cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3625
Views
0
Helpful
4
Replies

How to search mac address falls under which identity groups

getaway51
Level 2
Level 2

Hi,

 

1) Can ISE find mac address in this format? copy out from the switch sh mac address-table

a009.ed05.4678

 

2)Do i need to go into "each" identity groups and search whether this mac address belongs to the grp?

OR is there a fastest way i can search if this mac- address belongs to any identity grp? 

 

Many many thanks!!

1 Accepted Solution

Accepted Solutions

Damien Miller
VIP Alumni
VIP Alumni

I'm a visual person so maybe this will help you, you will have to add the Identity group to the filter via the gear/menu before you can search by it.  

You can also, select export > all endpoints, and the generated CSV will have the information you want.  It can be quicker to do it via excel.  

IDgroup.jpg

View solution in original post

4 Replies 4

Hi,

If you go to "Context Visibility > Endpoints" you can filter on mac address, paste the mac address and it will filter (it displays the mac address in the format a0:09:ed:05:46:78, but you can use the format a009.ed05.4678 as well). Click the endpoint mac address, under the attributes tab you will see General attributes and the Identity Group assignment.

 

HTH

Damien Miller
VIP Alumni
VIP Alumni

I'm a visual person so maybe this will help you, you will have to add the Identity group to the filter via the gear/menu before you can search by it.  

You can also, select export > all endpoints, and the generated CSV will have the information you want.  It can be quicker to do it via excel.  

IDgroup.jpg

Hi,

 

Many thanks for enlightening me!!!

IS it possible to knw if the particular mac-address falls under which policy? so that ISE can tell if the device is authorized or not i.e ALLOW/BLOCK.  

 

 

 

The authorization policy column on the Context Visibility column shows you that information, but CV is buggy and not always the accurate source of truth for that information.  The live logs or RADIUS authentication report is the source of truth what what rule the device is hitting.