<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD - Wireless in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532833#M312412</link>
    <description>&lt;P&gt;What I would do is create a group policy within your Meraki dashboard for company owned devices. Then import the device MAC and assign it to the group policy. Have everything else outside of that policy be put onto a guest VLAN. &lt;/P&gt;</description>
    <pubDate>Tue, 24 Feb 2026 21:27:00 GMT</pubDate>
    <dc:creator>BlakeRichardson</dc:creator>
    <dc:date>2026-02-24T21:27:00Z</dc:date>
    <item>
      <title>BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532831#M312410</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;Context: I have a Meraki wireless network integrated with an Active Directory, using 802.1x authentication. Employees connect to the wireless network using their domain username and password.&lt;/P&gt;&lt;P&gt;Employees connect a laptop and a cell phone provided by the company to this wireless network.&lt;/P&gt;&lt;P&gt;However, employees also connect their cell phones, tablets, or other personal devices to this 802.1x network. (For network security reasons, these devices should not be connected.)&lt;/P&gt;&lt;P&gt;I considered 802.1x + MAC filtering, but it's not an option due to the large number of MAC addresses.&lt;/P&gt;&lt;P&gt;Is there any way to prevent personal devices from connecting to the 802.1x network, or are there any other alternatives?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 21:09:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532831#M312410</guid>
      <dc:creator>nstr1</dc:creator>
      <dc:date>2026-02-24T21:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532832#M312411</link>
      <description>&lt;P&gt;The only way to avoid personal devices connecting to a network with PEAP, is to not use PEAP for network authentication.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Managed devices should use EAP-TLS, with machine certificates issued from your CA.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 21:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532832#M312411</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2026-02-24T21:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532833#M312412</link>
      <description>&lt;P&gt;What I would do is create a group policy within your Meraki dashboard for company owned devices. Then import the device MAC and assign it to the group policy. Have everything else outside of that policy be put onto a guest VLAN. &lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 21:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532833#M312412</guid>
      <dc:creator>BlakeRichardson</dc:creator>
      <dc:date>2026-02-24T21:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532834#M312413</link>
      <description>&lt;P&gt;You can also use a MDM solution like Microsoft Intne.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 22:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532834#M312413</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-02-24T22:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532835#M312414</link>
      <description>&lt;P&gt;EAP-TLS is the best solution.&lt;/P&gt;&lt;P&gt;You can deploy a Microsoft CA server (included with Windows Server), create a group policy to automatically deploy certificates to AD members, and configure the WiFi to use those certificates.&lt;/P&gt;&lt;P&gt;Getting the certificates onto mobile devices using this solution is difficult; you need an MDM.  You could use a separate SSID for the mobile devices that only provides Internet access.&lt;/P&gt;&lt;P&gt;If you *really* want to stick with PEAP, you could create an AD group policy that allows only "machine" authentication to the SSID.  Then tell NPS to only allow "Domain Computers".&lt;/P&gt;&lt;P&gt;You could authenticate the mobile devices onto a separate SSID that only provides Internet access, which allows AD username and password.&lt;/P&gt;&lt;P&gt;You could also use NPS to push a VLAN tag.  "Domain Computers" go onto one [internal] VLAN, "Domain Users" go into another VLAN (with Internet only access).&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 23:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532835#M312414</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2026-02-24T23:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532836#M312415</link>
      <description>&lt;P&gt;As stated above, the best approach is to use EAP-TLS and issue certificates to your corporate devices only.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 00:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532836#M312415</guid>
      <dc:creator>Brash</dc:creator>
      <dc:date>2026-02-25T00:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532837#M312416</link>
      <description>&lt;P&gt;That's sound good, but i need avoid manage MAC address, i appreciate you post.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 02:09:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532837#M312416</guid>
      <dc:creator>nstr1</dc:creator>
      <dc:date>2026-02-25T02:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532838#M312417</link>
      <description>&lt;P&gt;I like that idea. &lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 19:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532838#M312417</guid>
      <dc:creator>nstr1</dc:creator>
      <dc:date>2026-02-25T19:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD - Wireless</title>
      <link>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532839#M312418</link>
      <description>&lt;P&gt;I like that idea; I've been looking into it more and it seems interesting.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 19:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/byod-wireless/m-p/5532839#M312418</guid>
      <dc:creator>nstr1</dc:creator>
      <dc:date>2026-02-25T19:14:24Z</dc:date>
    </item>
  </channel>
</rss>

