<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE profiling and MAC address spoofing mitigation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3927189#M485094</link>
    <description>&lt;P&gt;ISE will re-profile only if new parameters are received.&amp;nbsp; So if you spoof a MAC and you don't send anything else, ISE has no new information to re-profile with.&amp;nbsp; Absence of information is not enough to trigger ISE to profile it again.&lt;/P&gt;&lt;P&gt;Be careful with Anomalous Detection and Enforcement.&amp;nbsp; It has issues and there are some bugs filed on it.&amp;nbsp; For example, a Windows PC running Skype will send a DHCP message with a class identifier of the OS and will also send DHCP messages with a class identifier of MS-UC-Client.&amp;nbsp; Since the class identifier changes, ISE marks it as an anomalous endpoint.&amp;nbsp; One of my customers had every Windows client marked as anomalous.&amp;nbsp; With enforcement turned on, that would deny them all.&lt;/P&gt;&lt;P&gt;It is normal for a client to send multiple DHCP class identifiers.&amp;nbsp; That's how browsers do automatic proxy detection, software phones detect their SIP servers, etc.&amp;nbsp; ISE needs to account for that.&amp;nbsp; The DHCP RFC clearly explains the use of different application-specific class identifiers.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2019 18:40:34 GMT</pubDate>
    <dc:creator>Colby LeMaire</dc:creator>
    <dc:date>2019-09-19T18:40:34Z</dc:date>
    <item>
      <title>ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805432#M484986</link>
      <description>&lt;P&gt;I am googling around trying to confirm on ISE profiling and mitigation against MAC address spoofing but I have not find a confirmed answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When a device connects, get profiled and identified what it is, the ISE screen will show up the endpoint information&amp;nbsp;including&amp;nbsp;what is this&amp;nbsp;endpoint (Cisco IP phone, Ricoh printer, etc). Even if the device is subsequently disconnected, I can still see it on the ISE screen although it shows that it is disconnected. If I now plug a device into the network and spoofed that endpoint MAC address, will ISE re-profile again or just let the device in since it has been profiled previously and still in the ISE DB with the MAC address intact?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I read somewhere in ISE document that when a device has been profiled (which may takes several seconds initially), ISE will cache the information so that subsequently, when the endpoint reconnects again, the network connectivity establishment is faster since it does not need to re-profile again? If this is the case, anyone can easily get into the network by just spoofing the MAC address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 02:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805432#M484986</guid>
      <dc:creator>wiong</dc:creator>
      <dc:date>2019-02-20T02:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805459#M485079</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If the device parameters change and the new ones sent to ISE (for example&lt;BR /&gt;in radius message while the switch is configured for device sensor), ISE&lt;BR /&gt;will reprofile the endpoint. The profile isn't one time activity, it keeps&lt;BR /&gt;checking whenever the device sends radius attributes to the it and in case&lt;BR /&gt;of changes, new profile is assigned.&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Feb 2019 03:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805459#M485079</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-02-20T03:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805463#M485080</link>
      <description>Hi Mohammed,&lt;BR /&gt;So if I configured the switch as a device sensor using RADIUS and let's say the ISE profiling identified the endpoint as a Cisco IP phone using the TLV parameters. Now a rouge device spoofed it's MAC address but does not advertise the TLV value connects to the switch, the switch will send a RADIUS request again to ISE, ISE will re-profile the endpoint, checked the TLV value is changed and block the switch port to this rouge endpoint?&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Feb 2019 04:01:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805463#M485080</guid>
      <dc:creator>wiong</dc:creator>
      <dc:date>2019-02-20T04:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805575#M485081</link>
      <description>Yes this is correct.&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Feb 2019 07:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3805575#M485081</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-02-20T07:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3905448#M485085</link>
