<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE device profiling and mac address spoofing test in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3906064#M470661</link>
    <description>Something you may want to consider is configuring anomalous endpoint detection. Essentially this would aide in deterring such a scenario. A change in profile would trigger and you could quarantine via CoA. From doc:&lt;BR /&gt;Once detection is enabled, ISE monitors any new information received for existing endpoints and checks if these attributes have changed:&lt;BR /&gt;Endpoint Policy - A change in endpoint profile from Printer or IP phone to Workstation.&lt;BR /&gt;Just note that I am pretty sure you cannot tweak what attributes it monitors. Good luck &amp;amp; HTH!&lt;BR /&gt;See here for my detail: &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html&lt;/A&gt;</description>
    <pubDate>Fri, 09 Aug 2019 15:06:30 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-08-09T15:06:30Z</dc:date>
    <item>
      <title>ISE device profiling and mac address spoofing test</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3905299#M470659</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I setup ISE profiling for Cisco IP phones and it works as expected.&amp;nbsp; I changed the certainty factor for Cisco-IP-Phone to a higher number to ensure that it would match on multiple criteria before allowing the IP phone.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I see, if I disconnect and reconnect the IP phone, ISE does not do a full profiling for the second attempt.&amp;nbsp; Instead it checks the mac address and recognized that it is already profiled as a Cisco IP phone and allows it. This is a security issue because if I spoof the IP phone's mac address on a laptop for example, I will gain access to the network.&lt;/P&gt;&lt;P&gt;I verified this by setting up a laptop with the same mac address as the IP phone.&amp;nbsp; The laptop was successfully authorized using the same authorization policy that the phone used.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this expected behavior or am I missing some configuration steps?&lt;/P&gt;&lt;P&gt;ISE 2.4 Patch 9&lt;/P&gt;&lt;P&gt;IOS 16.6.6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 13:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3905299#M470659</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-08T13:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling and mac address spoofing test</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3906064#M470661</link>
      <description>Something you may want to consider is configuring anomalous endpoint detection. Essentially this would aide in deterring such a scenario. A change in profile would trigger and you could quarantine via CoA. From doc:&lt;BR /&gt;Once detection is enabled, ISE monitors any new information received for existing endpoints and checks if these attributes have changed:&lt;BR /&gt;Endpoint Policy - A change in endpoint profile from Printer or IP phone to Workstation.&lt;BR /&gt;Just note that I am pretty sure you cannot tweak what attributes it monitors. Good luck &amp;amp; HTH!&lt;BR /&gt;See here for my detail: &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html&lt;/A&gt;</description>
      <pubDate>Fri, 09 Aug 2019 15:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3906064#M470661</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-08-09T15:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling and mac address spoofing test</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3906094#M470663</link>
      <description>Thanks I am in the process of testing to see how it works.&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Aug 2019 16:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3906094#M470663</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-09T16:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling and mac address spoofing test</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3907515#M470665</link>
      <description>&lt;P&gt;I retested after enabling&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;Enable Anomalous Behaviour Detection&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;Enable Anomalous Behaviour Enforcement&amp;nbsp;&lt;/STRONG&gt;along with the appropriate authorization policy.&amp;nbsp; I set the laptop to use the mac address as the IP phone.&amp;nbsp; It worked as expected to deny the laptop from accessing the network.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 15:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-and-mac-address-spoofing-test/m-p/3907515#M470665</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-13T15:01:32Z</dc:date>
    </item>
  </channel>
</rss>

