<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dual NIC on windows client breaks Cisco Umbrella SIG in Cloud Security</title>
    <link>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5163204#M1990</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;We've been testing if it's possible to break Umbrella on a Windows clients, and what we've found out is that if there's multiple NICs available, it's possible to disconnect the first NIC and then pass traffic on the second NIC to bypass Umbrella. No admin creds needs, just physical disconnects.&lt;/P&gt;
&lt;P&gt;I can't find any documentation on Umbrella and dual NICs on a client, and how to prevent this.&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;</description>
    <pubDate>Tue, 20 Aug 2024 14:14:58 GMT</pubDate>
    <dc:creator>upllopyeret</dc:creator>
    <dc:date>2024-08-20T14:14:58Z</dc:date>
    <item>
      <title>Dual NIC on windows client breaks Cisco Umbrella SIG</title>
      <link>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5163204#M1990</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;We've been testing if it's possible to break Umbrella on a Windows clients, and what we've found out is that if there's multiple NICs available, it's possible to disconnect the first NIC and then pass traffic on the second NIC to bypass Umbrella. No admin creds needs, just physical disconnects.&lt;/P&gt;
&lt;P&gt;I can't find any documentation on Umbrella and dual NICs on a client, and how to prevent this.&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 14:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5163204#M1990</guid>
      <dc:creator>upllopyeret</dc:creator>
      <dc:date>2024-08-20T14:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dual NIC on windows client breaks Cisco Umbrella SIG</title>
      <link>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5163284#M1991</link>
      <description>Replied to your reddit post too...&lt;BR /&gt;&lt;BR /&gt;Newer builds use TND to catch that.  Upgrade to 5.1.4.74 or later.&lt;BR /&gt;Release Notes for Cisco Secure Client (including AnyConnect), Release 5.1 - Cisco&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;Ken&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5163284#M1991</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2024-08-20T15:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Dual NIC on windows client breaks Cisco Umbrella SIG</title>
      <link>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5164416#M1992</link>
      <description>&lt;H3&gt;Potential Solutions to Prevent Bypassing Umbrella with Dual NICs:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Network Interface Binding:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the client to bind DNS requests to a specific NIC. This forces all DNS traffic to go through the NIC that Umbrella is monitoring.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Disable Secondary NICs:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If possible, disable secondary NICs via Group Policy or manually configure them to prevent their use for network traffic.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Host-based Firewall Rules:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Implement host-based firewall rules that restrict traffic on the secondary NIC, allowing only essential or specified traffic while ensuring DNS requests are forced through the primary NIC.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Routing Table Configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the routing table on the client device so that DNS traffic is only routed through the NIC associated with Umbrella. This can be enforced using static routes.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Advanced Network Policies:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use Network Access Control (NAC) or other endpoint management tools to enforce policies that only allow traffic from approved NICs or restrict network access based on the NIC in use.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Umbrella Virtual Appliance:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Deploy the Cisco Umbrella Virtual Appliance (VA) in your network to monitor and enforce DNS traffic at a more granular level. The VA can be configured to inspect traffic regardless of the NIC in use.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Endpoint Protection Integration:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Integrate Umbrella with endpoint protection tools like Cisco AnyConnect Secure Mobility Client, which can enforce DNS security across all network interfaces.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Monitor Network Activity:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Regularly monitor network activity for unusual patterns, such as devices suddenly switching NICs or using unmonitored network interfaces.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 22 Aug 2024 11:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/dual-nic-on-windows-client-breaks-cisco-umbrella-sig/m-p/5164416#M1992</guid>
      <dc:creator>vishalbhandari</dc:creator>
      <dc:date>2024-08-22T11:53:03Z</dc:date>
    </item>
  </channel>
</rss>

