<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MAC Authentication in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91442#M272</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am looking into enabling NAC on our network and unfortunately, I have to use MAC AUTH for some end devices that don’t support 802.1X. OF course, using MAC AUTH is nothing but a deterrent as it’s very easy to spoof MACs…&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I find when I enable MAC AUTH on XMC, the first question is what password to use. I am wondering what is the use of using a password or no password? My radius communication is protected by the shared key, in PAP (which EXOS does) anyways…&amp;nbsp;it’s only between switch and NAC so what point is it to add a password? if someone uses a device with the same MAC, they get access to network anyways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insight would be great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
    <pubDate>Fri, 05 Mar 2021 05:07:16 GMT</pubDate>
    <dc:creator>Chad5</dc:creator>
    <dc:date>2021-03-05T05:07:16Z</dc:date>
    <item>
      <title>MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91442#M272</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am looking into enabling NAC on our network and unfortunately, I have to use MAC AUTH for some end devices that don’t support 802.1X. OF course, using MAC AUTH is nothing but a deterrent as it’s very easy to spoof MACs…&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I find when I enable MAC AUTH on XMC, the first question is what password to use. I am wondering what is the use of using a password or no password? My radius communication is protected by the shared key, in PAP (which EXOS does) anyways…&amp;nbsp;it’s only between switch and NAC so what point is it to add a password? if someone uses a device with the same MAC, they get access to network anyways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insight would be great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 05:07:16 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91442#M272</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-03-05T05:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91443#M273</link>
      <description>&lt;P&gt;Does this help:&amp;nbsp;&lt;A href="https://extreme.connectedcommunity.org/communities/community-home/digestviewer/view-question?ContributedContentKey=91caca9a-e322-46fa-9c1d-f868c07e3789&amp;amp;CommunityKey=d4b57428-7c7e-4bce-886a-356352ffa2c0&amp;amp;tab=digestviewer" target="_self" rel="noreferrer"&gt;XMC MAC Authentication Settings | Extreme Networks Support Community&lt;/A&gt;&amp;nbsp;?&lt;/P&gt;&lt;P&gt;“when the new MAC is seen on the port the switch does generate radius request to the radius server. The request does have username and password. The username is the mac address. The password is what you can define.”&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 05:11:44 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91443#M273</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-03-05T05:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91444#M274</link>
      <description>&lt;P&gt;Hi Chad,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have to look on both sides for this.&lt;/P&gt;&lt;P&gt;On XMC what is possible AND on your switch to see what password options are common to both devices.&lt;/P&gt;&lt;P&gt;You’ll use the one you prefer, usually people stick to the MAC address as password.&lt;/P&gt;&lt;P&gt;Here a screenshot from an ERS switch:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="adfdee7839554c4a93e4e27a51c1929f_5ccdb2ef-fa2d-4185-92a0-f54cfa4d8384.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/79iCFA2A41A8E575E13/image-size/large?v=v2&amp;amp;px=999" role="button" title="adfdee7839554c4a93e4e27a51c1929f_5ccdb2ef-fa2d-4185-92a0-f54cfa4d8384.png" alt="adfdee7839554c4a93e4e27a51c1929f_5ccdb2ef-fa2d-4185-92a0-f54cfa4d8384.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 05:12:25 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91444#M274</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2021-03-05T05:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91445#M275</link>
      <description>&lt;P&gt;Thank you for the replies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am familiar with the various options for MAC auth user/password. what I was eluding to is that having a password does not add to the security of MAC AUTH (if a key is chosen for example). It&amp;nbsp;only adds&amp;nbsp;a password between switch and radius server, where is already a shared key. It does not add any benefit on the client side (between client and switch). MAC spoofing is very simple to do. not much we can do about it.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 22:18:17 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91445#M275</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-03-05T22:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91446#M276</link>
      <description>&lt;P&gt;If I remember this correctly, this behaviour is useful when you combine the MAC-Auth with your AD. I don’t know the exact procedure but I’m sure there is a use-case for this MAC Auth Password.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I might provide you with more details later...&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 22:23:56 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91446#M276</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-03-05T22:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91447#M277</link>
      <description>&lt;P&gt;&lt;USER-MENTION data-id="9898672"&gt;@Stefan K.&lt;/USER-MENTION&gt;&amp;nbsp;Oh, I would be really interested to see a good use case. Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am forced to use MAC-AUTH for devices on the network that don’t support 802.1X and looking for any way to improve the security if possible… Otherwise, anyone can yank a device, take it’s MAC, spoof it on their laptop and connect to network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 22:35:42 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91447#M277</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-03-05T22:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91448#M278</link>
      <description>&lt;P&gt;Hello Chad,&lt;/P&gt;&lt;P&gt;It does not improve the security, but if you put the devices with MAC auth into a separate network and then restrict their access via policies or ACLs, you at least reduce the impact of an intrusion. For example, only allow printers access to the print server with the necessary ports.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Mar 2021 05:25:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91448#M278</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2021-03-06T05:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Authentication</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91449#M279</link>
      <description>&lt;P&gt;Yes exactly. That is the plan. So I am leaving the default MAC auth password (which is basically the mac I think) without adding a password since it doesn’t add anything extra.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the note.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 23:29:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/mac-authentication/m-p/91449#M279</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-03-08T23:29:27Z</dc:date>
    </item>
  </channel>
</rss>

