<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: C9130axi EWC authentication question in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4311135#M227550</link>
    <description>&lt;P&gt;For my environment, it's really only useful for a general use tablet and the lack of encryption makes it seem pointless.&amp;nbsp; I was also not able to turn off SSID broadcasting, so I don't think I will use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I seem to remember applying a mac address acl to a wlan was extremely easy and intuitive on my old WLC2504.&amp;nbsp; Less so in IOS-XE 17.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much easier to design NPS constraints that include mac addresses.&amp;nbsp; As I said, my filter list is very small, so it is easy to script out, but for a larger community, I might try harder to set up a mac address acl.&lt;/P&gt;</description>
    <pubDate>Sun, 21 Mar 2021 22:23:15 GMT</pubDate>
    <dc:creator>Chris Callison</dc:creator>
    <dc:date>2021-03-21T22:23:15Z</dc:date>
    <item>
      <title>C9130axi EWC authentication question</title>
      <link>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4310958#M227529</link>
      <description>&lt;P&gt;I am using my AP in EWC mode.&amp;nbsp; I am using Windows 2019 NPS as the AAA authority.&amp;nbsp; I have set up admin (web &amp;amp; ssh) access and have set up 802.1x for one of my WLANs and it is working as expected.&amp;nbsp; I would like to have a few WLANs that are restricted by mac address, but I don't want to use MAB if I have to leave the WPA authentication as "open".&amp;nbsp; I've already tried it and I will use it if I have to, but it seems like a half-ass solution if I can't encrypt the session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there better ways to work around this?&amp;nbsp; My list of mac addresses to restrict a VERY small so I don't mind doing in the NPS security policies&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 20:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4310958#M227529</guid>
      <dc:creator>Chris Callison</dc:creator>
      <dc:date>2021-07-05T20:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: C9130axi EWC authentication question</title>
      <link>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4310961#M227530</link>
      <description>What is the purpose of using MAC address with WPA2 PSK?  I think there are better solutions if your devices supports 802.1x.&lt;BR /&gt;Anyways, I believe you are limited also on NPS as to what you can do compared to Cisco ISE as an example.  In ISE, I can have a PSK or even IPSK and based on a group (MAC address list) I can place devices on a specific vlan. It’s really based on rules and what conditions are available in NPS.  I have only used NPS back in the days and that was strictly for 802.1x.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Mar 2021 06:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4310961#M227530</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2021-03-21T06:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: C9130axi EWC authentication question</title>
      <link>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4311135#M227550</link>
      <description>&lt;P&gt;For my environment, it's really only useful for a general use tablet and the lack of encryption makes it seem pointless.&amp;nbsp; I was also not able to turn off SSID broadcasting, so I don't think I will use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I seem to remember applying a mac address acl to a wlan was extremely easy and intuitive on my old WLC2504.&amp;nbsp; Less so in IOS-XE 17.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much easier to design NPS constraints that include mac addresses.&amp;nbsp; As I said, my filter list is very small, so it is easy to script out, but for a larger community, I might try harder to set up a mac address acl.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Mar 2021 22:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4311135#M227550</guid>
      <dc:creator>Chris Callison</dc:creator>
      <dc:date>2021-03-21T22:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: C9130axi EWC authentication question</title>
      <link>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4311171#M227554</link>
      <description>&lt;P&gt;Well I run WPA2/AES with PSK for my IoT devices and using a group that has all the mac address for that defined group.&amp;nbsp; That is what you should do and don't worry about the mac address.&amp;nbsp; I'm able to do this with Cisco ISE, because ISE collects device information that is sent to it for authentication.&amp;nbsp; This I don't think it is possible with NPS, unless you create an OU with the mac address as the username and password (been a while since I did something like that, so don't know if that is still valid).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Mar 2021 01:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/c9130axi-ewc-authentication-question/m-p/4311171#M227554</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2021-03-22T01:12:27Z</dc:date>
    </item>
  </channel>
</rss>

