<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This What I tried so far ,The in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540684#M73295</link>
    <description>&lt;P&gt;This What I tried so far&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The Authentication is work fine but the Authorization failed.&lt;/P&gt;&lt;P&gt;If any and&amp;nbsp;radius:user name equals radius:calling stations-ID then permitAccess,&lt;/P&gt;&lt;P&gt;or this one:&lt;/P&gt;&lt;P&gt;If any and&amp;nbsp;radius:calling stations-ID&amp;nbsp;equals certificate:Subject-email(this filed is configure to mac-address) then&amp;nbsp;permitAccess,&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Lee.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 09 Sep 2014 12:18:01 GMT</pubDate>
    <dc:creator>leemaclalit</dc:creator>
    <dc:date>2014-09-09T12:18:01Z</dc:date>
    <item>
      <title>How to Implementing  ise 1.2 authentication user name against mac address</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540678#M73285</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P style="margin: 0cm 0cm 8pt; text-align: left; unicode-bidi: embed; direction: ltr;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;My organization wants to authenticate medical devices with certificate.&lt;/FONT&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 8pt; text-align: left; unicode-bidi: embed; direction: ltr;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;What I'm trying to do is on the certificate the name of the user will be his mac address,&lt;/FONT&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 8pt; text-align: left; unicode-bidi: embed; direction: ltr;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;And the ise policy will be if the user name equal to mac address than he authenticate.&lt;/FONT&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 8pt; text-align: left; unicode-bidi: embed; direction: ltr;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;Until now I didn’t succeed.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="line-height: 107%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: HE;"&gt;Is it possible? &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Lee.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540678#M73285</guid>
      <dc:creator>leemaclalit</dc:creator>
      <dc:date>2019-03-11T04:59:23Z</dc:date>
    </item>
    <item>
      <title>It sounds like you are trying</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540679#M73288</link>
      <description>&lt;P&gt;It sounds like you are trying to do two different things.&lt;/P&gt;&lt;P&gt;The certificate can be done through 802.1x using peap &amp;nbsp; I dont know if your devices can handle dot1x so if not they can use MAB. &amp;nbsp;Far less secure but if its a low level device like a printer that has limited input capability then you are stuck with MAB. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you could do with MAB is use the OUI and some other identifying information (if available) like device host names (This can be derived from DHCP&amp;nbsp;i believe) and possibly av pairs (RADIUS) to help profile the devices. &amp;nbsp;These can be put into a custom endpoint profile that is given a specific authorization rule.&lt;/P&gt;&lt;P&gt;The whole point is to try to isolate certain types of equipment so that only they get the custom&amp;nbsp;authz rule&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this make sense? &amp;nbsp;Im shooting a little blind here without more info.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2014 02:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540679#M73288</guid>
      <dc:creator>nathan demers</dc:creator>
      <dc:date>2014-09-03T02:16:28Z</dc:date>
    </item>
    <item>
      <title>If I am understanding this</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540680#M73290</link>
      <description>&lt;P&gt;If I am understanding this correctly you are trying to perform EAP-TLS authentication and you want the x509 principle username to be the MAC address of the authenticating device? Is that correct?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2014 07:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540680#M73290</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-03T07:04:58Z</dc:date>
    </item>
    <item>
      <title>Thanks for your reply,This</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540681#M73291</link>
      <description>&lt;P dir="LTR"&gt;Thanks for your reply,&lt;/P&gt;&lt;P dir="LTR"&gt;This exactly what I'm trying to figure.&lt;/P&gt;&lt;P&gt;On the email field in the certificate I putted the mac-address of the device.&lt;/P&gt;&lt;P&gt;And on my ISE I checked this field as the user name x509.&lt;/P&gt;&lt;P dir="LTR"&gt;I attached an image from my ISE.&lt;/P&gt;&lt;P dir="LTR"&gt;You can see that the user name and the mac address are the same.&lt;/P&gt;&lt;P&gt;The problem is that I can't authenticate them as I want:&lt;/P&gt;&lt;P&gt;User name=mac address.&amp;nbsp;&lt;/P&gt;&lt;P dir="LTR"&gt;Lee. &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Sep 2014 09:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540681#M73291</guid>
      <dc:creator>leemaclalit</dc:creator>
      <dc:date>2014-09-07T09:40:37Z</dc:date>
    </item>
    <item>
      <title>It looks like your</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540682#M73292</link>