      <description>&lt;P&gt;I had the same question.&amp;nbsp; I tested the scenario with a Cisco IP phone and a laptop.&amp;nbsp; After the IP phone was profiled, I disconnected it from the network and then set the mac address on the laptop to the same as the IP phone.&amp;nbsp; I was able to authenticate successfully using the laptop with the exact authorization profile as the ip phone.&amp;nbsp; It classified the laptop as an IP phone based on the information it had cached previously.&amp;nbsp; The laptop was assigned to the voice vlan and had all the permissions on the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 16:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3905448#M485085</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-08T16:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3906643#M485087</link>
      <description>Seems like ISE cannot re-profile it again when the MAC address has been stored in the MAB. This is a potential security vulnerability?!&lt;BR /&gt;</description>
      <pubDate>Mon, 12 Aug 2019 02:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3906643#M485087</guid>
      <dc:creator>wiong</dc:creator>
      <dc:date>2019-08-12T02:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3907513#M485089</link>
      <description>&lt;P&gt;I retested after enabling&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;Enable Anomalous Behaviour Detection&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;Enable Anomalous Behaviour Enforcement&amp;nbsp;&lt;/STRONG&gt;along with the appropriate authorization policy.&amp;nbsp; I set the laptop to use the mac address as the IP phone.&amp;nbsp; It worked as expected to deny the laptop from accessing the network.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 15:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3907513#M485089</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-08-13T15:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3926637#M485091</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How did you got it to work? Did the spoofing device advertise a different TLV value or etc? I am testing it but ISE did not re-profile even when I enable anomalous detection and enforcement. I spoke to TAC, TAC says that because the spoofing device did not send TLV value, ISE did not trigger re-profiling.. To me, isn't that consider a change in the profile coz there is no TLV for the same device that was earlier profiled successfully using OUI + TLV? A simple notebook can easily spoof the MAC address without even installing any 3rd party tools.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 01:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3926637#M485091</guid>
      <dc:creator>wiong</dc:creator>
      <dc:date>2019-09-19T01:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3926908#M485093</link>
      <description>&lt;P&gt;Hi Here are the configs I used on the switch for 802.1x.&amp;nbsp; It is possible that it is using device sensor for your question about TLV.&amp;nbsp; I tested on a 3650 and 3850 switches with&amp;nbsp; IOS 16.6.6 with ISE 2.4 Patch 9.&amp;nbsp; Note I am also doing SNMP probe, a local port ACL and CoA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authentication enable default enable group radius&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec default local group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting auth-proxy default start-stop group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.x.x.x server-key 7 xxxxxxxxxxxxxx&lt;BR /&gt;server-key 7 xxxxxxxxxxxxx&lt;BR /&gt;aaa session-id common&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius server ISE01&lt;BR /&gt;address ipv4 10.x.x.x auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;snmp-server group SNMP_GROUP v3 priv&lt;BR /&gt;snmp-server user SNMP_USER SNMP_GROUP v3 auth sha xxxxxxxxxx priv aes 256 xxxxxxxxxx&lt;BR /&gt;snmp-server host 10.x.x.x version 3 priv SNMP_USER&lt;BR /&gt;snmp-server enable traps snmp linkdown linkup&lt;BR /&gt;device-sensor accounting&lt;BR /&gt;device-sensor notify all-changes&lt;BR /&gt;authentication mac-move permit&lt;BR /&gt;access-session template monitor&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended PORT-ACL-DEFAULT&lt;BR /&gt;permit udp any eq bootpc any eq bootps&lt;BR /&gt;permit udp any any eq domain&lt;BR /&gt;permit icmp any any&lt;BR /&gt;permit udp any any eq tftp&lt;BR /&gt;permit tcp any host 10.x.x.x eq 8443&lt;BR /&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface gi 1/0/1&lt;/P&gt;&lt;P&gt;description XXXXX&lt;BR /&gt;switchport access vlan XXXXX&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xx&lt;BR /&gt;ip access-group PORT-ACL-DEFAULT in&lt;BR /&gt;authentication event server dead action authorize&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 12:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3926908#M485093</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-09-19T12:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3927189#M485094</link>
      <description>&lt;P&gt;ISE will re-profile only if new parameters are received.&amp;nbsp; So if you spoof a MAC and you don't send anything else, ISE has no new information to re-profile with.&amp;nbsp; Absence of information is not enough to trigger ISE to profile it again.&lt;/P&gt;&lt;P&gt;Be careful with Anomalous Detection and Enforcement.&amp;nbsp; It has issues and there are some bugs filed on it.&amp;nbsp; For example, a Windows PC running Skype will send a DHCP message with a class identifier of the OS and will also send DHCP messages with a class identifier of MS-UC-Client.&amp;nbsp; Since the class identifier changes, ISE marks it as an anomalous endpoint.&amp;nbsp; One of my customers had every Windows client marked as anomalous.&amp;nbsp; With enforcement turned on, that would deny them all.&lt;/P&gt;&lt;P&gt;It is normal for a client to send multiple DHCP class identifiers.&amp;nbsp; That's how browsers do automatic proxy detection, software phones detect their SIP servers, etc.&amp;nbsp; ISE needs to account for that.&amp;nbsp; The DHCP RFC clearly explains the use of different application-specific class identifiers.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 18:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3927189#M485094</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-09-19T18:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3927519#M485096</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624773"&gt;@Colby LeMaire&lt;/a&gt;&amp;nbsp; good to know about the issues with&amp;nbsp;&lt;SPAN&gt;Anomalous Detection and Enforcement.&amp;nbsp; I did have the DHCP identifier issue on profiling Polycom phones.&amp;nbsp; The packet capture showed they were sending the Polycom identifier then the&amp;nbsp;MS-UC-Client for skype for business.&amp;nbsp; Ended up doing a custom condition for this.&amp;nbsp; I will monitor the windows PC's to see if this issue occurs for skype for business client.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 11:35:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3927519#M485096</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-09-20T11:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959014#M485098</link>
      <description>&lt;P&gt;Having the same issues on dot1x workstations that have machine cert validation AND AD membership validation. I'm able to take MAC of a dot1x workstation previously validated and authenticate without CERT. The spoof machine even has different HOSTNAME. Yet I'm fully able to spoof get on the network. Bit scary. I'm on ISE 2.3p6 and anomaly detection is enabled. (not even seeing the spoofed machine/mac detected by the detection enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone found good documentation on this? Serious flaw within ISE unless there is something I'm not doing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 22:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959014#M485098</guid>
      <dc:creator>MS-JK</dc:creator>
      <dc:date>2019-11-14T22:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959051#M485099</link>
      <description>&lt;P&gt;Are you connected behind an unmanaged switch or hub so that the Cisco switch isn't detecting the link state change?&amp;nbsp; I assume that is what you are doing since any link state change would force a new authentication.&amp;nbsp; If you are doing this behind some device to keep the link state up, then one option to combat that is to use reauthentication.&amp;nbsp; If someone really wants to get in, they will.&amp;nbsp; They can spoof the MAC and intentionally not send any new profiling data or anything that could trigger profiling.&amp;nbsp; In that case, your only option to mitigate it is with reauthentication every so often.&amp;nbsp; The Department of Defense (Network STIG) requires a reauthentication timeout of every hour (60 minutes) for that reason.&amp;nbsp; Defense needs to be layered.&amp;nbsp; Always assume someone can break in if they want.&amp;nbsp; Your goal for security is to make it harder and harder by having multiple layers that need to be broken before anything of value can be obtained.&amp;nbsp; Increase the window of time that would be required for an attacker to get anything so you increase the odds of someone catching them.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 23:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959051#M485099</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-11-14T23:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959062#M485100</link>
      <description>&lt;P&gt;You bring up a good point. So the good guy was connecting to SWITCH1 (managed) and the bad guy was connecting to SWITCH2 (managed) different port - direct connection. Which is even more alarming. ISE detected the new machine (simple linux machine with spoofed MAC and different hostname) and gave it same access as the connected good guy's machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With that said 2 tests were done. ONE printer (MAB) and one WIN10 (Dot1x). The printer - port did bounce as its directly connecting but spoofing machine (even with the different hostname) assumed same ISE auth/author profile of the previously connected printer -&amp;nbsp; and again without any Anomalous Behavior detected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;jk&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 00:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959062#M485100</guid>
      <dc:creator>MS-JK</dc:creator>
      <dc:date>2019-11-15T00:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959365#M485101</link>
      <description>&lt;P&gt;Hi do you have the authorization policy enabled to block the devices when the behavior is detected?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 15:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3959365#M485101</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-11-15T15:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3986908#M485102</link>
      <description>&lt;P&gt;There is nothing to block - it didn't even DETECT it. Right now - this is a serious flaw with ISE. Anyone can become a dot1x authenticated user with machine cert and AD validations with a simple 10 second MAC spoof? ISE didn't even see it on host change, no NMAP is re-initiated, no re-profile is initiated. Scary - why would we recommend ISE to anyone if this holds true? I'm hoping I'm wrong.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 21:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/3986908#M485102</guid>
      <dc:creator>MS-JK</dc:creator>
      <dc:date>2019-11-20T21:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4037713#M558459</link>
      <description>&lt;P&gt;So what command needs to be running on the switch interface?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 19:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4037713#M558459</guid>
      <dc:creator>AMoore1776</dc:creator>
      <dc:date>2020-02-28T19:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4038093#M558472</link>
      <description>&lt;P&gt;In your first scenario, "You bring up a good point. So the good guy was connecting to SWITCH1 (managed) and the bad guy was connecting to SWITCH2 (managed) different port - direct connection. Which is even more alarming. ISE detected the new machine (simple linux machine with spoofed MAC and different hostname) and gave it same access as the connected good guy's machine."&lt;/P&gt;
&lt;P&gt;How is first guy connecting through dot1x or MAB . If it connecting using dot1x and then bad guy connecting to switch 2 may spoof MAC address but he will not get access as he does not have dot1x crendetials (Cert or user/password).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In second scenario "ONE printer (MAB) and one WIN10 (Dot1x). The printer - port did bounce as its directly connecting but spoofing machine (even with the different hostname) assumed same ISE auth/author profile of the previously connected printer - and again without any Anomalous Behavior detected."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does work as long as both type of endpoints getting correctly profiled. Win10 at should have got profiled as at least as 'workstation' and printer should have profiled as 'printer' then only ISE can detect and enforce ABD.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2020 00:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4038093#M558472</guid>
      <dc:creator>Parag Mahajan</dc:creator>
      <dc:date>2020-03-01T00:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4139115#M562432</link>
      <description>&lt;P&gt;On our production network we have Anomalous Behavior Detection enabled, but Enforcement is disabled.&lt;/P&gt;&lt;P&gt;What would be the impact if I enable the Enforcement as well and Change CoA type to Re Auth instead of No CoA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice for profiling an endpoint?&lt;/P&gt;&lt;P&gt;We generally try to avoid just using OUI or MAC address alone?&lt;/P&gt;&lt;P&gt;Is it wise to use DHCP Parameter Request List or NMAP Port Scan Result?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2020 23:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4139115#M562432</guid>
      <dc:creator>nayan29net</dc:creator>
      <dc:date>2020-08-20T23:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling and MAC address spoofing mitigation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4139117#M562433</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292493"&gt;@Mohammed al Baqari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On our production network we have Anomalous Behavior Detection enabled, but Enforcement is disabled.&lt;/P&gt;&lt;P&gt;What would be the impact if I enable the Enforcement and Change CoA type to Re Auth instead of No CoA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice for profiling an endpoint?&lt;/P&gt;&lt;P&gt;We generally try to avoid just using OUI or MAC address alone?&lt;/P&gt;&lt;P&gt;Is it wise to use DHCP Parameter Request List or NMAP Port Scan Result?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also why two printer with same OUI/Different Model Provide different attributes?&lt;/P&gt;&lt;P&gt;I have some ricoh printer which provide precise details like&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;hrDeviceDescr&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;RICOH Aficio SP 4210N&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;sysDescr&lt;/TD&gt;&lt;TD&gt;RICOH Aficio SP 4210N 1.02 / RICOH Network Printer C model&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where some does not provide any concrete information&lt;/P&gt;&lt;P&gt;They provide dhcp-parameter-request-list which is not necessary indication if its printer devices&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2020 23:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-and-mac-address-spoofing-mitigation/m-p/4139117#M562433</guid>
      <dc:creator>nayan29net</dc:creator>
      <dc:date>2020-08-20T23:09:12Z</dc:date>
    </item>
  </channel>
</rss>

