<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Rahul, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047650#M23133</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks Rahul,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To Clarify further my understanding&lt;/P&gt;
&lt;P&gt;MAB authentication is for devices on the network, IP Camera, Card readers etc..&lt;/P&gt;
&lt;P&gt;So this matches one of my use cases. Excellent.&lt;/P&gt;
&lt;P&gt;From your explanation I understand that authentication and authorisation will have to work hand in hand for the requirement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CWA&lt;/P&gt;
&lt;P&gt;For CWA to work you have to fail MAB authentication. (As the device is a guest/unknown on your network).&lt;/P&gt;
&lt;P&gt;So the &lt;STRONG&gt;MAB&lt;/STRONG&gt; rule/condition is "&lt;STRONG&gt;if authentication = failed&lt;/STRONG&gt;" &amp;amp; "If &lt;STRONG&gt;user not found = continue&lt;/STRONG&gt;" in the &lt;STRONG&gt;internal endpoints database.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point the authorisation rule configured will send down the redirect URL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The problem I'm hitting is the default behaviour of ISE is to profile and add the device into the Endpoint database. So Phase 1 of CWA with the above condition will not pass because ISE has profiled and added the guest device into the internal endpoint database.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm guess the MAB rule may have to change to something like &amp;nbsp;&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;"&lt;/SPAN&gt;&lt;STRONG&gt;if authentication = failed&lt;/STRONG&gt;&lt;SPAN&gt;" &amp;amp; "If &lt;/SPAN&gt;&lt;STRONG&gt;user not found = continue&lt;/STRONG&gt;&lt;SPAN&gt;" in the &lt;/SPAN&gt;&lt;SPAN style="text-decoration: line-through;"&gt;&lt;STRONG&gt;internal endpoints database.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;profile group (i.e hp printers)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Apr 2017 14:32:24 GMT</pubDate>
    <dc:creator>akbarayub2013</dc:creator>
    <dc:date>2017-04-19T14:32:24Z</dc:date>
    <item>
      <title>Cisco ISE 2.2 profiling and Endpoint database</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047648#M23131</link>
      <description>&lt;P&gt;Scenario 1. Switch port configured for MAB and dot1x. Cisco ISE 2.2 configured for network authentication.&lt;/P&gt;
&lt;P&gt;Dell laptop is then connected to switch port. ISE dynamically profile the laptop as Dell. Adds the MAC address to the internal endpoint database.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authentication passes. Default authorisation permit access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Question. Why is ISE adding the MAC address to the internal endpoint database​. Surely this is a security risk. If ISE is dynamically profiling then adding to the internal endpoint database. An attacker can connect his laptop to a switch and be authenticated. How do you stop this without creating and authorisation profile to restrict access. Surely you should be able to configure ISE so authentication fails.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Scenario 2. Following the Central web authentication work flow. I can not get authentication to fail because every device i connect to the port is dynamically profiled and added to the internal endpoint database. Then authentication passes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Question 2. The default behaviour of ISE which is to profile and add device in to endpoint database and then pass authentication for device will mean you can never pass phase 1 of the CWA work flow. How do you get around this?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047648#M23131</guid>
      <dc:creator>akbarayub2013</dc:creator>
      <dc:date>2019-03-11T07:38:23Z</dc:date>
    </item>
    <item>
      <title>In most cases, Internal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047649#M23132</link>
      <description>&lt;P&gt;In most cases, Internal Endpoints is only used for authentication. Authorization is used in conjunction with a specific Profiled group (say Dell, Cisco IP phone) to allow access.&lt;/P&gt;
&lt;P&gt;For CWA, you would need to authenticate known mac addresses and allow unknown mac address to authenticate. Authorization is where you would use a policy to catch any unknown mac address into the CWA redirect.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 12:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047649#M23132</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-04-19T12:01:08Z</dc:date>
    </item>
    <item>
      <title>Thanks Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047650#M23133</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks Rahul,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To Clarify further my understanding&lt;/P&gt;
&lt;P&gt;MAB authentication is for devices on the network, IP Camera, Card readers etc..&lt;/P&gt;
&lt;P&gt;So this matches one of my use cases. Excellent.&lt;/P&gt;
&lt;P&gt;From your explanation I understand that authentication and authorisation will have to work hand in hand for the requirement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CWA&lt;/P&gt;
&lt;P&gt;For CWA to work you have to fail MAB authentication. (As the device is a guest/unknown on your network).&lt;/P&gt;
&lt;P&gt;So the &lt;STRONG&gt;MAB&lt;/STRONG&gt; rule/condition is "&lt;STRONG&gt;if authentication = failed&lt;/STRONG&gt;" &amp;amp; "If &lt;STRONG&gt;user not found = continue&lt;/STRONG&gt;" in the &lt;STRONG&gt;internal endpoints database.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point the authorisation rule configured will send down the redirect URL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The problem I'm hitting is the default behaviour of ISE is to profile and add the device into the Endpoint database. So Phase 1 of CWA with the above condition will not pass because ISE has profiled and added the guest device into the internal endpoint database.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm guess the MAB rule may have to change to something like &amp;nbsp;&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;"&lt;/SPAN&gt;&lt;STRONG&gt;if authentication = failed&lt;/STRONG&gt;&lt;SPAN&gt;" &amp;amp; "If &lt;/SPAN&gt;&lt;STRONG&gt;user not found = continue&lt;/STRONG&gt;&lt;SPAN&gt;" in the &lt;/SPAN&gt;&lt;SPAN style="text-decoration: line-through;"&gt;&lt;STRONG&gt;internal endpoints database.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;profile group (i.e hp printers)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 14:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3047650#M23133</guid>
      <dc:creator>akbarayub2013</dc:creator>
      <dc:date>2017-04-19T14:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: In most cases, Internal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3673711#M23134</link>
      <description>&lt;P&gt;So is my thinking correct that if there is multiple authentication conditions then the authorization condition that has the profile "PermitAccess" should also have more than just the condition "Network_Access_Authentication_Passed" which is what the default policy is doing. It should be "Wired_802.1x and&amp;nbsp;Network_Access_Authentication_Passed" so that a wired MAB that passes auth but is not yet part of a specific endpoint group such as an IP Phone group or Printer group will be denyied access. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 21:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-profiling-and-endpoint-database/m-p/3673711#M23134</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2018-07-24T21:22:48Z</dc:date>
    </item>
  </channel>
</rss>