      <description>&lt;P&gt;It looks like your Authorization Profile isn't formed to properly catch the "username" part. Can you share your Policy section with the AuthZ profile?&lt;/P&gt;</description>
      <pubDate>Sun, 07 Sep 2014 22:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540682#M73292</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-09-07T22:33:23Z</dc:date>
    </item>
    <item>
      <title>I agree with Marvin, we need</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540683#M73293</link>
      <description>&lt;P&gt;I agree with Marvin, we need some more info. If possible please paste some screenshots of your authorization policy and details of the conditions/results.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 11:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540683#M73293</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-09T11:12:38Z</dc:date>
    </item>
    <item>
      <title>This What I tried so far ,The</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540684#M73295</link>
      <description>&lt;P&gt;This What I tried so far&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The Authentication is work fine but the Authorization failed.&lt;/P&gt;&lt;P&gt;If any and&amp;nbsp;radius:user name equals radius:calling stations-ID then permitAccess,&lt;/P&gt;&lt;P&gt;or this one:&lt;/P&gt;&lt;P&gt;If any and&amp;nbsp;radius:calling stations-ID&amp;nbsp;equals certificate:Subject-email(this filed is configure to mac-address) then&amp;nbsp;permitAccess,&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Lee.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 12:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540684#M73295</guid>
      <dc:creator>leemaclalit</dc:creator>
      <dc:date>2014-09-09T12:18:01Z</dc:date>
    </item>
    <item>
      <title>I'm in an ISE class this week</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540685#M73297</link>
      <description>&lt;P&gt;I'm in an ISE class this week and it was suggested to me that you should configure and use a Certificate Authentication Profile (found under Administration, Identity Management, External Identity Sources). Then use that profile in your policy.&lt;/P&gt;&lt;P&gt;You may need to use a field other than email address as the ISE PSN may do some&amp;nbsp;&amp;nbsp;validation checking to look for a well-formed email address (i.e with an "@" sign in the attribute).&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 15:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540685#M73297</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-09-09T15:56:56Z</dc:date>
    </item>
    <item>
      <title>The authentication process is</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540686#M73298</link>
      <description>&lt;P&gt;The &lt;STRONG&gt;authentication&amp;nbsp;&lt;/STRONG&gt;process is definitely failing (based on the screenshot that you posted). Before I can provide more help I will need screen shots showing all details around the&amp;nbsp;&lt;STRONG&gt;Policy Set&amp;nbsp;&lt;/STRONG&gt;that you are using.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 20:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540686#M73298</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-09T20:49:15Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,I already did it.</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540687#M73299</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;I already did it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Why I can see the username as my Mac address from the specified field of the email.&lt;/P&gt;&lt;P&gt;If you see the first picture that I upload, you&amp;nbsp;can see that the ISE recognize the user id as the Mac-address.&lt;/P&gt;&lt;P&gt;this is not the problem.&lt;/P&gt;&lt;P&gt;what i'm trying to do is to "lock" device to Certificate because i don't want That someone will install that certificate on another device.&lt;/P&gt;&lt;P&gt;If anyone have any idea how to do this it I'l be grateful.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Lee.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 12:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540687#M73299</guid>
      <dc:creator>leemaclalit</dc:creator>
      <dc:date>2014-09-10T12:14:12Z</dc:date>
    </item>
    <item>
      <title>You first asked about how to</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540688#M73300</link>
      <description>&lt;P&gt;You first asked about how to avoid failing authorization. Now you mention wanting to lock the use of that certificate to a specific device. Those are two separate issues.&lt;/P&gt;&lt;P&gt;For the first, please share the results of your authorization from the Operations page.&lt;/P&gt;&lt;P&gt;For the second, you should be able to make a compound condition using both the certificate and information from a profiling source that will include the actual MAC address. Several sources can give you this - DHCP profiling, RADIUS accounting, IOS sensor etc. Which to use depends on your environment's capabilities and design.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 23:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implementing-ise-1-2-authentication-user-name-against-mac/m-p/2540688#M73300</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-09-10T23:01:36Z</dc:date>
    </item>
  </channel>
</rss>

