<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am not able to locate the in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634196#M74311</link>
    <description>&lt;P&gt;I am not able to locate the item "&lt;STRONG style="font-size: 14.3999996185303px;"&gt;Yes, create matching Identity Group" &lt;/STRONG&gt;&lt;STRONG style="font-size: 14.3999996185303px;"&gt;when creating the identity group.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Could you advise the specific location? Thanks a lot.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jul 2015 08:18:41 GMT</pubDate>
    <dc:creator>y.lo</dc:creator>
    <dc:date>2015-07-20T08:18:41Z</dc:date>
    <item>
      <title>Wifi MAC authentication on ISE 1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634191#M74301</link>
      <description>&lt;P&gt;We are trying to configure ISE to authenticate&amp;nbsp;wifi user through WLC using MAC address.&lt;/P&gt;&lt;P&gt;ISE checks against internal endpoint identity store for authorized MAC address.&lt;/P&gt;&lt;P&gt;We found that the first time a wifi device&amp;nbsp;tries to connect (this MAC address has not yet been manually input in the internal endpoint identity store)&amp;nbsp;the authentication fails which is normal. However after this authentication failure, such MAC address will be automatically input in the internal endpoint identity store. So next time the same wifi device tries to connect the authentication will succeed.&lt;/P&gt;&lt;P&gt;How to configure ISE to prevent this from happening?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634191#M74301</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2019-03-11T05:29:41Z</dc:date>
    </item>
    <item>
      <title>An "authorized" mac address</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634192#M74303</link>
      <description>&lt;P&gt;An "authorized" mac address should be so, by putting it into a specific group in ISE manually, so that you have to move it there to allow it to connect. Then update your authz rule to only allow mac adresses from that specific internal group.&lt;/P&gt;&lt;P&gt;Just so we are clear, this is not for guest access right? Is it just an open ssid where you wan't to control what mac addresses are allowed on there ?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 18:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634192#M74303</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-02-25T18:37:18Z</dc:date>
    </item>
    <item>
      <title>Yes they are authorized and</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634193#M74306</link>
      <description>&lt;P&gt;Yes they are authorized and not guest. I already put them into a endpoint identity Group. However in the authorization policy I can only select the built-in default internal endpoint identity group, not the one I created. However can I select the one I created?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 01:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634193#M74306</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2015-02-26T01:54:38Z</dc:date>
    </item>
    <item>
      <title>Hi Daniel,Make sure that in</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634194#M74309</link>
      <description>&lt;P&gt;Hi Daniel,&lt;/P&gt;&lt;P&gt;Make sure that in your Authentication Policy for MAB, If the user not found, give the option as&lt;/P&gt;&lt;P&gt;Drop.&lt;/P&gt;&lt;P&gt;Try with that.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2015 06:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634194#M74309</guid>
      <dc:creator>krishnangangster</dc:creator>
      <dc:date>2015-03-01T06:00:00Z</dc:date>
    </item>
    <item>
      <title>When you create the identity</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634195#M74310</link>
      <description>&lt;P&gt;When you create the identity group that you want to use in profiling, make sure you select "&lt;STRONG&gt;Yes, create matching Identity Group".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The group will become available for selection in your policy.&lt;/P&gt;&lt;P&gt;Otherwise, as you've found,&amp;nbsp;every endpoint in the whole system will be allowed on by default.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 22:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634195#M74310</guid>
      <dc:creator>bikespace</dc:creator>
      <dc:date>2015-03-03T22:53:34Z</dc:date>
    </item>
    <item>
      <title>I am not able to locate the</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634196#M74311</link>
      <description>&lt;P&gt;I am not able to locate the item "&lt;STRONG style="font-size: 14.3999996185303px;"&gt;Yes, create matching Identity Group" &lt;/STRONG&gt;&lt;STRONG style="font-size: 14.3999996185303px;"&gt;when creating the identity group.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Could you advise the specific location? Thanks a lot.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 08:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634196#M74311</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2015-07-20T08:18:41Z</dc:date>
    </item>
    <item>
      <title>I tried giving the option as</title>
      <link>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634197#M74312</link>
      <description>&lt;P&gt;I tried giving the option as Drop, but the MAC address is still stored in the internal endpoint database. And thus next time the same device authenticates, the authentication is successful, which is not desired.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 08:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wifi-mac-authentication-on-ise-1-3/m-p/2634197#M74312</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2015-07-20T08:20:27Z</dc:date>
    </item>
  </channel>
</rss>

