Introduction
With the release of Android 10 and iOS 14, MAC Address Randomization was introduced to attempt to prevent users from being tracked based on their wireless MAC address. This is good for privacy when joining hotspot networks but makes device tracking difficult in an enterprise environment, especially when attempting to profile these devices or use a Mobile Device Manager to ensure the device is compliant with an orginization's security policy before gaining network access.
For the profiling and MDM services, end users can be instructed to disable MAC randomization on the device before getting intended network access. This can be achieved by redirecting users to a modified hotspot page that provides instructions to disable MAC randomization when the device is using a random MAC address to connect to the network. Once MAC randomization is disabled, the user can connect normally.
Configuration
- Navigate to Administration > Identity Management > Groups, select Endpoint Identity Groups and select Add to create new endpoint group called Random_MAC_Endpoints
- Navigate to Work Centers > Guest Access > Portals & Components, select Guest portals and select Create to create new hotspot guest portal called Random MAC Detected
- Under Portal Settings, select endpoint group created above for the Endpoint identity group
- Select Portal Page Customization
- Under Text Elements, change Banner title to Random MAC detected
- Select Acceptable Use Policy
- Change Content Title to: Your device is using random MAC address
- Add following text to the Instructional Text page:
Please change the network setting on your device to use global MAC address instead of random MAC address to gain network access.
Further instructions can also be provided with specifics on disabling MAC Randomization per SSID or globally on the device.
- Add following optional content on the AUP page to remove hotspot portal elements (Make sure to select Toggle HTML Source button before and after pasting in the script):
<script>
(function(){
jQuery('.cisco-ise-aup-text').hide();
jQuery('.cisco-ise-aup-controls').hide();
setTimeout(function(){ jQuery('#portal-session-timeout-popup-screen, #portal-session-timeout-popup-popup, #portal-session-timeout-popup').remove(); }, 100);
})();
</script>
- Other settings on this page can be changed to provide instructions on how to modify the MAC randomization setting on the devices, once done select Save
- Create Authorization profile called Random_MAC to redirect to the page created above
- Create Authorization policy rule to use Random_MAC with condition that matches on any Randomized MAC address for any SSIDs to deny random MAC address. Here, regex string matching condition (MATCHES ^.[26AEae].*) is used to identify random MAC address that utilizes locally significant bit of the MAC address which both Android and iOS devices follow
Device Specific Instructions
The following are steps that the user can be instructed to complete for some common devices. Vendors of specific devices could have slightly different steps for disabling MAC Randomization on their devices.
Android:
- Open the Settings app.
- Select Network and Internet.
- Select WiFi.
- Ensure you are connected to the corporate SSID.
- Tap the gear icon next to the current WIFI connection.
- Select Advanced.
- Select Privacy.
- Select Use Device MAC.
Apple:
Apple has publish an article with instructions on disabling MAC Randomization on their devices:
https://support.apple.com/en-us/HT211227
Windows:
As of the writing of this article, randomized MAC addresses are disabled by default on Windows but a user can choose to turn it on, here are instructions on disabling the feature if enabled: