<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - how-to prevent mac spoofing in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239159#M127668</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Read the coa section&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 27 Apr 2013 15:26:00 GMT</pubDate>
    <dc:creator>George Stefanick</dc:creator>
    <dc:date>2013-04-27T15:26:00Z</dc:date>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239157#M127666</link>
      <description>&lt;P&gt;I've built an ISE lab (1.1.3.124) and have an authorization policy which permits access to profiled Cisco-Access-Points. For the purpose of the lab, these devices have full access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Profiling is working correctly. I have a 1231 AP which is correctly profiled and placed in an endpoint group, Cisco-Access-Point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From a Linux laptop, using macchanger, I can successfully spoof the mac of the AP and gain full access - for some reason ISE isn't profile checking the laptop and I'm not sure why. The laptop obtains an IP using DHCP. I have the following profile checks enabled: NetFlow, DHCP, RADIUS, DNS, SNMP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I check Live Authentications, apart from the session IDs, there is no difference when comparing the authz between the AP and the spoofed laptop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping that ISE would recognise the spoofed attempt and let it fall through to the deny policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm happy to attach any screenshots if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239157#M127666</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2019-03-11T03:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239158#M127667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try deleting the MAC address in ISE and then try your spoof again ..&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 15:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239158#M127667</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2013-04-27T15:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239159#M127668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Read the coa section&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 15:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239159#M127668</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2013-04-27T15:26:00Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239160#M127669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks - I will check the link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already tried deleting the MAC address from ISE. When I attach the Linux laptop with the spoofed address, it correctly sits at a lower CWA policy and is profiled as Linux Workstation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The profiling part is working beautifully, but I can't figure out why ISE is allowing the spoof to take place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 15:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239160#M127669</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-04-27T15:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239161#M127670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It sounds like to me coa isn't working. Check that link out and tell ,e what you think based on your config ..&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 15:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239161#M127670</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2013-04-27T15:40:32Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239162#M127671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have checked the config guide. My profiler configuration, CoA type was already set to &lt;STRONG&gt;port bounce&lt;/STRONG&gt;. I've also tried &lt;STRONG&gt;reauth &lt;/STRONG&gt;- same result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I delete the device (listed as Cisco-Access-Point) from ISE, while the spoofed Linux device is attached, a CoA is issued, a port-bounce (or reauth) occurs, then the device is profiled as Linux-Workstation and sits at a lower policy for CWA - all OK there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I'm testing this is to have the AP profiled and authorized. Disconnect the cable from the AP and plug this into my spoofed MAC interface on a Linux laptop. ISE doesn't recognise it's a different device and returns the authz profile for Cisco-Access-Point identity group.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 16:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239162#M127671</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-04-27T16:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239163#M127672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like ise is not validating the probes after a device has been profiled ..&lt;BR /&gt;&lt;BR /&gt;I would open a ticket on this one .. Or perhaps Monday when other folks hit the forums they might have some additional ideas ..&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 16:27:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239163#M127672</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2013-04-27T16:27:49Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239164#M127673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I've just observed a very odd result which is repeatable!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remove the MAC from ISE. Then attach the Linux device, with it's spoofed address, it is correctly profiled and sits at a CWA policy. I then attach the cable to the Cisco AP, after a shortwhile, a CoA goes out and it is re-profied as a Cisco-Access-Point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the behaviour I want to see, but in reverse.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Apr 2013 17:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239164#M127673</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-04-27T17:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239165#M127674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is Cisco working on this?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 18:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239165#M127674</guid>
      <dc:creator>mlezerkiewicz</dc:creator>
