<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Forescout Mac Filtering Security and Web Policy in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3846868#M22182</link>
    <description>&lt;P&gt;The rule of thumb is or was the wlan being anchored must be identical on both foreign and anchor, correct? Third party AAA(forescout) is wanting layer 2 security mac filtering on foreign and layer 3 security on anchor(that would mean wlans are not identical in configs). If one configures layer 2 mac filtering on wlan, and layer 3 web policy is not enabled how would clients know it's a WebAuth or can both layer 2 and 3 be configured for the same wlan?&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 17:17:58 GMT</pubDate>
    <dc:creator>Nana Banahene</dc:creator>
    <dc:date>2021-07-05T17:17:58Z</dc:date>
    <item>
      <title>Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3846868#M22182</link>
      <description>&lt;P&gt;The rule of thumb is or was the wlan being anchored must be identical on both foreign and anchor, correct? Third party AAA(forescout) is wanting layer 2 security mac filtering on foreign and layer 3 security on anchor(that would mean wlans are not identical in configs). If one configures layer 2 mac filtering on wlan, and layer 3 web policy is not enabled how would clients know it's a WebAuth or can both layer 2 and 3 be configured for the same wlan?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 17:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3846868#M22182</guid>
      <dc:creator>Nana Banahene</dc:creator>
      <dc:date>2021-07-05T17:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847022#M22183</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Nana Banahene,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, Both anchor and Foreign should have the same configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if you are using Central web-auth, Only you have to enable MAC-Filtering and &lt;STRONG&gt;no&lt;/STRONG&gt;&amp;nbsp;L3 Auth is needs to be enabled, On the SSID you have to &lt;STRONG&gt;enable AAA Override&lt;/STRONG&gt; to accept the redirection attribute send by the radius server (ISE/Forescout).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On this case AAA is performed by Foreign WLC. Refer the link of&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;A title="Central Web-Auth Configuration via Cisco" href="https://community.cisco.com/t5/wireless-mobility-documents/central-web-authentication-cwa-for-guests-with-ise/ta-p/3121101" target="_blank" rel="noopener"&gt;Central Web-Auth Configuration via&lt;/A&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;A title="Central Web-Auth Configuration via Cisco" href="https://community.cisco.com/t5/wireless-mobility-documents/central-web-authentication-cwa-for-guests-with-ise/ta-p/3121101" target="_blank" rel="noopener"&gt; &lt;STRONG&gt;&lt;I&gt;Cisco ISE&amp;nbsp;&lt;/I&gt;&lt;/STRONG&gt;&lt;/A&gt;so that you can get a idea on it.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 20:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847022#M22183</guid>
      <dc:creator>Sathiyanarayanan Ravindran</dc:creator>
      <dc:date>2019-04-29T20:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847479#M22184</link>
      <description>There is a pre-auth acl I configured that needs to be applied and that can&lt;BR /&gt;be applied under layer 3 or wlan interface(but wlan interface will not be&lt;BR /&gt;helpful for pre-auth) hence I need to apply it under layer 3. What are my&lt;BR /&gt;options to get this pre-auth acl going as well&lt;BR /&gt;</description>
      <pubDate>Mon, 29 Apr 2019 20:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847479#M22184</guid>
      <dc:creator>Nana Banahene</dc:creator>
      <dc:date>2019-04-29T20:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847499#M22185</link>
      <description>&lt;P&gt;Pre auth ACL is not required in this case. You have to configure a ACL on the foreign controller for DHCP/DNS and NAC IP access(for redirection page). That ACL name has to be present on the Authorization Profile.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 21:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3847499#M22185</guid>
      <dc:creator>Sathiyanarayanan Ravindran</dc:creator>
      <dc:date>2019-04-29T21:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3848300#M22186</link>
      <description>&lt;P&gt;Yes, on the anchor I have pre-auth acl on L3. I was just concerned that on foreign I have L2 mac filtering, making the configs on foreign different from anchor, but if I understand you correctly, for wlan in question I can do L2 mac filtering on foreign with AAA overide and then do L3 preauth on anchor, and there should be no issues, correct?&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2019 00:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3848300#M22186</guid>
      <dc:creator>Nana Banahene</dc:creator>
      <dc:date>2019-05-01T00:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Forescout Mac Filtering Security and Web Policy</title>
      <link>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3848362#M22187</link>
      <description>&lt;P&gt;Here also both anchor and foreign configuration has to be same. Only&amp;nbsp;thing that changes is who is performing the AAA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you don’t need to configure L3 on both the controller. Redirection ACL name and URL will be send by the radius server through Authorization profile. You have to create a redirection ACL with only DHCP, DNS and NAC IP on Foreign controller.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you referred the link i shared on my previous response? If not pls check it once.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2019 06:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/forescout-mac-filtering-security-and-web-policy/m-p/3848362#M22187</guid>
      <dc:creator>Sathiyanarayanan Ravindran</dc:creator>
      <dc:date>2019-05-01T06:39:37Z</dc:date>
    </item>
  </channel>
</rss>

