<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Machine auth on SSID in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490443#M298403</link>
    <description>&lt;P&gt;Looking to only allow domain joined machines on a SSID.  Was looking at radius auth but that seems to only check mac address or user accounts despite this statement in the config doc:&lt;/P&gt;&lt;P&gt;"Type or find the&lt;SPAN&gt; &lt;/SPAN&gt;&lt;STRONG&gt;Domain Users&lt;/STRONG&gt;&lt;SPAN&gt; &lt;/SPAN&gt;group. This group should be located in the same domain as your RADIUS server.&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note: &lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;If RADIUS is being used for Machine Authentication, find the &lt;STRONG&gt;Domain Computers&lt;/STRONG&gt; group instead." &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Can this be done using a computer group? If not, what is the best option to verify the computer and minimize complexity to the users?  we have about 1500 devices, so creating a mac account for each machine would be a bit cumbersome to maintain.&lt;/P&gt;&lt;P&gt;Thanks for any suggestions.&lt;/P&gt;&lt;P&gt;Using NPS for RADIUS.&lt;/P&gt;&lt;P&gt;&lt;!-- StartFragment  --&gt;&lt;!-- EndFragment  --&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Oct 2024 16:11:22 GMT</pubDate>
    <dc:creator>TheMightyGaur</dc:creator>
    <dc:date>2024-10-11T16:11:22Z</dc:date>
    <item>
      <title>Machine auth on SSID</title>
      <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490443#M298403</link>
      <description>&lt;P&gt;Looking to only allow domain joined machines on a SSID.  Was looking at radius auth but that seems to only check mac address or user accounts despite this statement in the config doc:&lt;/P&gt;&lt;P&gt;"Type or find the&lt;SPAN&gt; &lt;/SPAN&gt;&lt;STRONG&gt;Domain Users&lt;/STRONG&gt;&lt;SPAN&gt; &lt;/SPAN&gt;group. This group should be located in the same domain as your RADIUS server.&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note: &lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;If RADIUS is being used for Machine Authentication, find the &lt;STRONG&gt;Domain Computers&lt;/STRONG&gt; group instead." &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Can this be done using a computer group? If not, what is the best option to verify the computer and minimize complexity to the users?  we have about 1500 devices, so creating a mac account for each machine would be a bit cumbersome to maintain.&lt;/P&gt;&lt;P&gt;Thanks for any suggestions.&lt;/P&gt;&lt;P&gt;Using NPS for RADIUS.&lt;/P&gt;&lt;P&gt;&lt;!-- StartFragment  --&gt;&lt;!-- EndFragment  --&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 16:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490443#M298403</guid>
      <dc:creator>TheMightyGaur</dc:creator>
      <dc:date>2024-10-11T16:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Machine auth on SSID</title>
      <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490444#M298404</link>
      <description>&lt;P&gt;Using X.509 certs (either user or machine) for Enterprise-802.1x is supported by Meraki APs using NPS as RADIUS    &lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/RADIUS%3A_WPA2-Enterprise_With_EAP-TLS" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/RADIUS%3A_WPA2-Enterprise_With_EAP-TLS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 16:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490444#M298404</guid>
      <dc:creator>GreenMan</dc:creator>
      <dc:date>2024-10-11T16:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Machine auth on SSID</title>
      <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490445#M298405</link>
      <description>&lt;P&gt;You need your NPS access rule to match a specific AD group. In this case that would be the domain computers group.  And only if that condition is met you can send the access-accept.&lt;BR /&gt;&lt;BR /&gt;Usually when you create a network policy on NPS you need to put in following conditions:&lt;BR /&gt;nas-port-type = 802.11 wireless&lt;BR /&gt;called station id contiains SSIDname&lt;BR /&gt;domain computer = the machine group containing your windows machines.&lt;BR /&gt;&lt;BR /&gt;And make sure this rule is above the default rules.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 18:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490445#M298405</guid>
      <dc:creator>joey.debra</dc:creator>
      <dc:date>2024-10-11T18:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Machine auth on SSID</title>
      <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490446#M298406</link>
      <description>&lt;P&gt;You will also need to create a group policy to configure your macihnes to only perform machine auth.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2024 19:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490446#M298406</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-10-13T19:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Machine auth on SSID</title>
      <link>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490447#M298407</link>
      <description>&lt;P&gt;Thanks for your reply.  I have chosen a different route, but I appreciate your reply&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 15:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/machine-auth-on-ssid/m-p/5490447#M298407</guid>
      <dc:creator>TheMightyGaur</dc:creator>
      <dc:date>2024-10-21T15:28:15Z</dc:date>
    </item>
  </channel>
</rss>

