<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO security-port Switch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4617967#M1090431</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The best way is to use ISE which will be the database and in which you can import all your mac addresses or use authentication methodologies other than mac.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;on older switches, VMPS was used as the ancestor of the mab authentication.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Thu, 26 May 2022 02:37:22 GMT</pubDate>
    <dc:creator>Translator</dc:creator>
    <dc:date>2022-05-26T02:37:22Z</dc:date>
    <item>
      <title>CISCO security-port Switch</title>
      <link>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613176#M1090225</link>
      <description>&lt;P&gt;Information on securing CISCO switchports.&lt;/P&gt;
&lt;P&gt;I saw that it was possible to set more than one additional MAC address for a port, and if another MAC address connects, the packets are blocked.&lt;/P&gt;
&lt;P&gt;Unfortunately I have a lot of PCs and servers, which becomes too long to enter all MAC addresses on each port. In addition, many PCs are rented, so a considerable number of MAC addresses would have to be changed.&lt;/P&gt;
&lt;P&gt;Is it possible to connect a switch to a database, file or other that contains a list of MAC addresses that will be allowed on each port?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 15:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613176#M1090225</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-05-19T15:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO security-port Switch</title>
      <link>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613191#M1090226</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1244652"&gt;@Translator&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1349241"&gt;@blaucournet&lt;/a&gt;&amp;nbsp; you can use Cisco ISE with MAC Authentication Bypass (MAB).&lt;/P&gt;
&lt;P&gt;You can create an endpoint identity group in ISE of MAC addresses and permit/deny traffic accordingly.&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 15:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613191#M1090226</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-05-19T15:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO security-port Switch</title>
      <link>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613646#M1090245</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1244652"&gt;@Translator&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1349241"&gt;@blaucournet&lt;/a&gt;&amp;nbsp; As I believe you can not connect switch with database for the mac filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. you can set the Max mac limit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;example :-Switch(config-if)# &lt;STRONG&gt;switchport port-security maximum 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for achieve your goal you have to put other solution like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;have suggest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 05:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4613646#M1090245</guid>
      <dc:creator>Jitendra Kumar</dc:creator>
      <dc:date>2022-05-20T05:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO security-port Switch</title>
      <link>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4617967#M1090431</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The best way is to use ISE which will be the database and in which you can import all your mac addresses or use authentication methodologies other than mac.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;on older switches, VMPS was used as the ancestor of the mab authentication.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 02:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-security-port-switch/m-p/4617967#M1090431</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-05-26T02:37:22Z</dc:date>
    </item>
  </channel>
</rss>

