07-30-2023 06:56 AM
I am implementing 802.1x authentication for Wireless and Wired networks. May I ask how to block the client in ISE ? Is it possible to add the client mac into blacklist in ISE ?
07-30-2023 08:16 AM
@tonyang you can add the MAC address to the predefined identity group called "blocklist" and then create an authorisation rule to block devices in that group connecting. Example: https://community.cisco.com/t5/security-knowledge-base/ise-authentication-and-authorization-policy-reference/ta-p/3850472#toc-hId--2143165211
07-30-2023 08:31 AM
You are correct but which attributes of 802.1x have mac of user ?
If he use mab then username is mac and he can use it to bulid blacklist but for 802.1x I think he need command in NAD to send mac of user as attribute with 802.1x radius traffic.
07-30-2023 08:51 AM
The MAC address is not required to be used for authentication, you implement this blocklist during authorisation where the authenticating user is connecting from a MAC address that is a member of the blocklist endpoint identity group and subseuqently denied access.
07-30-2023 08:59 AM
How ISE know mac address ?
07-30-2023 09:26 AM - edited 07-30-2023 12:38 PM
@MHM Cisco World the MAC address is learnt via DHCP or RADIUS. ISE uses the MAC address to create an entry in the Endpoint database. You do not need to use MAC authentication (MAB) to block a client. When processing the connection, ISE will know the endpoint MAC address and authenticating username (amongst other attributes), the MAC address can be used as a condition in an authorisation rule, usually when referenced in an endpoint identity group (as per the example provided), you can then deny/permit as required.
@tonyang another option (if required) you could create an AD group called i.e., "Blocked Users", then create an exception rule that denies users connections if a member of that group.
07-31-2023 11:15 PM
Thank you, Rob.
May I ask how to define the condition for an exception rule ?
07-31-2023 11:32 PM
@tonyang just create an authorization rule (as per the example provided) under either the Policy Set Local Exceptions or Global Exceptions, these rules will be processed prior to the Authorization Policy.
07-31-2023 11:42 PM
@Rob Ingram I see where I need to define in local/global exception. But I want to consult with you how to define the condition.
I just created one security group "Workstation Deny Group" in AD. Thank you.
07-31-2023 11:49 PM
@tonyang you don't actually need to use the "Security Group", that's only if you are using TrustSec SGTs for enforcement.
In closed mode a deny should suffice, if in open mode then you could just apply a DACL to restrict traffic.
08-01-2023 07:46 PM
Thank you, Rob,
I just implemented one local exception to manage the blacklist. And it works smoothly in my environment. I am wondering if I can have alternative to do. Like use AD group (security group) to manage/control.
07-31-2023 09:40 PM
Thank you, Rob.
I implement the block list in the authorization policy. I just implement radius protocol in the authentication policy. And move the block list to the top among multiple authorization conditions.
08-01-2023 11:57 PM
@tonyang yes you can (I did already previously suggest that as another option).
Create a group in Active Directory add the user or computer (if just using machine authentication) import that group into ISE. Create the block authorisation rule to reference that ExternalGroup and set deny access (and if necessary a DACL).
07-30-2023 08:28 AM
You use 802.1 not mab ?
07-30-2023 08:35 AM - edited 07-30-2023 02:54 PM
Radius server attribute 31 <<- this need in SW
And then config blacklist in ise condition call-station mac.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide