<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890327#M471523</link>
    <description>&lt;P&gt;With the profiling component in DEBUG, we may check profiler.log for details of ISE profiling.&lt;/P&gt;
&lt;P&gt;Even with SNMP probe, the endpoint needs online for ISE to gather data. The SNMP query triggered by SNMP trap will check whether the endpoint has an active session in ISE. The periodic SNMP queries to the NADs may gather endpoints based on ARP cache and other info such as CDP or LLDP, regardless of active sessions.&lt;/P&gt;
&lt;P&gt;Back to device-sensor, IBNS 2 may allow endpoint access locally without auth against ISE in order to send profiling data.&lt;/P&gt;
&lt;PRE&gt;&lt;FONT size="2"&gt;policy-map type control subscriber dsensor-updates&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; event session-started match-all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  10 class always do-until-failure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  10 authorize&lt;/FONT&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 15 Jul 2019 14:18:38 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2019-07-15T14:18:38Z</dc:date>
    <item>
      <title>ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889752#M471509</link>
      <description>&lt;P&gt;Trying to use logical profile based on LLDP system-capabilities information in authorization rule but it doesn't work because information is only transmitted to ISE in RADIUS Attribute Value Pair inside accounting request, and the accounting only happens after an RADIUS access-accept.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way I can workaround this issue for now is using a rule with temporary access so it can triggers the RADIUS accounting packet to transmit the LLDP cache information to ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2019 21:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889752#M471509</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-13T21:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889767#M471510</link>
      <description>&lt;P&gt;Yes, this is how profiling works in general, but not specific to device-sensor or LLDP. See&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456#toc-hId-520964790" target="_blank"&gt;Access Policy and Device Configuration Impact on Profiling&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2019 23:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889767#M471510</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-13T23:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889825#M471512</link>
      <description>&lt;P&gt;I understand the concept of allowing some traffic if we use, for instance, DHCP probes.&lt;/P&gt;&lt;P&gt;But, in this case we have the profiling information available the moment we connect the device (phone) - I can see it in the LLDP cache. It would be nice if we could transmit the information in the RADIUS access request...&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2019 09:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889825#M471512</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-14T09:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889895#M471513</link>
      <description>With device sensor I don't think this will work because as you said radius&lt;BR /&gt;accounting will be sent only after access-request. If you use SNMP polling&lt;BR /&gt;in ISE as a probe then you might get it working because SNMP polling can&lt;BR /&gt;take place independently from access-request.&lt;BR /&gt;&lt;BR /&gt;**** remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sun, 14 Jul 2019 16:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889895#M471513</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-07-14T16:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889935#M471514</link>
      <description>&lt;P&gt;I have snmp trap mac notification configured and I can see snmp traffic between NAD and PSN but information is not being updated!&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2019 19:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889935#M471514</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-14T19:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889942#M471515</link>
      <description>&lt;P&gt;your approach is correct. We also use same solution. temporarry access - DNS, DHCP and ISE access&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2019 20:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889942#M471515</guid>
      <dc:creator>Parag Mahajan</dc:creator>
      <dc:date>2019-07-14T20:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889997#M471517</link>
      <description>Agreed but if you use SNMP query probe then the switch can send CDP info in&lt;BR /&gt;the SNMP response which might speed the profiling process compared to&lt;BR /&gt;radius accounting packet which has to wait till access-request is sent.&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Jul 2019 02:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3889997#M471517</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-07-15T02:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890173#M471518</link>
      <description>&lt;P&gt;I can see SNMP traffic when I connect the phone (trap and then query) but I'm unable to decode what information is being transmitted to ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 10:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890173#M471518</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-15T10:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890174#M471520</link>
      <description>&lt;P&gt;Yes, DHCP probe works fine but I was trying to avoid temporary access. LLDP cache info should be transmitted in SNMP when the device is connected. MAC move/Link trap&amp;nbsp; and then SNMP query. I can see SNMP traffic but not able to understand what information is being transmitted.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 10:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890174#M471520</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-15T10:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890327#M471523</link>
      <description>&lt;P&gt;With the profiling component in DEBUG, we may check profiler.log for details of ISE profiling.&lt;/P&gt;
&lt;P&gt;Even with SNMP probe, the endpoint needs online for ISE to gather data. The SNMP query triggered by SNMP trap will check whether the endpoint has an active session in ISE. The periodic SNMP queries to the NADs may gather endpoints based on ARP cache and other info such as CDP or LLDP, regardless of active sessions.&lt;/P&gt;
&lt;P&gt;Back to device-sensor, IBNS 2 may allow endpoint access locally without auth against ISE in order to send profiling data.&lt;/P&gt;
