<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Profiling issue Cisco IP Phones in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904708#M470691</link>
    <description>&lt;P&gt;If you have guest access on the wired then IP phone will naturally get DHCP just like guest using ACL. If guest is not used, then you can use more restrictive ACL to only allow DHCP.&lt;/P&gt;
&lt;P&gt;If you have CoA reauth turned on for profiler global setting it should have reauth'd after transitioning from unknown device to IP phone.&lt;/P&gt;
&lt;P&gt;Phones in general reboots if it can't find the tftp server, so should eventually land in the proper network access.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2019 16:11:46 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2019-08-07T16:11:46Z</dc:date>
    <item>
      <title>ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904533#M470682</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I'm having some issues with ISE profiling Cisco IP Phones correctly.&amp;nbsp; I setup an authorization policy to allow any Cisco IP Phone on the network.&amp;nbsp; However the policy is not getting any hits because the IP phones are being detected as Cisco-Device and the deny rule is being used instead.&amp;nbsp; It used the Radius probe to determine the endpoint classification.&lt;/P&gt;&lt;P&gt;I followed the Cisco Profiling guide and setup DHCP probe which includes the ip helper address on the SVI.&amp;nbsp; I can confirm that ISE is getting copies of the DHCP requests as ISE is now populated with quite a few endpoints on the network.&amp;nbsp; Additionally I did a packet capture on the IP phone's port and verified that when it makes the DHCP request, the hardware identifier includes the string that ISE is checking to verify it is a Cisco IP Phone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I change the authorization policy to allow the "Cisco-Device" condition, it works and ISE gets all the information for the phone down to the exact model using the DHCP probe.&amp;nbsp; I verified this in the profiler endpoint classification.&amp;nbsp; Additionally I have the profiling settings configuration set to re authenticate.&lt;/P&gt;&lt;P&gt;As a work around, I enabled SNMP query and set the timer to 600 secs (minimum allowed) to poll the switch.&amp;nbsp; This used CDP to determine that it was an IP phone and allowed it on the network.&amp;nbsp; However this only polls every 10 mins which is a significant delay to allow the device.&amp;nbsp; I also enabled SNMP traps with link up and link down to initiate a polling but this did not help any it seems.&lt;/P&gt;&lt;P&gt;Is there a way to create an authorization policy to allow the device on the network temporarily so that it will get all the device profiling info, then once it is verified as a Cisco IP phone to move it to another authorization profile?&amp;nbsp; Or is there an easier way of doing this?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I definitely don't want to use MAB and have to manually allow mac addresses.&amp;nbsp; That's the reason for trying to get the profiling working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISE version: 2.4 Patch 9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IOS: 16.6.6 Catalyst 3650&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE Policy:&lt;/P&gt;&lt;P&gt;If Condition:Endpoints:EndpointPolicy EQUALS Cisco-Device:Cisco-IP-Phone&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result: Cisco_IP_Phones - Voice VLAN and permit permissions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Switch configs:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authentication enable default enable group radius&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec default local group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting auth-proxy default start-stop group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client x.x.x.x server-key 7 xxxxxxxxxxx&lt;BR /&gt;server-key 7 xxxxxxxxxxx&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;!&lt;BR /&gt;radius server ISE01&lt;BR /&gt;address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 50&lt;BR /&gt;authentication event server dead action authorize&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IP Phone Packet Capture.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Frame 6: 594 bytes on wire (4752 bits), 594 bytes captured (4752 bits) on interface 0&lt;BR /&gt;Ethernet II, Src: Cisco_a7:0a:2e (34:a8:4e:a7:0a:2e), Dst: Broadcast (ff:ff:ff:ff:ff:ff)&lt;BR /&gt;802.1Q Virtual LAN, PRI: 3, DEI: 0, ID: 80&lt;BR /&gt;Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255&lt;BR /&gt;User Datagram Protocol, Src Port: 68, Dst Port: 67&lt;BR /&gt;Dynamic Host Configuration Protocol (Discover)&lt;BR /&gt;Message type: Boot Request (1)&lt;BR /&gt;Hardware type: Ethernet (0x01)&lt;BR /&gt;Hardware address length: 6&lt;BR /&gt;Hops: 0&lt;BR /&gt;Transaction ID: 0x00003198&lt;BR /&gt;Seconds elapsed: 0&lt;BR /&gt;Bootp flags: 0x8000, Broadcast flag (Broadcast)&lt;BR /&gt;Client IP address: 0.0.0.0&lt;BR /&gt;Your (client) IP address: 0.0.0.0&lt;BR /&gt;Next server IP address: 0.0.0.0&lt;BR /&gt;Relay agent IP address: 0.0.0.0&lt;BR /&gt;Client MAC address: Cisco_a7:0a:2e (34:a8:4e:a7:0a:2e)&lt;BR /&gt;Client hardware address padding: 00000000000000000000&lt;BR /&gt;Server host name not given&lt;BR /&gt;Boot file name not given&lt;BR /&gt;Magic cookie: DHCP&lt;BR /&gt;Option: (53) DHCP Message Type (Discover)&lt;BR /&gt;Option: (61) Client identifier&lt;BR /&gt;Option: (12) Host Name&lt;BR /&gt;Option: (60) Vendor class identifier&lt;BR /&gt;Length: 38&lt;BR /&gt;Vendor class identifier: Cisco Systems, Inc. IP Phone CP-7962G&lt;BR /&gt;Option: (55) Parameter Request List&lt;BR /&gt;Option: (255) End&lt;BR /&gt;Padding: 000000000000000000000000000000000000000000000000…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 12:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904533#M470682</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-07T12:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904588#M470683</link>
      <description>&lt;P&gt;Can you confirm that endpoint details in the context directory includes all the information learned from DHCP probe are present? Also, for ip helper, it needs to be enabled on the access VLAN 100 for it to work.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 13:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904588#M470683</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-08-07T13:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904619#M470684</link>
      <description>&lt;P&gt;Hi the helper is enabled on both 100 and 50 vlans.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the info form the endpoint classification.&amp;nbsp; The phone was authorized using the "Cisco-Device" authorization profile in this case:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;endpoints 34:A8:4E:A7:0A:2E&lt;BR /&gt;34:A8:4E:A7:0A:2E&lt;BR /&gt;&lt;BR /&gt;MAC Address: 34:A8:4E:A7:0A:2E&lt;BR /&gt;Username: 34-A8-4E-A7-0A-2E&lt;BR /&gt;Endpoint Profile: Cisco-IP-Phone-7962&lt;BR /&gt;Current IP Address: x.x.x.x&lt;BR /&gt;Location: LocationAll Locations&lt;BR /&gt;Applications Attributes Authentication Threats Vulnerabilities&lt;BR /&gt;General Attributes&lt;BR /&gt;Description&lt;BR /&gt;Static Assignment false&lt;BR /&gt;Endpoint Policy Cisco-IP-Phone-7962&lt;BR /&gt;Static Group Assignment false&lt;BR /&gt;Identity Group Assignment Cisco-IP-Phone&lt;BR /&gt;Custom Attributes&lt;BR /&gt;Attribute Name Attribute Value&lt;BR /&gt;Attribute Name&lt;BR /&gt;Attribute Value&lt;BR /&gt;No data found. Add custom attributes here.&lt;BR /&gt;Other Attributes&lt;BR /&gt;AAA-Server emvise01&lt;BR /&gt;AllowedProtocolMatchedRule Default&lt;BR /&gt;AuthenticationIdentityStore Internal Endpoints&lt;BR /&gt;AuthenticationMethod Lookup&lt;BR /&gt;AuthenticationStatus AuthenticationPassed&lt;BR /&gt;AuthorizationPolicyMatchedRule CISCO TEST&lt;BR /&gt;BYODRegistration Unknown&lt;BR /&gt;Called-Station-ID 00-35-1A-EC-15-8D&lt;BR /&gt;Calling-Station-ID 34-A8-4E-A7-0A-2E&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;DestinationIPAddress x.x.x.x&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Device IP Address x.x.x.x&lt;BR /&gt;Device Port 1812&lt;BR /&gt;Device Type Device Type#All Device Types#SWITCHES&lt;BR /&gt;DeviceRegistrationStatus NotRegistered&lt;BR /&gt;ElapsedDays 0&lt;BR /&gt;EndPointMACAddress 34-A8-4E-A7-0A-2E&lt;BR /&gt;EndPointPolicy Cisco-IP-Phone-7962&lt;BR /&gt;EndPointProfilerServer ise01.x.x.x.x.local&lt;BR /&gt;EndPointSource SNMPQuery Probe&lt;BR /&gt;FailureReason -&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;IdentityGroup Cisco-IP-Phone&lt;BR /&gt;IdentityPolicyMatchedRule Default&lt;BR /&gt;IdentitySelectionMatchedRule Default&lt;BR /&gt;InactiveDays 0&lt;BR /&gt;IsMachineAuthentication false&lt;BR /&gt;IsMachineIdentity false&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;Location Location#All Locations&lt;BR /&gt;LogicalProfile IP-Phones&lt;BR /&gt;MACAddress 34:A8:4E:A7:0A:2E&lt;BR /&gt;MatchedPolicy Cisco-IP-Phone-7962&lt;BR /&gt;MessageCode 3002&lt;BR /&gt;NADAddress x.x.x.x&lt;BR /&gt;NAS-IP-Address x.x.x.x&lt;BR /&gt;NAS-Identifier SW01&lt;BR /&gt;NAS-Port 50113&lt;BR /&gt;NAS-Port-Id GigabitEthernet1/0/11&lt;BR /&gt;NAS-Port-Type Ethernet&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;NetworkDeviceGroups Device Type#All Device Types#SWITCHES, IPSEC#Is IPSEC Device#No, Location#All Locations&lt;BR /&gt;NetworkDeviceName SW01&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;NetworkDeviceProfileName Cisco&lt;BR /&gt;OUI Cisco Systems, Inc&lt;BR /&gt;OriginalUserName 34a84ea70a2e&lt;BR /&gt;PolicyVersion 12&lt;BR /&gt;PostureApplicable Yes&lt;BR /&gt;PostureAssessmentStatus NotApplicable&lt;BR /&gt;RadiusFlowType WiredMAB&lt;BR /&gt;RadiusPacketType AccessRequest&lt;BR /&gt;SelectedAccessService EAP-TLS_PEAP_MAB&lt;BR /&gt;SelectedAuthenticationIdentityStores AD, Internal Users, Internal Endpoints, Guest Users, All_AD_Join_Points&lt;BR /&gt;SelectedAuthorizationProfiles Cisco_IP_Phones&lt;BR /&gt;Service-Type Call Check&lt;BR /&gt;StaticAssignment false&lt;BR /&gt;StaticGroupAssignment false&lt;BR /&gt;StepData 5= DEVICE.Device Type, 7=AD_LOCAL_ISS, 8=AD, 9=AD, 10=34-A8-4E-A7-0A-2E, 11=x.x.x.x.local, 12=x.x.x.x.local, 14=ERROR_NO_SUCH_USER, 15=AD, 16=Internal Users, 19=Internal Endpoints, 25=AD, 26=34-A8-4E-A7-0A-2E, 27=x.x.x.x.local, 28=x.x.x.x.local, 30=ERROR_NO_SUCH_USER, 31=AD, 32= AD.ExternalGroups, 33= EndPoints.EndPointPolicy&lt;BR /&gt;Total Certainty Factor 255&lt;BR /&gt;UseCase Host Lookup&lt;BR /&gt;User-AD-Last-Fetch-Time 1565187107807&lt;BR /&gt;User-Fetch-User-Name 34-A8-4E-A7-0A-2E&lt;BR /&gt;User-Name 34-A8-4E-A7-0A-2E&lt;BR /&gt;UserType Host&lt;BR /&gt;allowEasyWiredSession false&lt;BR /&gt;cdpCacheAddress x.x.x.x&lt;BR /&gt;cdpCacheCapabilities H;P;M&lt;BR /&gt;cdpCacheDeviceId SEP34A84EA70A2E&lt;BR /&gt;cdpCachePlatform Cisco IP Phone 7962&lt;BR /&gt;cdpCacheVersion SCCP42.9-4-2-1S&lt;BR /&gt;cdpUndefined28 00:02:00&lt;BR /&gt;chaddr 34:a8:4e:a7:0a:2e&lt;BR /&gt;ciaddr 0.0.0.0&lt;BR /&gt;dhcp-class-identifier Cisco Systems, Inc. IP Phone CP-7962G&lt;BR /&gt;dhcp-client-identifier 01:34:a8:4e:a7:0a:2e&lt;BR /&gt;dhcp-message-type DHCPREQUEST&lt;BR /&gt;dhcp-parameter-request-list 1, 66, 6, 3, 15, 150, 35&lt;BR /&gt;dhcp-requested-address x.x.x.x&lt;BR /&gt;dot1xAuthAuthControlledPortControl 2&lt;BR /&gt;dot1xAuthAuthControlledPortStatus 2&lt;BR /&gt;dot1xAuthSessionUserName 34-A8-4E-A7-0A-2E&lt;BR /&gt;flags 0x8000&lt;BR /&gt;giaddr x.x.x.x&lt;BR /&gt;hlen 6&lt;BR /&gt;host-name SEP34A84EA70A2E&lt;BR /&gt;htype Ethernet (10Mb)&lt;BR /&gt;ifDescr GigabitEthernet1/0/13&lt;BR /&gt;ifIndex 20&lt;BR /&gt;ifOperStatus 1&lt;BR /&gt;ip x.x.x.x&lt;BR /&gt;op BOOTREQUEST&lt;BR /&gt;yiaddr 0.0.0.0&lt;BR /&gt;Select a filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 14:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904619#M470684</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-07T14:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904637#M470685</link>
      <description>&lt;P&gt;That is odd, since the detail has 'dhcp-class-identifier Cisco Systems, Inc. IP Phone CP-7962G' and ip Phone policy requires 'Cisco Systems, Inc. IP Phone' in the string, it should have profiled properly. Are you updating the profiling policy with feed update? If not I would schedule one during the maintenance window to update the profiling policies.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 14:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904637#M470685</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-08-07T14:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904644#M470686</link>
      <description>&lt;P&gt;Here is an example of when I use the Cisco IP phone authorization policy and it failed authentication.&amp;nbsp; Notice that it is just detecting it as a Cisco device.&amp;nbsp; The one I sent previously detected it as a Cisco IP phone because the SNMP query kicked in after 10 mins and profiled it correctly.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;endpoints 1C:1D:86:C5:A9:6D&lt;BR /&gt;1C:1D:86:C5:A9:6D&lt;BR /&gt;&lt;BR /&gt;MAC Address: 1C:1D:86:C5:A9:6D&lt;BR /&gt;Username: 1c1d86c5a96d&lt;BR /&gt;Endpoint Profile: Cisco-Device&lt;BR /&gt;Current IP Address:&lt;BR /&gt;Location: LocationAll Locations&lt;BR /&gt;Applications Attributes Authentication Threats Vulnerabilities&lt;BR /&gt;General Attributes&lt;BR /&gt;Description&lt;BR /&gt;Static Assignment false&lt;BR /&gt;Endpoint Policy Cisco-Device&lt;BR /&gt;Static Group Assignment false&lt;BR /&gt;Identity Group Assignment Profiled&lt;BR /&gt;Custom Attributes&lt;BR /&gt;Attribute Name Attribute Value&lt;BR /&gt;Attribute Name&lt;BR /&gt;Attribute Value&lt;BR /&gt;No data found. Add custom attributes here.&lt;BR /&gt;Other Attributes&lt;BR /&gt;AAA-Server i&lt;SPAN&gt;se01&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;AllowedProtocolMatchedRule Default&lt;BR /&gt;AuthenticationIdentityStore Internal Endpoints&lt;BR /&gt;AuthenticationMethod Lookup&lt;BR /&gt;AuthorizationPolicyMatchedRule Default&lt;BR /&gt;BYODRegistration Unknown&lt;BR /&gt;Calling-Station-ID 1C-1D-86-C5-A9-6D&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;DestinationIPAddress 10.114.27.123&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Device IP Address 10.114.16.160&lt;BR /&gt;Device Port 1812&lt;BR /&gt;Device Type Device Type#All Device Types#SWITCHES&lt;BR /&gt;DeviceRegistrationStatus NotRegistered&lt;BR /&gt;ElapsedDays 0&lt;BR /&gt;EndPointMACAddress 1C-1D-86-C5-A9-6D&lt;BR /&gt;EndPointPolicy Cisco-Device&lt;BR /&gt;EndPointProfilerServer xxxx.domainlocal&lt;BR /&gt;EndPointSource RADIUS Probe&lt;BR /&gt;FailureReason 15039 Rejected per authorization profile&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;IdentityGroup Profiled&lt;BR /&gt;IdentityPolicyMatchedRule Default&lt;BR /&gt;IdentitySelectionMatchedRule Default&lt;BR /&gt;InactiveDays 0&lt;BR /&gt;IsEndpointInRejectMode false&lt;BR /&gt;IsMachineIdentity false&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;Location Location#All Locations&lt;BR /&gt;MACAddress 1C:1D:86:C5:A9:6D&lt;BR /&gt;MatchedPolicy Cisco-Device&lt;BR /&gt;MessageCode 5434&lt;BR /&gt;NAS-IP-Address 10.114.16.160&lt;BR /&gt;NAS-Identifier SW01&lt;BR /&gt;NAS-Port 50115&lt;BR /&gt;NAS-Port-Id GigabitEthernet1/0/15&lt;BR /&gt;NAS-Port-Type Ethernet&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;NetworkDeviceGroups Device Type#All Device Types#SWITCHES, IPSEC#Is IPSEC Device#No, Location#All Locations&lt;BR /&gt;NetworkDeviceName SW01&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;NetworkDeviceProfileName Cisco&lt;BR /&gt;OUI Cisco Systems, Inc&lt;BR /&gt;OriginalUserName 1c1d86c5a96d&lt;BR /&gt;PolicyVersion 12&lt;BR /&gt;PostureApplicable Yes&lt;BR /&gt;RadiusFlowType WiredMAB&lt;BR /&gt;RadiusPacketType AccessRequest&lt;BR /&gt;SelectedAccessService EAP-TLS_PEAP_MAB&lt;BR /&gt;SelectedAuthenticationIdentityStores AD, Internal Users, Internal Endpoints, Guest Users, All_AD_Join_Points&lt;BR /&gt;SelectedAuthorizationProfiles DenyAccess&lt;BR /&gt;Service-Type Call Check&lt;BR /&gt;StaticAssignment false&lt;BR /&gt;StaticGroupAssignment false&lt;BR /&gt;StepData 5= DEVICE.Device Type, 6= Normalised Radius.RadiusFlowType, 7= Network Access.Protocol, 8= Radius.NAS-Port-Type, 10=AD_LOCAL_ISS, 11=AD, 12=AD, 13=1C-1D-86-C5-A9-6D, 14=domainlocal, 15=domainlocal, 17=ERROR_NO_SUCH_USER, 18=AD, 19=Internal Users, 22=Internal Endpoints, 28=AD, 29=1C-1D-86-C5-A9-6D, 30=domainlocal, 31=domainlocal, 33=ERROR_NO_SUCH_USER, 34=AD, 35= AD.ExternalGroups, 36= EndPoints.EndPointPolicy&lt;BR /&gt;Total Certainty Factor 10&lt;BR /&gt;TotalFailedAttempts 2&lt;BR /&gt;TotalFailedTime 40&lt;BR /&gt;UseCase Host Lookup&lt;BR /&gt;User-AD-Last-Fetch-Time 1565188247918&lt;BR /&gt;User-Fetch-User-Name 1c1d86c5a96d&lt;BR /&gt;User-Name 1c1d86c5a96d&lt;BR /&gt;UserType Host&lt;BR /&gt;Select a filter&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 14:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904644#M470686</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-07T14:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904659#M470687</link>
      <description>&lt;P&gt;In order for the endpoint to send DHCP request to ISE via IP helper is for it to be on the network in the first place. So your policy should allow unknown endpoint to have at least that much access to the network on VLAN 100 in order for ISE to get a copy of the DHCP transaction between the endpoint and the DHCP server. Since you are rejecting at the end, the endpoint has no way to provide DHCP information to ISE to get it profiled as a phone. Only information available is MAC address which provides MAC OUI to determine that this is a Cisco device.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 14:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904659#M470687</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-08-07T14:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904668#M470689</link>
      <description>&lt;P&gt;Thansk for the information.&amp;nbsp; What is the best practice for allowing the device temporary access to the VLAN? Is it though a local ACL on the switchport?&amp;nbsp; I tried pushing down a policy on ISE which gave it access to DHCP.&amp;nbsp; However after it was profiled correctly using that authorization policy, it didn't attempt to reauthenticate to use the IP Phone policy.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 15:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904668#M470689</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-07T15:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904708#M470691</link>
      <description>&lt;P&gt;If you have guest access on the wired then IP phone will naturally get DHCP just like guest using ACL. If guest is not used, then you can use more restrictive ACL to only allow DHCP.&lt;/P&gt;
&lt;P&gt;If you have CoA reauth turned on for profiler global setting it should have reauth'd after transitioning from unknown device to IP phone.&lt;/P&gt;
&lt;P&gt;Phones in general reboots if it can't find the tftp server, so should eventually land in the proper network access.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/3904708#M470691</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-08-07T16:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling issue Cisco IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/5170419#M591620</link>
      <description>&lt;P&gt;For me, I had to issue the command "&lt;SPAN&gt;device-sensor accounting" on my switch to allow it to profile correctly.&amp;nbsp; After issuing this command, I saw the hits on me live logs correctly profiling my device.&amp;nbsp; The detailed report is still showing cisoc-device after 24 hours, but on the endpoint profile column, it was correct as per screencap below.&amp;nbsp; Note that you should make sure CDP is enabled if its allowed.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="darrenkmiyamoto_0-1725411556004.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227732i51455DCA1B08BD11/image-size/medium?v=v2&amp;amp;px=400" role="button" title="darrenkmiyamoto_0-1725411556004.png" alt="darrenkmiyamoto_0-1725411556004.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2024 00:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-issue-cisco-ip-phones/m-p/5170419#M591620</guid>
      <dc:creator>darrenkmiyamoto</dc:creator>
      <dc:date>2024-09-04T00:59:54Z</dc:date>
    </item>
  </channel>
</rss>

