<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ise block rogue domain in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986363#M455533</link>
    <description>&lt;P&gt;I have implement ise and enabled ise posture at client environment. Policy rule configured as if domain id and posture status pass will get full access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What if someone setup a laptop with same domain and pass posture, will he able to access network with full access? How to prevent this?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Nov 2019 05:07:52 GMT</pubDate>
    <dc:creator>williamtan</dc:creator>
    <dc:date>2019-11-20T05:07:52Z</dc:date>
    <item>
      <title>Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986363#M455533</link>
      <description>&lt;P&gt;I have implement ise and enabled ise posture at client environment. Policy rule configured as if domain id and posture status pass will get full access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What if someone setup a laptop with same domain and pass posture, will he able to access network with full access? How to prevent this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 05:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986363#M455533</guid>
      <dc:creator>williamtan</dc:creator>
      <dc:date>2019-11-20T05:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986367#M455538</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Not sure i your reques. &lt;BR /&gt;You configured some posture policies for domain computers.&lt;BR /&gt;If someone comes in with a domain computer and matches all prerequisites to get a compliant posture status, it will get access to the network.&lt;BR /&gt;Can you detail a little bit please what rules did you put in place and what use-case you want to avoid (deny access to the network)?</description>
      <pubDate>Wed, 20 Nov 2019 05:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986367#M455538</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-11-20T05:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986598#M455548</link>
      <description>&lt;P&gt;Your request is hard to understand.&amp;nbsp; It would help if you post a screenshot of your rule/rules.&lt;/P&gt;&lt;P&gt;I assume you created a posture policy to check a registry key that shows their domain and if it is there and matches your domain, then they pass posture and get access.&amp;nbsp; In that case and assuming they pass authentication first, then yes, anyone could modify their registry to get in if they know what you are checking for.&lt;/P&gt;&lt;P&gt;The key is to authenticate their machines before they even get to posture.&amp;nbsp; If you use PEAP machine authentication, then they will only pass authentication if they are truly joined to the domain.&amp;nbsp; If you use EAP-TLS and machine certificates, then that machine would need to have a valid certificate assigned to it to pass authentication.&amp;nbsp; If you issue certificates from your domain/Microsoft CA, make sure the certificate template is configured to not allow exporting of the certificate.&amp;nbsp; That way, they can't move the certificate from a work computer to another rogue computer.&lt;/P&gt;&lt;P&gt;If that didn't answer your question, then please clarify and post screenshots of your rules.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 14:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986598#M455548</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-11-20T14:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986685#M455623</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/61949i71385C707068F94C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="policy.png" alt="policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Above is the policy rule I created, if posture status equal compliant and domain user then will get full access. For the posture rule, I just checked the trend micro version and definition date.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, if i'm not a staff but i know the domain and user password. I setup an AD which same name with client example abc.com, then i joined my laptop to my domain. I connect my laptop to client network and I would be able to get access right?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 15:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986685#M455623</guid>
      <dc:creator>williamtan</dc:creator>
      <dc:date>2019-11-20T15:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986805#M455624</link>
      <description>&lt;P&gt;That is not correct that if you use your abc.com user account since within each domain, the user account has a Security Identifier (SID) that would be unique.&amp;nbsp; But I also think that you are over-thinking the situation.&amp;nbsp; With the rule you attached, you could just use your account (username/password) that you were issued by your client and login to their network using a rogue laptop.&amp;nbsp; So when you get prompted for credentials during network connection, you put your client credentials in such as username@client.com and assuming the password is correct, then you would be redirected for posture.&amp;nbsp; If you have the Anyconnect posture client installed and your posture status is compliant, then yes you would get access.&lt;/P&gt;&lt;P&gt;That is why I always recommend doing machine authentication at a minimum.&amp;nbsp; User authentication isn't always necessary unless you need to differentiate access on the network based on who the user is.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 19:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3986805#M455624</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-11-20T19:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3990978#M455625</link>
      <description>&lt;P&gt;If only enable machine authentication, then everyone who access the endpoint will have full access to network. I have implemented NAM module and using EAP chaining to authenticate machine and user before. But endpoint with Windows 10 will facing connection issue every time when have new Windows patch.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 02:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3990978#M455625</guid>
      <dc:creator>williamtan</dc:creator>
      <dc:date>2019-11-29T02:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ise block rogue domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3990989#M455626</link>
      <description>&lt;P&gt;But the endpoint has its own authentication system to prevent unauthorized users from logging in to the endpoint, correct?&amp;nbsp; Also, any resources on the network such as file shares, e-mail servers, etc. will all have their own authentication for users, right?&amp;nbsp; So what are you gaining by authenticating the user before you allow network access at all?&amp;nbsp; The real concern is the machine/device and making sure it isn't a rogue device that could be infected or running malicious tools.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 03:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-block-rogue-domain/m-p/3990989#M455626</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-11-29T03:41:40Z</dc:date>
    </item>
  </channel>
</rss>

