<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port security in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-security/m-p/5081069#M1111750</link>
    <description>&lt;P&gt;Port-security is not a good solution for what you / your CTO wants to do,&amp;nbsp; I would suggest looking into using ISE and 802.1x.&amp;nbsp; A much better and scaleable solution.&lt;/P&gt;</description>
    <pubDate>Sun, 28 Apr 2024 12:55:15 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-04-28T12:55:15Z</dc:date>
    <item>
      <title>Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080311#M1111716</link>
      <description>&lt;P&gt;Dears&amp;nbsp;&lt;/P&gt;&lt;P&gt;our CTO wants the whole company mac address to be added in a port security so that nobody outside the company&amp;nbsp;can access our network, is there any alternative solution for adding all the mac addresses manually.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 11:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080311#M1111716</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-27T11:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080314#M1111717</link>
      <description>&lt;P&gt;the solution is MAB&amp;nbsp;&lt;/P&gt;
&lt;P&gt;adding MAC is not prevent other MAC from ADD&lt;BR /&gt;adding MAC in port security will force only these MAC to use specific port&lt;/P&gt;
&lt;P&gt;solution is MAB if the MAC not found in radius the access is deny&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 11:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080314#M1111717</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-27T11:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080317#M1111719</link>
      <description>&lt;P&gt;Randomize MAC address is going to wreck that plan.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 11:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080317#M1111719</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2024-04-27T11:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080318#M1111720</link>
      <description>&lt;P&gt;There&amp;nbsp; command to disable MAC learn under vlan' but I never test before' I will try it in my lab abd update you.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 11:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080318#M1111720</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-27T11:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080321#M1111722</link>
      <description>&lt;P&gt;I would really appreciate it&amp;nbsp;&lt;/P&gt;&lt;P&gt;waiting for your feedback&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 11:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080321#M1111722</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-27T11:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5080960#M1111745</link>
      <description>&lt;P&gt;Network access control (NAC) is the general term for such measures. Cisco's product that does this is Identity Services Engine (ISE).&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 09:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5080960#M1111745</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-28T09:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5081069#M1111750</link>
      <description>&lt;P&gt;Port-security is not a good solution for what you / your CTO wants to do,&amp;nbsp; I would suggest looking into using ISE and 802.1x.&amp;nbsp; A much better and scaleable solution.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 12:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5081069#M1111750</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-28T12:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Port security</title>
      <link>https://community.cisco.com/t5/network-security/port-security/m-p/5095123#M1112265</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 08:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-security/m-p/5095123#M1112265</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-05-09T08:51:41Z</dc:date>
    </item>
  </channel>
</rss>

