<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using mac-adresses for authentication in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066467#M140370</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That doesn't really solve a security solution.  In many of my hospital installations, there are more than 100+ devices that don't support 802.1x. So if you have to settle with PSK or even WEP on some devices, these can't be referenced by radius so now you have to enter the Mac address in each wlc you have.  If that's what you need to do to satisfy a requirement then that is what you will have to do.  The main issue is that PSK, WEP and Mac authentication doesn't pass audits if you ever have to get a network audit.  Just giving my opinion from my experience. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Sep 2012 08:38:31 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2012-09-11T08:38:31Z</dc:date>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066459#M140362</link>
      <description>&lt;P&gt;How do we configure our controllers/radius-servers to use MAC-addresses instead of authenticate against a certain group in the AD? We would, if possible, like to combine these two ways of authentication in on SSID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're running 7.0.116.0 on our controllers (5500-series) and our radius-servers are one W2k8 and one W2k3.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 05:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066459#M140362</guid>
      <dc:creator>Nevyn Bergstrom</dc:creator>
      <dc:date>2021-07-04T05:38:25Z</dc:date>
    </item>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066460#M140363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nevyn:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can combain both security methods.&lt;/P&gt;&lt;P&gt;What you need to do is to configure the WLAN to use mac authentication (it is only checkbox under security Layer 2 tab) and also to configure the allowed mac addresses on the radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is a doc: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://tiny.cc/2pyekw"&gt;http://tiny.cc/2pyekw&lt;/A&gt;&lt;SPAN&gt; (the link sends you directly to the radius config but you can read the whole doc).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your situation, just mark the checkbox of mac filtering on the SSID and add the allowed macs to the radius. keep hte WPA2+802.1x config the same. This way you will use both security methods.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2012 09:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066460#M140363</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2012-09-10T09:49:44Z</dc:date>
    </item>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066461#M140364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't happen to know how to do it in a microsoft environment?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2012 10:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066461#M140364</guid>
      <dc:creator>Nevyn Bergstrom</dc:creator>
      <dc:date>2012-09-10T10:12:26Z</dc:date>
    </item>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066462#M140365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With microsoft radius it is the same. You need to add users to the radius server; the username and the password both should be the mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2012 10:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066462#M140365</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2012-09-10T10:19:57Z</dc:date>
    </item>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066463#M140366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nevyn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How many devices are you doing mac filters for, Im just curiuos. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 04:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066463#M140366</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-09-11T04:56:59Z</dc:date>
    </item>
    <item>
      <title>Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066464#M140367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a start, about 20 but unfortionatly it is probably going to grow as we deploy .1x on the wired network aswell as the wireless. &lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; In the end? Who knows... Maybe 50, maybe 100, maybe more... &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 06:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066464#M140367</guid>
      <dc:creator>Nevyn Bergstrom</dc:creator>
      <dc:date>2012-09-11T06:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066465#M140368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my opinion....There is no need to deloy mac authentication if your going to do 802.1x.  I never tell my customers todo this and if they do think they need it, well in the end they don't.  Mac authentication isn't a security method in my book and it's a management nightmare. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 07:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066465#M140368</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-09-11T07:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066466#M140369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately we've got a bunch of devises where it's not possible to use 802.1x. I'm working at a hospital and there are medical equipment which needs to be connected to the network but where it isn't an alternative to use our regular type of authentication. When we start deploying 802.1x on the wired network we won't have the alternative (as we do today) of saying that if a device can't handle 802.1x, WPA2 and 5GHz we won't let it onto our network. We &lt;STRONG&gt;need &lt;/STRONG&gt;to find a solution...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 08:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066466#M140369</guid>
      <dc:creator>Nevyn Bergstrom</dc:creator>
      <dc:date>2012-09-11T08:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066467#M140370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That doesn't really solve a security solution.  In many of my hospital installations, there are more than 100+ devices that don't support 802.1x. So if you have to settle with PSK or even WEP on some devices, these can't be referenced by radius so now you have to enter the Mac address in each wlc you have.  If that's what you need to do to satisfy a requirement then that is what you will have to do.  The main issue is that PSK, WEP and Mac authentication doesn't pass audits if you ever have to get a network audit.  Just giving my opinion from my experience. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 08:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066467#M140370</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-09-11T08:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066468#M140371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I work for a large hsp system as well. PSK will past some audits, it all depends how you manage the key. For exmaple, we use wavelink to push keys to our cisco phones, no one knows the key only me, phones and the wlc. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would get away from MAC before it gets to big. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;__________________________________________________________________________________________ &lt;BR /&gt;"Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 16:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066468#M140371</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-09-11T16:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using mac-adresses for authentication</title>
      <link>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066469#M140372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On wireless we might manage to avoid MAC-authentication altogether. The possible exception is about 20 devices which can handle our network as it is today but where all the default policies on our domain causes a lot of extra work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the wired network we haven't got any protection what so ever today. We have now started the process of separating out critical equipment and try telling a CT-scanner (I work at a hospital) that it's got to use certificates &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; The plan for all regular computers is to use the same (though slightly modified) policy as we're using for wireless today but that leaves all the "weird" medical devices which don't have antivirus, can't handle certificates and generally don't do security... In the end the medical equipment will end up on one set of vlans and the regular computers on another with a firewall regulating access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we're starting with the wireless I asked here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 05:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/using-mac-adresses-for-authentication/m-p/2066469#M140372</guid>
      <dc:creator>Nevyn Bergstrom</dc:creator>
      <dc:date>2012-09-12T05:51:02Z</dc:date>
    </item>
  </channel>
</rss>

