<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic A very good read for choosing in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915328#M39933</link>
    <description>&lt;P&gt;A very good read for choosing the right probes is the &lt;A href="http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-30-ISE_Profiling_Design_Guide.pdf"&gt;Cisco ISE Profiling Design Guide&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Thu, 12 May 2016 20:31:00 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-05-12T20:31:00Z</dc:date>
    <item>
      <title>Do I really need the SNMP Query probe?</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915326#M39931</link>
      <description>&lt;P&gt;I am currently using three probes on my PSNs. Radius, DHCP, and SNMP Query.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was told that my SNMP Query may be useless if I was already grabbing the info I needed from Radius. If I just pick some random endpoints, I see that they are profiled either using the DHCP or Radius probe.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the interest of saving resources and eliminating overhead, should I just disable the SNMP Query probe? Will I be able to gather the same info?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, here is my switch config regarding probes (I'm running 4510R+E SUP8, 3.6.3)...&lt;/P&gt;
&lt;P&gt;aaa group server radius ISE_RADIUS&lt;BR /&gt; server name ISE_PSN1&lt;BR /&gt; server name ISE_PSN2&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt; client 1.1.1.1&amp;nbsp;server-key&amp;nbsp;xxx&lt;BR /&gt; client 1.1.1.2&amp;nbsp;server-key&amp;nbsp;xxx&lt;BR /&gt;ip radius source-interface Vlan1&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 30 tries 3&lt;BR /&gt;radius server ISE_PSN1&lt;BR /&gt; address ipv4 10.200.0.23 auth-port 1812 acct-port 1813&lt;BR /&gt; key&amp;nbsp;xxx&lt;BR /&gt;radius server ISE_PSN2&lt;BR /&gt; address ipv4 10.200.0.24 auth-port 1812 acct-port 1813&lt;BR /&gt; key xxx&lt;/P&gt;
&lt;P&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;device-sensor filter-list dhcp list dhcp-list&lt;BR /&gt; option name host-name&lt;BR /&gt;device-sensor filter-list dhcp list dhcp1-list&lt;BR /&gt; option name host-name&lt;BR /&gt; option name class-identifier&lt;BR /&gt; option name client-identifier&lt;BR /&gt; option name client-fqdn&lt;BR /&gt;device-sensor filter-spec dhcp include list dhcp1-list&lt;BR /&gt;device-sensor accounting&lt;BR /&gt;device-sensor notify all-changes&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915326#M39931</guid>
      <dc:creator>Josh Morris</dc:creator>
      <dc:date>2019-03-11T06:45:53Z</dc:date>
    </item>
    <item>
      <title>The more profiling probes you</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915327#M39932</link>
      <description>&lt;P&gt;The more profiling probes you have enabled the more detailed information you will get about the endpoints. However, that does not mean that you should enable all of them &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; In fact, enabling all of them can have some very negative effects on your PSNs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So with that being said, I have found in the past that if NADs support Device Sensor then neither one of the SNMP probes were needed. However, if you see a lot of "unknown" devices then you can enable it along with other probes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In general, try to avoid: SNMP Traps, SPAN and Net Flow&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 19:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915327#M39932</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-05-12T19:12:13Z</dc:date>
    </item>
    <item>
      <title>A very good read for choosing</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915328#M39933</link>
      <description>&lt;P&gt;A very good read for choosing the right probes is the &lt;A href="http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-30-ISE_Profiling_Design_Guide.pdf"&gt;Cisco ISE Profiling Design Guide&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 20:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/2915328#M39933</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T20:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: The more profiling probes you</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3833680#M39935</link>
      <description>&lt;P&gt;I thought same way until recently. I am currently playing with different profiling configuration approaches in my lab and found the following (please correct me if I am wrong)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If only Device Sensor is being used, then ISE's visibility will be limited to switch ports where authentication is actually happening. Radius probe (i.e. Device Sensor) relies on authorized state of the port, because Device Sensor's information is &lt;STRONG&gt;always sent via Radius Accounting&lt;/STRONG&gt;. But... there's no Radius Accounting if there is no successful Authentication. That being said, if you have ports that are not subject to MAB/802.1X (e.g. servers, routers, etc) - there's no way Device Sensor will report ANYTHING about these devices ever. Period.