72847</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-29T06:25:22Z</dc:date>
    </item>
    <item>
      <title>I am using ACS 4.3 and</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542454#M72848</link>
      <description>&lt;P&gt;I am using ACS 4.3 and planning to upgrade to 5.3 now.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 06:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542454#M72848</guid>
      <dc:creator>jayapraki</dc:creator>
      <dc:date>2014-09-29T06:28:11Z</dc:date>
    </item>
    <item>
      <title>Tips to make Machine</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542455#M72849</link>
      <description>&lt;P&gt;Tips to make Machine Authentication Work - PEAP Authentication&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/87611/tips-make-machine-authentication-work-peap-authentication&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 15:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542455#M72849</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-09-29T15:58:28Z</dc:date>
    </item>
    <item>
      <title>I haven't done it with ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542456#M72850</link>
      <description>&lt;P&gt;I haven't done it with ACS but it should be similar to ISE:&lt;/P&gt;&lt;P&gt;1. You configure your WLAN settings with the appropriate 802.1x settings. However, in addition, under &amp;gt;Security &amp;gt; Layer 2 &amp;gt; You need to check "Mac Filtering." Then under the AAA servers tab, make sure that your ISE server(s) is listed under both authentication and accounting&lt;/P&gt;&lt;P&gt;2. In ACS, you will need to:&lt;/P&gt;&lt;P&gt;2.1. Create an Identity Store Sequence that includes both AD and Internal Endpoints/hosts&lt;/P&gt;&lt;P&gt;2.2. Create all of the hosts/static MACs under Users and Identity Stores &amp;gt; Internal Identity Stores &amp;gt; Hosts&lt;/P&gt;&lt;P&gt;2.3. Create an Authentication policy that allows MAB (PAP/ASCII &amp;gt; Detec PAP as Host Lookup) and the protocol that you are using for AD authentication (Usually PEAP or EAP-MD5). The policy should be using the previously created Identity Store Sequence that includes both AD and Internal Hosts&lt;/P&gt;&lt;P&gt;2.3. Create an Authorization policy that checks for both the membership of an AD group (For instance, domain computers or domain users) AND for device membership in "Local Hosts"&lt;/P&gt;&lt;P&gt;2.4. Return an "Authorization Profile" with desired permissions&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 06:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542456#M72850</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-30T06:38:40Z</dc:date>
    </item>
    <item>
      <title>Thank a lot  Neno. I will try</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542457#M72851</link>
      <description>&lt;P&gt;Thank a lot &amp;nbsp;Neno. I will try and update the same.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 06:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542457#M72851</guid>
      <dc:creator>jayapraki</dc:creator>
      <dc:date>2014-09-30T06:45:50Z</dc:date>
    </item>
    <item>
      <title>No problem. Btw, a couple of</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542458#M72852</link>
      <description>&lt;P&gt;No problem. Btw, a couple of corrections:&lt;/P&gt;&lt;P&gt;1. The identity store sequence does NOT need to include "internal hosts" I just tested this (ISE only again) and AD only is OK. I believe you need this if you are going to do regular MAB&lt;/P&gt;&lt;P&gt;2. The SSID does not need to have "Mac Filtering" checked. Again, I just tested this in my lab with ISE and can confirm that it is not needed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everything else should be OK &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I would test this with ACS but my lab is not integrated with it yet and I don't currently have time to do it. Maybe later in the week if time allows. Anyways, give it a try and see how far you can get. The nice thing about ACS 5 vs 4 is that you get a lot more log info so troubleshooting is much easier.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 07:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/2542458#M72852</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-30T07:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: No problem. Btw, a couple of</title>
      <link>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/3678916#M72853</link>
      <description>&lt;P&gt;Hi nspasov,&lt;BR /&gt;Could you please help me to et tup 802.1x with MAC filtering&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. I configured a SSID with 802.1x&lt;/P&gt;
&lt;P&gt;2. Configured ISE rules&lt;/P&gt;
&lt;P&gt;Authentication for : MAB&lt;/P&gt;
&lt;P&gt;Autz: wireless dot1x and PEAP and Identity Group EQUALS TEST&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test is where my mac address is stored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but still it not working...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 07:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dual-authentication-with-mac-and-radius-server/m-p/3678916#M72853</guid>
      <dc:creator>ittechk4u1</dc:creator>
      <dc:date>2018-08-01T07:41:33Z</dc:date>
    </item>
  </channel>
</rss>

