<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have never been a fan of in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535253#M73151</link>
    <description>&lt;P&gt;I have never been a fan of trying to lock down things via mac addresses since mac addresses can be easily spoofed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are already using PEAP and if your machines are part of AD then an easier and more secure solution would be to use "Machine (PEAP)" based authentication. That way ISE will consult with AD and confirm that the authenticating machine is both joined to the domain and enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2014 17:34:45 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2014-09-12T17:34:45Z</dc:date>
    <item>
      <title>User + Mac Address Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535249#M73137</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any option to bind a user who is authorized correctly from external identity with the mac-address of his workstation ?&lt;/P&gt;&lt;P&gt;The point is to give him access to the network only from a specific Workstation and denied him from any other workstation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535249#M73137</guid>
      <dc:creator>christoulakis</dc:creator>
      <dc:date>2019-03-11T05:00:50Z</dc:date>
    </item>
    <item>
      <title>Couple of questions:1. What</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535250#M73140</link>
      <description>&lt;P&gt;Couple of questions:&lt;/P&gt;&lt;P&gt;1. What type of Radius server are you using?&lt;/P&gt;&lt;P&gt;2. When do you want the "binding" to happen? During the authorization process or do you want to manually specify the mac address for every single user?&lt;/P&gt;&lt;P&gt;3. What type of authentication are you using? PEAP, EAP-TLS, etc?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 21:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535250#M73140</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-11T21:49:00Z</dc:date>
    </item>
    <item>
      <title>  1.  ISE 1.2 is having the</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535251#M73143</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;1.&amp;nbsp; ISE 1.2 is having the role of Radius&lt;/P&gt;&lt;P&gt;&amp;nbsp;2. Really i don't know I guess the binding should be happen before the login as i don't want the user to login from any other PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The key point on this scenario is a user to&lt;STRONG&gt; login &lt;/STRONG&gt;on the corporate wired network &lt;STRONG&gt;only &lt;/STRONG&gt;from his PC (User+MAC) and &lt;STRONG&gt;denied from any other PC&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;If you want describe me both ways to understand which might fit in my case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;3. The PC has the native supplicant of Windows and authenticated through PEAP MS CHAPv2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2014 06:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535251#M73143</guid>
      <dc:creator>christoulakis</dc:creator>
      <dc:date>2014-09-12T06:14:21Z</dc:date>
    </item>
    <item>
      <title>is the user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535252#M73147</link>
      <description>&lt;P&gt;is the user authentication referencing &amp;nbsp;AD?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2014 16:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535252#M73147</guid>
      <dc:creator>KiloBravo</dc:creator>
      <dc:date>2014-09-12T16:31:27Z</dc:date>
    </item>
    <item>
      <title>I have never been a fan of</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535253#M73151</link>
      <description>&lt;P&gt;I have never been a fan of trying to lock down things via mac addresses since mac addresses can be easily spoofed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are already using PEAP and if your machines are part of AD then an easier and more secure solution would be to use "Machine (PEAP)" based authentication. That way ISE will consult with AD and confirm that the authenticating machine is both joined to the domain and enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2014 17:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535253#M73151</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-12T17:34:45Z</dc:date>
    </item>
    <item>
      <title>Hello,Yes!!! I will agree</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535254#M73153</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes!!! I will agree that mac is an easy way of spoofing. but i' m trying to find my options on this scenario.&lt;/P&gt;&lt;P&gt;The group will consist of 2 users that will be part of my domain. (probably on these specific users I should deploy MAR)??&lt;/P&gt;&lt;P&gt;But another one that will work with team will be external support and he will be coming with his laptop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 14 Sep 2014 06:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535254#M73153</guid>
      <dc:creator>christoulakis</dc:creator>
      <dc:date>2014-09-14T06:28:49Z</dc:date>
    </item>
    <item>
      <title>MAR is also not ideal as it</title>
      <link>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535255#M73155</link>
      <description>&lt;P&gt;MAR is also not ideal as it comes with tons of limitations &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; In addition, it also uses the MAC address of the machine as the username which is sent in plain text &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; So I would not recommend MAR.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why don't you try PEAP machine based authentication? This will allow only domain joined (corporate owned) computers to authenticate. If the computer is not part of the domain, authentication will fail.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2014 15:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-mac-address-authorization-policy/m-p/2535255#M73155</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-15T15:01:25Z</dc:date>
    </item>
  </channel>
</rss>

