<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed) in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493073#M299259</link>
    <description>&lt;P&gt;Not directly on the SSID, you would need a Radius server to restrict it this way.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Enabling_MAC-based_access_control_on_an_SSID" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Enabling_MAC-based_access_control_on_an_SSID&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/MAC-Based_Access_Control_Using_Microsoft_NPS_-_MR_Access_Points" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/MAC-Based_Access_Control_Using_Microsoft_NPS_-_MR_Access_Points&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 20:53:28 GMT</pubDate>
    <dc:creator>aleabrahao</dc:creator>
    <dc:date>2024-05-29T20:53:28Z</dc:date>
    <item>
      <title>Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed)</title>
      <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493072#M299258</link>
      <description>&lt;P&gt;as far as i know, if an endpoint connect to the wireless network, i can then restrict the access using device policy and choosing normal, block or allow&lt;/P&gt;&lt;P&gt;what the customer wants is exactly that function but backwards, i mean, if we can set device policy on block by default for any new users and manually put them in allow or normal, is this possible?&lt;/P&gt;&lt;P&gt;i tried to do that but i think that i'm missing something or it can't be done the way they want&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 20:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493072#M299258</guid>
      <dc:creator>jperez netics</dc:creator>
      <dc:date>2024-05-29T20:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed)</title>
      <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493073#M299259</link>
      <description>&lt;P&gt;Not directly on the SSID, you would need a Radius server to restrict it this way.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Enabling_MAC-based_access_control_on_an_SSID" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Enabling_MAC-based_access_control_on_an_SSID&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/MAC-Based_Access_Control_Using_Microsoft_NPS_-_MR_Access_Points" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/MAC-Based_Access_Control_Using_Microsoft_NPS_-_MR_Access_Points&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 20:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493073#M299259</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2024-05-29T20:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed)</title>
      <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493074#M299260</link>
      <description>&lt;P&gt;An option that might work...&lt;BR /&gt; - Create a VLAN and assign a group policy to it that denies all traffic. Set this VLAN on the SSID.&lt;/P&gt;&lt;P&gt; - Once the device has connected, manually change the group policy of that device to one which allows network traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 00:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493074#M299260</guid>
      <dc:creator>Brash</dc:creator>
      <dc:date>2024-05-30T00:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed)</title>
      <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493075#M299261</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/108865"&gt;@jperez netics&lt;/A&gt;, &lt;/P&gt;&lt;P&gt;What about Layer 2/3 LAN isolation? Client that connect to a "blocked SSID", can be denied (except, DNS and DHCP, which you can controll anyway) to local netwoks. &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;'Deny Local LAN' settings in Cisco Meraki MR firewall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Firewall_and_Traffic_Shaping/'Deny_Local_LAN'_settings_in_Cisco_Meraki_MR_firewall" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Firewall_and_Traffic_Shaping/'Deny_Local_LAN'_settings_in_Cisco_Meraki_MR_firewall&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 00:45:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493075#M299261</guid>
      <dc:creator>IvanJukic</dc:creator>
      <dc:date>2024-05-30T00:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access by mac address in SSID (all clients blocked by default until explicitly allowed)</title>
      <link>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493076#M299262</link>
      <description>&lt;P&gt;You're right, most traditional Wi-Fi access points (APs) don't offer the functionality of blocking by default and allowing by exception for MAC addresses within an SSID (Service Set Identifier). However, there are alternative approaches to achieve a similar outcome. &lt;FONT color="#FFFFFF"&gt;&lt;A href="https://www.ny-stateofhealth.com/" target="_self" rel="nofollow noopener noreferrer"&gt;ny state of health&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;MAC Filtering with Open Network (Least Secure) This method involves creating an open Wi-Fi network (no password) and restricting access only to authorized MAC addresses through the router/access point's settings.&lt;BR /&gt;&lt;SPAN&gt;This approach is not recommended for secure environments as anyone can connect and potentially see network traffic if they have the authorized device's MAC address.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 06:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-access-by-mac-address-in-ssid-all-clients-blocked-by/m-p/5493076#M299262</guid>
      <dc:creator>christy2951hernandez</dc:creator>
      <dc:date>2024-05-31T06:38:00Z</dc:date>
    </item>
  </channel>
</rss>