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DHCP will only work if endpoint uses DHCP (static endpoints are invisible)&lt;/LI&gt;&lt;LI&gt;DNS probes requires IP address to do lookup (relies on other probes to discover endpoint's IP address)&lt;/LI&gt;&lt;LI&gt;Active Directory - well.. great probe, but works for AD devices only (laptops/desktops) and relies on other probes to do initial discovery (MAC + hostname)&lt;/LI&gt;&lt;LI&gt;HTTP - limited use, not really applicable to switches (only if you use ISE portals, really)&lt;/LI&gt;&lt;LI&gt;NetFlow - I personally don't understand this one at all! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;NMAP - not sure, as we don't use at the moment - requires whitelisting, otherwise endpoint security agents go into panic mode&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now, SNMP...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SNMPQuery, I think, &lt;STRONG&gt;is a must&lt;/STRONG&gt;, even if you rely solely on Radius probe (Device Sensor).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device Sensor will cover dynamic world (clients being authenticated), while SNMPQuery will provide static information (we know that periodic SNMPQuery should be set to as high as possible, e.g. every 8 hours)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have noticed, that Discovery of static endpoints/devices on non 802.1X/MAB ports can be dramatically improved from a time perspective, if SNMPTrap mac notification probe is enabled (it does even work on TRUNK ports, but this is where you have to be careful and avoid enabling SNMP Traps for mac move on uplinks and downlinks between switches). It is useful on ports facing virtualized environment (ESXi, containers, etc) - can detect new MAC addresses quickly (even with static IP) and query extra info from switch - CDP/LLDP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a conclusion, I would recommend the following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Use Device Sensor whenever possible&lt;/STRONG&gt; - this will provide CDP/LLDP/DHCP related information for all dynamic endpoints, where MAB/DOT1X is enabled.This, however, &lt;STRONG&gt;requires DHCP Snooping configuration&lt;/STRONG&gt; on all switches!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even though DHCP probe becomes less important, I would &lt;STRONG&gt;still enablle it&lt;/STRONG&gt; and &lt;STRONG&gt;configure ONE&lt;/STRONG&gt; and only ONE &lt;STRONG&gt;PSN as ip helper on ALL SVIs&lt;/STRONG&gt;, even if these are static VLANs (where no DHCP is expected) - this will help capturing some endpoints that will suddenly start sending DHCP queries (e.g. servers/VMs/infrastructure).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NetFlow &lt;STRONG&gt;is useless and affects scalability&lt;/STRONG&gt; - don't use unless you really have to. HTTP - don't use if you don't have portals on the wired. WLCs support Device Sensor Lite and can collect User Agent information for all clients. SNMPQuery - always enable and set it to 28800 seconds for periodic polling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SNMPTraps - this one is &lt;STRONG&gt;very useful, but can also affect scalability&lt;/STRONG&gt;. I would recommend enabling MAC notifications on all non-802.1x/MAB ports (where authentication is not configured), except uplinks (inter-switch links). This will significantly improve profiling visibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Active Directory - &lt;STRONG&gt;always enable&lt;/STRONG&gt; - the amount of information this probe provides is amazing (OS version, patch, etc). DHCP and this one can profile ALL corporate assests (with computer accounts in AD) with 100% accuracy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DHCP SPAN and HTTP SPAN - &lt;STRONG&gt;bad bad bad, don't use. &lt;/STRONG&gt;I think these are really legacy and very limited use case.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;NMAP - &lt;STRONG&gt;powerful, but make sure PSNs are whitelisted on FWs and endpoint security agents&lt;/STRONG&gt;! Otherwise it will make InfoSec OPS team lives miserable &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any comments? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2019 10:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3833680#M39935</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2019-04-07T10:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: The more profiling probes you</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3834322#M39936</link>
      <description>Recommend the profiling guide &lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Apr 2019 15:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3834322#M39936</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-04-08T15:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: The more profiling probes you</title>
      <link>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3834326#M39938</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've read this one (and many more), also attended pretty much every Cisco ISE session on Cisco Live 2018 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 15:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-i-really-need-the-snmp-query-probe/m-p/3834326#M39938</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2019-04-08T15:39:57Z</dc:date>
    </item>
  </channel>
</rss>