      <dc:date>2013-05-08T18:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239166#M127675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;May I know if you are using Certificates for profiling purposes ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I believe that certificates are not being used. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the certificates for Profiling purposes, then the MAC address of a device would be bind with the certificate and could only be spoofed, if a duplicate certificate could be made.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Mohit Sonnie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 21:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239166#M127675</guid>
      <dc:creator>msonnie</dc:creator>
      <dc:date>2013-05-08T21:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239167#M127676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running the 90 day trial of ISE, so I don't believe I can raise a TAC case on this - unless someone can let me know another way to raise this with Cisco? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 08:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239167#M127676</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-05-09T08:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239168#M127677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not using certificates in this case. Many network devices don't have the ability to auth with certificates, so I am testing this using MAB. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/people/gstefanick" id="jive-33287003157531075144" style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; outline: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;George Stefanick&lt;/A&gt; sums it up above, "&lt;SPAN style="font-size: 10pt;"&gt;ise is not validating the probes after a device has been profiled", which I agree with. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 08:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239168#M127677</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-05-09T08:44:13Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239169#M127678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to update this thread. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have re-tested this with ISE 1.2 (patch 2), and it behaves the same as above!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Profiled Cisco AP. Unplug the AP. Attach a laptop (Linux or Windows) with a spoofed MAC (same MAC as the Cisco AP), and ISE permits access with the same result profile as the AP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I expecting too much from ISE here - I thought the "intelligent" profiling should combat this type of thing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 22:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239169#M127678</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-10-18T22:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239170#M127679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This may or may not be already known, so I'm going to describe how I would expect ISE to work. &lt;/P&gt;&lt;UL&gt;&lt;LI&gt; Authentications based on profiling &lt;UL&gt;&lt;LI&gt;The first time a device comes through ISE, it could get the wrong result you would expect the device to get. This is due to the fact that ISE has a bit of a challenge - to identify and authorize new users to its system before the probes can learn anything about these endpoints. &lt;UL&gt;&lt;LI&gt;For example, DHCP and HTTP are fairly useless until after the port becomes authorized since no client traffic can flow before an authentication occurs. ISE might apply the catch-all CWA result allowing it on the network, but then the DHCP class identifier could say 'Cisco AP'. &lt;/LI&gt;&lt;LI&gt;ISE knows that any new profiled information could result in a different AuthZ policy, so it issues a CoA to inform the NAD to re-authenticate that particular session. &lt;/LI&gt;&lt;LI&gt;The same authentication occurs now, but ISE now already knows the device appears to act like a Cisco AP and hands back the WAP result this time instead of CWA.&lt;/LI&gt;&lt;LI&gt;Any future authentications that occur for this Cisco AP, we pass back the Cisco AP result since we know he was previously an AP. Our probes would still learn as much as they can about the 'new' authentication, but no data would change from our end since the probes learn redundant information for this legit Cisco AP. &lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, what you're describing is you're performing MAB and swapping out the profiled Cisco AP with another device that is spoofing the MAC address. MAB literally stands for 'MAC Address Bypass', so when ISE is presented with the MAC address it checks its internal host store and finds out he does in fact know 'AA-BB-CC-DD-EE-FF'. The spoofed device was previously known to be a Cisco AP, so ISE will hand out the Cisco AP result allowing it on the network infrastructure VLAN with a special DACL if you're getting fancy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your point here is that the spoofed PC is allowed on the network, when in fact it isn't a Cisco AP. What should happen at this point is the probes start doing their magic. The only way a device becomes a 'Cisco-Access-Point' is if the CDP entry in the switch contains 'AIR' or the dhcp-class-identifier includes 'Cisco AP'. So what I would expect happen is if you have SNMP Query/Trap probes setup and working, as soon as the linux laptop plugs in with the spoofed MAC the switch would inform ISE that a link came up/up. ISE sends back an SNMP Query asking for more information, which the switch then provides. ISE would then realize that there's no CDP information there (unless your linux test box is utilizing CDP, then this is a mute point anyways) and update the session endpoint in its internal hosts either during or before the actual authentication occurs. If it's during, ISE would trigger a CoA, which would cause the endpoint to reauthenticate then fall into (probably) the Cisco-Devices group based of the OUI of the MAC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other way to become a Cisco-Access-Point by default is through the dhcp class identifier. So lets say your linux box authenticates, ISE passes back the AP result, and you're allowed on the network. Once you issue a DHCP Discover from your box, ISE should recieve it and learn that the DHCP class identifier has changed from what it expected ('Cisco AP') to something different and issue a CoA. The linux box will reauthenticate, and get passed back the generic CWA profile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ultimately the entire job relies on either the DHCP probe, SNMP Trap/Query Probes, and CoA...unless you've modified the profiling settings from the default. Since you mentioned deleting the MAC address from the internal hosts section forces ISE to send back CWA, i'm thinking that your switch config might be missing the CoA portion. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. What probes do you have enabled. This by default requires DHCP, DHCP Span, or SNMP Query/Trap.&lt;/P&gt;&lt;P&gt;2. Can you see the successful CoA from the switch?&lt;/P&gt;&lt;P&gt;3. If you wait ~5 minutes after the linux box with the spoofed address authenticates and check the internal host, what does ISE know about that device? If my CoA theory is right I would expect after even a couple minutes we would recognize that the device isn't a Cisco WAP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 04:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239170#M127679</guid>
      <dc:creator>Sam Hertica</dc:creator>
      <dc:date>2013-10-19T04:25:25Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239171#M127680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the detailed reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following probes enabled:&lt;/P&gt;&lt;P&gt;DHCP&lt;/P&gt;&lt;P&gt;DHCPSPAN&lt;/P&gt;&lt;P&gt;HTTP&lt;/P&gt;&lt;P&gt;RADIUS&lt;/P&gt;&lt;P&gt;DNS&lt;/P&gt;&lt;P&gt;SNMPQUERY&lt;/P&gt;&lt;P&gt;SNMPTRAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the mab auth on the switch when the Windows XP laptop with spoofed address is attached:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%AUTHMGR-5-START: Starting 'mab' for client (001b.2abc.5de0) on Interface Fa0/2 AuditSessionID C0A863FE0000001923A54152&lt;/P&gt;&lt;P&gt;%MAB-5-SUCCESS: Authentication successful for client (001b.2abc.5de0) on Interface Fa0/2 AuditSessionID C0A863FE0000001923A54152&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%AUTHMGR-5-SUCCESS: Authorization succeeded for client (001b.2abc.5de0) on Interface Fa0/2 AuditSessionID C0A863FE0000001923A54152&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3560-1#sh authentication sessions interface fa0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; FastEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 001b.2abc.5de0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 192.168.99.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; 00-1B-2A-BC-5D-E0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Policy:&amp;nbsp; Should Secure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Status:&amp;nbsp; Unsecure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Group:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-L2-WLC-ONLY-5261a14b&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; 20s (local), Remaining: 5s&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; C0A863FE0000001923A54152&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x000000AB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0xB3000019&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Runnable methods list:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Failed over&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I wait 10 minutes, ISE still has the laptop profiled as Cisco-AP-Aironet-1130.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's some relevant portions of my 3560 running c3560-ipservicesk9-mz.122-55.SE7.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community ciscoro RO 10&lt;/P&gt;&lt;P&gt;snmp-server community ciscorw RW 10&lt;/P&gt;&lt;P&gt;snmp-server trap-source Vlan1&lt;/P&gt;&lt;P&gt;snmp-server source-interface informs Vlan1&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps mac-notification change move threshold&lt;/P&gt;&lt;P&gt;snmp-server host 192.168.99.11 ciscoro&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 99&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport block unicast&lt;/P&gt;&lt;P&gt; ip arp inspection limit rate 100&lt;/P&gt;&lt;P&gt; ip access-group ACL_DEFAULT in&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x mab webauth&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab webauth&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication timer inactivity 20&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; snmp trap mac-notification change added&lt;/P&gt;&lt;P&gt; snmp trap mac-notification change removed&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt; ip dhcp snooping limit rate 200&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 07:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239171#M127680</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-10-19T07:33:23Z</dc:date>
    </item>
    <item>
      <title>ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239172#M127681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;c.andrew wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the detailed reply.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Not a problem, to be honest I would have replied sooner but it looks like whenever I looked through these forums I missed this post time and time again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your switchside SNMP config looks fine. Since you're using authentication open, DHCP is a useful probe (assuming it's unblocked in the ACL_DEFAULT) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DHCP probes will only work if you have either a span session of that interface/vlan heading to ISE or if you setup an 'ip helper-address' for that vlan. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If ISE still believes after 10 minutes that it's still a Cisco AP, then it seems like either we're not getting the profiler information for the linux box, or we are getting it but we're ignoring it for some reason. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you take a screenshot of the spoofed linux endpoint in the Internal Hosts section of ISE? If you scroll through the list it should show you all the attributes ISE has learned about that particular endpoint, and i'm curious what's still tying it to be an AP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 13:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239172#M127681</guid>
      <dc:creator>Sam Hertica</dc:creator>
