Different permission on Cisco ISE Mac address format

Dear all,

I have problem with my Cisco ISE,

It's design:

ISE - Core switch - 3Com - PC user

My case:

Authorization is based on Active Directory, and Mac address

The user with PC connecting to 3Com swtich Deny by ISE but is the Mac of the Format address is different with Cisco.

Cisco MAC address format: XX

3Com MAC address format: XXXX-XXXX-XXXX

3Com switch type is TRICOM 4210 26 - PORT.

Someone at - it experience with this? and how can change the mac address format in 3Com for user authorized by Cisco ISE.

Note:

Active Directory-based authorization is not problem with 3Com Switch.

From my experience, produces different is mac address of a different size, so this case not only for 3Com Switch.

Thank you

Arika Wahyono

Hello. Authentication using "work around the Mac address" is not a standard feature. The seller do differently. I do not think that this could work, but even if this is possible the solution will be not reliable because it is not standard basic.

Tags: Cisco Security

Similar Questions

  • MAC address Format Question

    Nobody knows the right format for the client MAC address in the internal of the ACS database such that it will authenticate 8021 x of a cisco switch queries?

    Is this: 00-11-43-4A-B8-62

    or: 0011.434 A. B862

    or maybe: 0011434AB862

    or something else?

    I read the config guides, but I don't see it addressed again.

    Thanks in advance.

    ACS supports three following standard formats to represent the MAC-48 addresses in human readable form:

    Six groups of two hexadecimal digits, separated by dashes (-) in the order of transmission, e.g. 01-23-45-67-89-ab.

    Six groups of two separated by a colon (:)), for example, 01:23:45:67:89:ab.

    Three groups of four hexadecimal digits separated by periods (.), for example, 0123.4567.89ab.

    Kind regards

    ~ JG

    Note the useful messages

  • Convert to the MAC address format

    I want to convert a set of numbers in the format mac address of 00:00:00:00:00:00.  I tried to format .net operator, but I see nothing.

    If I wanted to convert $a = "ba2b3cf03b2c" to the same numbers but by a colon in the Middle, is there an easy way to do this? ba: 2b: 3 c: f0:3 b: 2 c

    I tried to play with take $a and in doing so:

    $a | foreach {$($_[0,1])-join "} which will grab the first 2 characters and then I was going to play with the addition of colon and by trial and error, get all the numbers in function, but there may be something much easier than... I'm hoping.

    Two different methods:

    http://PowerShell.org/WP/forums/topic/Add-colon-between-every-2-characters/

    PowerShell magazine"#PSTip insert characters in a specified string index position

  • LWAPP lose names and appearing as the default MAC address

    I had random LWAPP that were configured previously appearing as the original names as if they were just installed (APxxx:xxxx:xxxx). I know because the location field is the location of where they are, and the name of the AP group is also set to the location they are. What would cause this?

    WLC = 7.0.98.0

    AP = 1142n 12.4 (23 c) JA

    This problem is there... it happens about 5 percent of my overall AP

    Just my $.02

    If your access point keeps its AP group settings and location, it does not lose its configuration...

    Have you tried to restart an AP that indicates the Mac address format and see if she takes up with the correct name?

    I bet that happens with the correct name...

    If Yes, my money is on your APs are passing the WLC and join before the WLC has allowed the previous entry.

    It makes sense on the WLC to temporarily restore a name APs if two APs join with the same name (since you can't have two APs of the same name).

    I may be wrong, it can permeanently reset name, but I bet that this has to do with your AP declining and join too quickly...

  • ISE MAC movement move and host of Cisco

    Hello

    I read that SNMPTraps should not be sent to ISE using probe RADIUS, because it will trigger only a SNMPQuery duplicate. If so, how do you support a use case by which a device can withdraw the authorization of a switch port and successfully allow on a different port. It is one of the following exclusion of others?

    1 authentication allowed mac-passage

    2. analysis of IP device

    3. change notification-mac address table, notification of mac address table mac-move, trap snmp-server (global configuration) and snmp trap mac-notification (configuration interface)

    I understand that for a device behind a non-cisco IP, CDP or LLDP logoff phone or Proxy EAPOL will inform the switch.

    Thank you

    move to the Mac permits is the solution.

  • Use of two different MAC addresses EX60

    Hello outthere.

    I use an EX60 for testing. Everything works fine, but my colleagues told me that endpoint uses two different MAC addresses. These addresses are seen on the switch will remain the ex60 ist connected.

    The situation has not changed after doing a factory default.

    It's a kind of Mystic, because my ex90 do not use two MAC addresses.

    So the question is, what is the diffrence between ex60 and ex90? Is this a normal behavior on ex60?

    I hope someone can help me!

    Greetings from the Austria

    Martin

    Hello

    Using a touchscreen on the EX60? I think that the 2nd MAC address will probably be that of the touchscreen attached. How to check? The MAC address of the EX60 can be verified using the API. SSH into the EX60 and run:

    XStatus network //Mac

    * s network 1 Ethernet MacAddress: "00:50:60:05:52:BA."

    * end

    Ok

    The MAC address of the button can be controlled via access root for the codec.

    SystemTools rootsettings on

    [dderidde-ex90-desktop: ~] $ arp - a

    ARM3. LocalNet (169.254.0.13) to 00:e0:0 c: 00:8 c: 43 [ether] on eth1

    arm0. LocalNet (169.254.0.10) to 00:e0:0 c: 00:8 c: 40 [ether] on eth1

    ARM2. LocalNet (169.254.0.12) to 00:e0:0 c: 00:8 c: 42 [ether] on eth1

    HSRP-10-48-2 - 1.cisco.com (10.48.2.1) at 00:00: 0C: 07:ac: 00 [ether] on eth0

    ARM1. LocalNet (169.254.0.11) to 00:e0:0 c: 00:8 c: 41 [ether] on eth1

    Arm4.LocalNet (169.254.0.14) to 00:e0:0 c: 00:8 c: 44 [ether] on eth1

    [dderidde-ex90-desktop: ~] $

    My contact is not directly connected, so can't see here, only the gateway address MAC address. But you should see the touch directly connected.

    Otherwise, there is a sticker on the back of touch with serial number, and I think, MAC also.

    We have a DDT open for this behavior.

    CSCtz86298 - 802. 1 x is not handled properly on device with PC port and / or Touch

    Greetings from Belgium.

    Danny.

  • ISE 2.0 mobile authentication using mac address

    Hi all

    Requirement:

    We categorized the mobile users in the category three (VIP, EMP, MGMT) and three SSID has been configured in flexconnect environment.  Normal PSK is configured, but we need authentication for example mac/username, password of the ISE.

    Please guide me how to configure the SSID profile & what is require in ISE to reach the requirement. We have the base license in ISE and don't want profiling such as Apple devices... etc.

    The user can make any mobile phone provider in a group such as VIP and will get subnet A... EMP will get subnet B... etc.

    How to set up the strategy in ISE so that we can add mobile mac address in ISE and it will be connected.  Without mac entry it will not connect to the ssid.

    Thank you

    Kamlesh

    1. Create a group of identity of endpoint for each category (VIP, EMP, MGMT).
    2. Add the MAC address of the mobile device to its respective identity group.
    3. Configure authentication rule to use the sequence identity of internal endpoints .
    4. Create authorization rules that allow access based on the identity of endpoints and SSID point group.

    So let's say VIP devices connect to the WLAN SSID VIP. The authorization rule would look like this:

    • Name of the rule - VIP Wireless
    • Conditions - VIP and RADIUS: Called-Station-ID CONTAINS VIP-SSID
    • Permissions - PermitAccess

    It narrows the MAC must be in the group VIP and VIP-SSID WIFI connection in order to be allowed access to the network. Need you an authorization for each identity group rule. You can use END WITH square CONTAINS in case you have a different SSID that might contain some VIP-SSID (e.g., VIP-SSID2), but don't want this rule to deal with for this connection.

    The rule of authentication should be configured to use the sequence of Points of ending internal identification.

  • MAC address purging do not ISE MAC Authentication Bypass database

    I'm having a problem where my client's MAC addresses are not be purged automatically from the ISE.  It is a simple amp construction, where users are offered a cover page and must hit 'accept' to access the internet.  When the user does this, their MAC address is added to LSE, and then they can visit his profile.

    I need clients who will be presented to the splash page at least once a day.  Because the MAC address is added when they hit accept, they never get again presented start page, unless I have manually delete the MAC of Administration > identities > endpoints.

    I put the frequency of bleeding under Administration > identity mgmt > settings to 1 day and under settings Portal comments for "purge endpoints of this identity group every day 1", but the MAC stay in this group even after several days.

    I have also set the reauthentication is very short (30 min) in the thinking authorization profiles that might help, but the customer never receives the page again after hitting accept because the MAC is still listed in the endpoint group.  The only way to get the start page to reappear for customers is to manually remove the ISE MAC...

    Is there something else I am missing to make this feature work?

    Attached are a few screenshots of the parameters.

    Thank you!

    It looks like a bug, seems to me that you do it right, I got it working for a client in point 1.3 of the ISE, just with a much longer period before the purge (3 months). ISE what version are you on?

  • Cisco ip to the mac address of a device?

    What command I can run in CLI, to get a mac address that is associated with a given ip address?

    Context: In order to access wifi, users will have to go through web authentication. To submit their credentials, we are able to see their ip address. We want router cli api query or something, to find a mac based on the IP address.

    Pointers?

    Yes, it's a very simple way to get it, in the past you could not even do this & Cisco added this feature only from code 7.5.x.

    If you cannot do a lot of filtering on, hope that Cisco will further improve it. If you need to live with these limitations at the moment :)

    HTH

    Rasika

  • same mac address lan on different esx hosts

    Hi, I have a unit of vmware (firewall) who take control of the NICs mac address, if I move this to another Esx VM, all configuration fell, because the lan mac address is different from the first Esx.

    Is there a way to put the same mac address on two or more Esx host in the network adapters.

    I tryied to set the mac address on the settings of the VM manually from the second Esx, but the first part is blocked.

    In this case, I suggest to make a manual copy.

    Or remove the inventory on the destination hosts, set the vmx file (to restore the old MAC address), then add back to the inventory.

    André

  • ESX uses network adapter with the mac address that is different than virtual connect reports

    Hi all

    Our ESX environment consists of HP C7000 enclosure, virtual connect 1 gb ethernet with a mixture of BL480c and BL460c. We just bought some new BL460c G7 with NIC NC553i to replace some of the oldest BL480c. We have configured Virtual Connect to assign mac addresses. In vc management consoleI see the addresses assigned to the server, but when I start the server displays a different mac address for nic #2 that vc does. NIC #1 has the same mac address of console management vc and in the server BIOS. When I install ESX also sees the 'wrong' for #2 nic mac address. According to vmware nic #2 has not any network connected to what should be if it was really nic #2 (according to the vc management console).

    When I look at the mac addresses in the BIOS none of the network interface card have the mac address assigned by vc. VC firmware is 3.01. I have attached the photos I see information in the management of VC and BIOS console. Someone at - it for clues to what is happening and how can I solve it? Thanks in advance.

    Kind regards

    GB

    Please refer to:

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1001167

    Note:   The ESX host uses following addresses starting with 00:50:56 (as opposed to the address embedded in the interface itself).

    To determine the MAC address of the interface Board of the ESX host, run the command:
    # ifconfig | grep-i hw
    The output looks like:
    vswif0 Link encap HWaddr 00:50:56:41:5 A: 59
    The MAC address is in the first line after HWaddr.  In this example, the MAC address is 00:50:56:41:5 has: 59.

    Note:   The ESX host uses following addresses starting with 00:50:56 (as opposed to the address embedded in the interface itself).

    You can also review the output information and the esxcfg-NICS - l order MAC addresses.
  • Same MAC address LAN different segment, different ESX, different groupings? questions?

    Hello

    I have a question reguardning assign the same address MAC 2 mV.

    A quick overview of our environment is:

    1 vCenter

    2 different groups

    Virtual machines are not in the same LAN segment.

    We have cloned a VM to group A to group B. The license for the application is linked to the MAC address of the virtual machine. However, with a few changes to the .vmx file we have changed the

    static ethernetX.addresstype

    ethernetX.address for the MAC, we wanted to

    added the ethernet.checkMACAddress = "false".

    While the two virtual machines have the same MAC, VMS are production and VM B are development.

    It works very well and we can turn on the virtual machine in Group B and both A and B works very well, the application works fine in the two clusters. BUT here's my question.

    vCenter keeps track of MAC addresses and VM b it gives an error stating that "the static method address MAC attributed to VM B, is in conflict with the VM A MAC» Then can there be a problem for us? We can be right now two virtual machines are in place and working well just. And the application also works very well at the time of the cluster. The only one complaining about this is vCenter.

    Someone has the right answer for me?

    BR

    Henrik

    Since you have no problems of network just ignore this warning.

    ---

    VCP MCSA, MCTS Hyper-V, VMware vExpert 2009, 3/4

    http://blog.vadmin.ru

  • Cisco ASA active / standby Mac addresses

    Hi all

    Please advise on the underside.

    Say that I have to active / standby. I have two interfaces on each firewall configured as below

    For the primary (active)

    interface GigabitEthernet1 / 0--> Say burned in mac address is 6c41.6bb0.1111
    nameif test1
    security-level 0
    10.1.1.1 IP address 255.255.255.0 ensures 10.1.1.2

    im int 2/0

    Test2 nameif--> Say burned in mac address is 6c41.6aa0.1111
    security-level 0
    10.2.1.1 IP address 255.255.255.0 ensures 10.2.1.2

    For secondary school (currently idle)

    interface GigabitEthernet1 / 0--> Say burned in mac address is 6c41.6bb0.2222
    nameif test1
    security-level 0
    10.1.1.1 IP address 255.255.255.0 ensures 10.1.1.2

    im int 2/0

    Test2 nameif--> Say burned in mac address is 6c41.6aa0.2222
    security-level 0
    10.2.1.1 IP address 255.255.255.0 ensures 10.2.1.2

    According to my understanding of the DOC.

    To transfer traffic, other devices will use the main unit mac address and IP addresses.

    Please consider under the scenario:

    My primary unit has failed and secondary took over as active unit.

    Primary (standby)

    Secondary (active)

    secondary Q1) so now will use the IP address and Mac address as below? Please confirm

    10.1.1.1 & 6c41.6bb0.1111

    10.2.1.1 & 6c41.6aa0.1111

    Q2) I believe that the ip address of the primary (Standby) in aid will be

    10.1.1.2

    10.2.1.2

    It will use what mac addresses? What is the BIA of the secondary unit? Please notify

    Thanks in advance.

    Q1 Yes), IP address and the MAC will be moving to the new active unit so no matter who the network except the switch will notice failover event

    Q2) Yes, primary (watch now) will use IP addresses and MAC addresses available for secondary:

    6C41.6bb0.2222

    6C41.6aa0.2222

    Kind regards.

  • Disable broadcast SSID and MAC address turn on filtering on WAG320N

    When disabling SSID broadcast and enabling MAC address filtering on WAG320N, my other laptop wireless disconnected.  And when you try to connect, it connects again.

    You can not hide from intruders.

    The router always sends the tag. The router is immediately detected.

    The SSID is always transferred not encrypted. He is always sent over the association. It is easy to force a re-Association. If there is a single device without wire connected to the access point it takes about a second to learn the SSID.

    Disable the SSID requires your wireless devices to search actively for the network. This means that your laptop will always try to connect to your SSID, as long as it is not connected to another network. As sending requires much more power then listen passively it drains your battery.

    And, in fact, if you are in an internet café anyone can learn your SSID in time where you go on the wireless at the moment where you associate with the network of internet café.

    In addition, it causes many problems with different wireless, as instability or similar cards.

    MAC filtering is still more useless that the MAC address is always part of any wireless transmission and it's always clear. It is extremely easy to pick up the allowed MAC addresses, and it is extremely easy to change the MAC address of a wireless card.

    New: use the real security and forget this nickname of security features.

    What you try to do is a waste of time. Of your time. It will slow down any intruder.

    See also

    http://homecommunity.Cisco.com/T5/wireless-routers/iPad-Wi-Fi-MAC-address-quot-not-a-MAC-address-quo...
    http://homecommunity.Cisco.com/T5/wireless-routers/is-my-router-effectively-secured/m-p/333945#M1752...

  • Group of endpoint Cisco ISE 1.4 hotspot

    Patch 1.4 Cisco ISE 6

    Cisco WLC 8.0.121

    Setup

    the WLC has a named Hotspot SSID. It uses mac auth with radius of the NAC to redirect to the Hotspot portal of reviews on the ISE.

    drops flexconnect users in vlan 401 (with preAuthAcl), after the PSU, it is initially a COA to move users to VLANs 413 with permitInternetAcl

    Description of the problem:

    users connect to the SSID of the access point and get an IP address valid in vlan 401

    redirected to the page of the hotspot on the ISE with a PSU and the PIN code request.

    are they disconnect from the network and reconnect, the ISE sends a certificate of authenticity to move to 413 without the Hotspot portal.

    what I've noticed, is that as soon as users get the redirect of the original Web page, they are moved to the endpoint group defined in the hotspot portal.

    What I've read about this behavior makes me understand that it is a default behavior, but if that's the case then I'm not sure on how I can make my font to check if the PSU has been accepted.

    Thank you

    Maarten

    Cisco WLC 8.2.100

    Patch 1.4 ISE 6

    Similar Hotspot ISE installation, of similar rules except change VLAN. I have observed the same behavior.

    This configuration was working on patch 5.

    Update:

    I found a solution based on the following bug. Use the following attribute in the authorization rule. The success page remains but no Instant Internet access is available using this workaround solution.

    https://Tools.Cisco.com/bugsearch/bug/CSCux22558/?referring_site=bugquic...

    ' Workaround:
    "Use the LEAST 24 endpoints: LastAUPAcceptanceHours for example (means PUA agreed less than 24 hours ago).

Maybe you are looking for