<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mac Filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mac-filtering/m-p/4096144#M1070664</link>
    <description>Hi,&lt;BR /&gt;It sounds like you want to do MAB (MAC Authentication Bypass) on the switch interfaces. If you use Cisco ISE, this can store the MAC addresses in it's Endpoint database, you can then create authorisation rules based on MAC addresses being present in the database or group membership and permit network access.&lt;BR /&gt;&lt;BR /&gt;Non-Admins can be delegated control to add MAC addresses to the database.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Tue, 02 Jun 2020 13:07:54 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-06-02T13:07:54Z</dc:date>
    <item>
      <title>Mac Filtering</title>
      <link>https://community.cisco.com/t5/network-security/mac-filtering/m-p/4096065#M1070662</link>
      <description>&lt;P&gt;We have Cisco 3750 switches throughout which we want to implement mac filtering. Is it possible to setup mac filtering to retrieve its allowed list from an external source. The reason is so technicians who dont understand Cisco can maintain the access list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 10:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mac-filtering/m-p/4096065#M1070662</guid>
      <dc:creator>sprocket10</dc:creator>
      <dc:date>2020-06-02T10:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Filtering</title>
      <link>https://community.cisco.com/t5/network-security/mac-filtering/m-p/4096144#M1070664</link>
      <description>Hi,&lt;BR /&gt;It sounds like you want to do MAB (MAC Authentication Bypass) on the switch interfaces. If you use Cisco ISE, this can store the MAC addresses in it's Endpoint database, you can then create authorisation rules based on MAC addresses being present in the database or group membership and permit network access.&lt;BR /&gt;&lt;BR /&gt;Non-Admins can be delegated control to add MAC addresses to the database.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 02 Jun 2020 13:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mac-filtering/m-p/4096144#M1070664</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-06-02T13:07:54Z</dc:date>
    </item>
  </channel>
</rss>