      <dc:date>2013-10-19T13:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239173#M127682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I've got ip helper on the relevant VLAN interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan99&lt;/P&gt;&lt;P&gt; ip address 192.168.99.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip helper-address 192.168.99.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've put the output of the host in a PDF, attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The laptop was booted into it's Win XP partition, but it doesn't matter whether it's running XP or Centos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 17:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239173#M127682</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-10-19T17:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239174#M127683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The laptop was booted into it's Win XP partition, but it doesn't matter whether it's running XP or Centos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right. A MAC address is a MAC address &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;. I skimmed your earlier response and assumed we kept running with linux, but as long as the MAC is the same it's no big deal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll highlight what I think is interesting from that report&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;EndPointSource is DHCPSpan. This is the last probe ISE used to get information about this client&lt;/LI&gt;&lt;LI&gt;OUI is Cisco Systems. We expect this. &lt;/LI&gt;&lt;LI&gt;dhcp-class-identifier is MSFT 5.0. We expect this. &lt;/LI&gt;&lt;LI&gt;cdpCachePlatform is cisco AIR-AP&lt;MODEL&gt;. I would expect this to be blank...&lt;/MODEL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so it seems like somethings iffy with our SNMP Query/Trap. I would have expected as soon as you plugged in the XP box, switch sends SNMP trap to ISE for linkup, ISE sends back SNMP query to read the device. SNMP Query/Traps are clearly working fine since you have CDP information, so something weird is happening here. There's a ton of things that could be wrong here, so we'll work through them one by one. We can start by taking a packet capture from ISE (Under operations -&amp;gt; diagnostic tools) to rule out where to look. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Switch doesn't send SNMP Trap to ISE after linkup for xp.&lt;/LI&gt;&lt;LI&gt;ISE doesn't recieve the SNMP Trap. &lt;/LI&gt;&lt;LI&gt;ISE doesn't process the SNMP Trap. &lt;/LI&gt;&lt;LI&gt;ISE doesn't trigger SNMP Query. &lt;/LI&gt;&lt;LI&gt;Switch doesn't recieve SNMP Query.&lt;/LI&gt;&lt;LI&gt;Switch doesn't process the SNMP Query.&lt;/LI&gt;&lt;LI&gt;Switch doesn't reply to the query.&lt;/LI&gt;&lt;LI&gt;ISE doesn't recieve the query.&lt;/LI&gt;&lt;LI&gt;ISE doesn't process the query. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's unlikely that there's connectivity issues, but I hate ruling things out based on my assumptions...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Speaking of assumptions, I am also assuming that you are directly connecting the Cisco AP to the switch, and the XP box to the switch. This would mean that as soon as we disconnect the Cisco AP, the switch clears out the CDP information for that port. When the PC is plugged in, the CDP information stays empty. Please confirm you are directly connecting to the switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, what ISE is currently doing with the information it has is also expected. When ISE is attempting to profile the top-level for this device, we can tell that Cisco-Device gets +20 certainty factor from the OUI and the cdpDevicePlatform containing 'Cisco'. Workstation would get +20 for the MSFT dhcp class identifier. Cisco-Device has a minimum certainty factor of 10, while MSFT has 20. They are both considered, but ultimately Cisco-Device wins apparently. This i'm unclear about, whether Cisco-Device wins first because it's technically checked before Workstation, or if it's due to the fact MSFT is 20/20, and Cisco-Device is 20/10. Regardless, the problem here is the cdpCachePlatform isn't getting updated to being blank, which is why it's falling into Cisco-Device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that it's inside Cisco-Device, we run through all the child policies for Cisco-Device. Because the cdpCachePlatform includes AIR we get dropped into teh Cisco-Access-Point. We scan through the child policies again, and the cdpCachePlatform gets us placed into the specific profiled group Cisco-Ap-Aironet-1130. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What SHOULD happen is ISE recieves updated information from the switch with regards to an empty CDP information. I would expect ISE to update the endpoint accordingly and issue a CoA. The profiler would look through all the parent policies, and match on Cisco-Device and Workstation. However, the only reason we believe it's a Cisco-Device is due to the OUI (which gives us +10 CF, and is what we expect). ISE would also think it's a Workstation because the DHCP class identifier contains MSFT, giving that policy +20 CF. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE will profile it as a Workstation, since it has a higher CF. Now ISE scans through the children of workstation, and will assign Windows-Workstation since the DHCP class identifier is MSFT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ultimately the problem is the lingering CDP information in the endpoint store. We need to figure out what is at device is at fault here before diving even deeper. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 18:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239174#M127683</guid>
      <dc:creator>Sam Hertica</dc:creator>
      <dc:date>2013-10-19T18:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239175#M127684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the laptop / AP is plugged directly into Fa0/2 of my 3560.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obtaining a packet capture has been challenging. No matter which host or browser I used, the pcap file was unreadable by Wireshark - regardless of whether I applied filters or not. The error reported is "The file... isn't a capture file in a format Wireshark understands". I'm running the latest version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I've configured two separate monitor sessions. One on the port connecting ISE - on this one, I filtered on ISE's MAC address since it is a VM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second monitor is on Fa0/2 (laptop). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both captures record the laptop being plugged in and end with the successful mab authz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 21:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239175#M127684</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-10-19T21:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - how-to prevent mac spoofing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239176#M127685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just noticed a "human readable" option on the packet capture. So I've obtained the attached from ISE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 21:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-how-to-prevent-mac-spoofing/m-p/2239176#M127685</guid>
      <dc:creator>c.andrew</dc:creator>
      <dc:date>2013-10-19T21:48:15Z</dc:date>
    </item>
  </channel>
</rss>