&lt;PRE&gt;&lt;FONT size="2"&gt;policy-map type control subscriber dsensor-updates&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; event session-started match-all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  10 class always do-until-failure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  10 authorize&lt;/FONT&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 15 Jul 2019 14:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890327#M471523</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-15T14:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890330#M471526</link>
      <description>Is that true even if one was to add "access-session monitor" to the global config?  Maybe I misunderstood the command.</description>
      <pubDate>Mon, 15 Jul 2019 14:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890330#M471526</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-07-15T14:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890425#M471530</link>
      <description>&lt;P&gt;AFAIK IBNS 2 is not sending the device-sensor data via RADIUS accounting interim updates unless the endpoints authorized, either locally or by ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 16:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890425#M471530</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-15T16:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890455#M471534</link>
      <description>&lt;P&gt;I've just realized that profiling is working fine for Cisco Phones but not for Alcatel Phones.&lt;/P&gt;&lt;P&gt;Cisco Phones are initially identified as Cisco_Devices and subsequently identified as Cisco-IP-Phone-xxxx&lt;/P&gt;&lt;P&gt;But Alcatel Phones stay classified as Alcatel_Devices (OUI policy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In profiler.log I can see:&lt;/P&gt;&lt;P&gt;On Cisco Phones: CDP and LLDP Attributes, provided by RADIUS Probe&lt;/P&gt;&lt;P&gt;On Alcatel Phones: OUI provided by SNMPTrap Probe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In packet captures in Cisco Phones I can see two RADIUS access-rejects and then one access-accept. This packet includes AVP profile for Cisco-IP-Phone-xxxx&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 17:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890455#M471534</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-15T17:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890702#M471538</link>
      <description>&lt;P&gt;Great. You are getting closer.&lt;/P&gt;
&lt;P&gt;If Alcatel phones not providing CDP/LLDP attributes to id them as phones, then we need either look for another attribute/pattern or whitelist them.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 01:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890702#M471538</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-16T01:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890867#M471542</link>
      <description>&lt;P&gt;I can see LLDP information of the Alcatel phone in the switch:&lt;/P&gt;&lt;P&gt;SW_POC_Torre_C#show device-sensor cache all&lt;BR /&gt;Device: 0080.9f57.640e on port GigabitEthernet1/0/17&lt;BR /&gt;--------------------------------------------------&lt;BR /&gt;Proto Type:Name Len Value&lt;BR /&gt;LLDP 127:organizationally-specific 23 FE 15 00 12 BB 0B 30 30 3A 38 30 3A 39 66 3A 35&lt;BR /&gt;37 3A 36 34 3A 30 65&lt;BR /&gt;LLDP 7:system-capabilities 6 0E 04 00 20 00 20&lt;BR /&gt;LLDP 0:end-of-lldpdu 2 00 00&lt;BR /&gt;LLDP 3:time-to-live 4 06 02 01 E0&lt;BR /&gt;LLDP 2:port-id 9 04 07 03 00 80 9F 57 64 0E&lt;BR /&gt;LLDP 1:chassis-id 9 02 07 04 00 80 9F 57 64 0E&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This information is not being transmitted to ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 08:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3890867#M471542</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-16T08:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3891475#M471545</link>
      <description>&lt;P&gt;It might depend on the IOS-XE release or platform or ISE release. Also check the filter-list used for LLDP.&lt;/P&gt;
&lt;P&gt;In discussing &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/device-sensor-filter-lists-and-mud-profling/m-p/3885917" target="_self"&gt;Device Sensor Filter Lists and MUD Profling&lt;/A&gt;, I found our teams tested it working with ISE 2.6 and IOS-XE 16.9.1 on 3850.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 00:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3891475#M471545</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-17T00:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3892317#M471548</link>
      <description>&lt;P&gt;No filter configured. I assume this means all the information should be transmitted to ISE. Is this correct?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 23:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3892317#M471548</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-17T23:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894207#M471549</link>
      <description>&lt;P&gt;Yes, I would have assumed so.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 19:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894207#M471549</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-20T19:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894400#M471559</link>
      <description>&lt;P&gt;Summing up:&lt;/P&gt;&lt;P&gt;1. The phone information is in the switch LLDP cache&lt;/P&gt;&lt;P&gt;2. No device-sensor filter-list lldp is configured (all the information is kept)&lt;/P&gt;&lt;P&gt;3. mac address-table notification change, mac address-table notification mac-move and snmp trap mac-notification are configured&lt;/P&gt;&lt;P&gt;4. snmp queries are enabled&lt;/P&gt;&lt;P&gt;It should work but it doesn't ...&lt;/P&gt;&lt;P&gt;Is there a way to understand what information is send on SNMP query response packets?&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 17:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894400#M471559</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2019-07-21T17:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profilling - LLDP device-sensor cache updates using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894446#M471561</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
Is there a way to understand what information is send on SNMP query response packets?&lt;BR /&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;We should be able to see the info in the SNMP responses in the wired packet captured on SNMP traffic between the ISE PSN and the NAD, if using SNMP v1 or v2c.&lt;/P&gt;
&lt;P&gt;In this particular use case that snmpQuery triggered by either snmpTrap or account start, there are some known issues -- CSCvm70858 and CSCuw50171. I think it best to get a Cisco TAC case open to help gathering debug data and/or recreate.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 22:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profilling-lldp-device-sensor-cache-updates-using-radius/m-p/3894446#M471561</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-21T22:29:43Z</dc:date>
    </item>
  </channel>
</rss>

