<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Visibility Wizard Operation / Behavior in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3798263#M485369</link>
    <description>&lt;P&gt;Sam, have you ruled out any network issues on the network such as speed duplex settings on the interfaces? It could explain inconsistencies of the result. Also, I would enable debug for profiler log and see if there are any hints on the issue. I don't believe 60 switches would be an issue so odd that you are only discovering subset of the devices. Running simultaneous scan would not help as it will only run one at a time. For the NMAP scan, I would create a TAC SR for root cause. ISE may do triggered scans but should not happen in your case as you are not authenticating endpoints outside of the subnets specified. Lastly, as a test I would limit the initial scan to one or two endpoint subnets as a test.&lt;/P&gt;</description>
    <pubDate>Sat, 09 Feb 2019 05:10:10 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2019-02-09T05:10:10Z</dc:date>
    <item>
      <title>ISE Visibility Wizard Operation / Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3797312#M485362</link>
      <description>&lt;P dir="ltr"&gt;Experience during a PoC&amp;nbsp; Customer has roughly 3000 LAN switches that sit on a common VLAN per campus site.&amp;nbsp; At some large locations there are upwards of about 60 switches on one subnet (e.g. 10.100.1.0/24)&amp;nbsp; We were using the Visibility Wizard to discover the 30k endpoints in their network.&amp;nbsp; In the beginning of the wizard we put the 10.100.1.0 network in the network device discovery wizard.&amp;nbsp; After running just the network device discovery the results only returned 12 switches even thought there were a lot more on the subnet in the same building.&amp;nbsp;&amp;nbsp; If we run it again, only 1-3 more devices would show up.&amp;nbsp; We could never get more than 15 devices discovered. &amp;nbsp;&amp;nbsp; Is there a limit on the number of network devices that can be returned in a search?&amp;nbsp; SNMPv3 values were all correct and we believe we had no discovery failures.&amp;nbsp; &lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Second question.&amp;nbsp; For discovery purposes only, can you start another Visibility scan immediately after you wizard-complete the first one. Will ISE be able to run two or more Visibility network scans at the same time (staggered overlapping)?&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Third question, we also saw NMAP scans for devices that were not in our specified subnets.&amp;nbsp; For example, we set the visibility wizard up to scan the 10.120.1.0 network.&amp;nbsp; When running a tail of the Nmap.log file we saw that nmap was scanning other networks such as 10.5.0.0 or 10.21.1.0.&amp;nbsp; This ISE is doing no authentication/authorization.&amp;nbsp; The only other thing we have configured is a DHCP/HTTP SPAN. Would nmap automatically be scanning the devices that were learned via those probes?&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;I have not been able to find any detailed documentation on the Visibility wizard.&amp;nbsp; Pointers would be welcome.&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 01:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3797312#M485362</guid>
      <dc:creator>scamarda</dc:creator>
      <dc:date>2019-02-08T01:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Visibility Wizard Operation / Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3798263#M485369</link>
      <description>&lt;P&gt;Sam, have you ruled out any network issues on the network such as speed duplex settings on the interfaces? It could explain inconsistencies of the result. Also, I would enable debug for profiler log and see if there are any hints on the issue. I don't believe 60 switches would be an issue so odd that you are only discovering subset of the devices. Running simultaneous scan would not help as it will only run one at a time. For the NMAP scan, I would create a TAC SR for root cause. ISE may do triggered scans but should not happen in your case as you are not authenticating endpoints outside of the subnets specified. Lastly, as a test I would limit the initial scan to one or two endpoint subnets as a test.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 05:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3798263#M485369</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-09T05:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Visibility Wizard Operation / Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3798574#M485454</link>
      <description>&lt;P&gt;Adding to Hosuk's...&lt;/P&gt;
&lt;P&gt;Actually... it might&amp;nbsp;trigger NMAP scans on endpoints discovered through SNMP queries to the network devices, if the matched profiler policies have scan actions.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 04:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3798574#M485454</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-02-10T04:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Visibility Wizard Operation / Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3800188#M485461</link>
      <description>&lt;P&gt;Hi Thanks for the responses.&amp;nbsp; I can understand the additional scanning if the resulting profile has a scan action. Here is response from additional testing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;"We currently have 16,727 devices.&amp;nbsp; I have added 2 other regional locations.&amp;nbsp; Didn't discover any new hosts when I added those though they have about 5000 users in total at those locations.&amp;nbsp; I have identified a few locations that I wanted to verify devices.&amp;nbsp; I have discovered some switches that are in the IP address range that we scanned that weren't discovered when we initially scanned the ranges.&amp;nbsp; I have re-ran the scans and seem to discover a new switch or two each time I run a scan.&amp;nbsp; Still scanning the /26 range.&amp;nbsp; I will continue to look today and add the remaining locations.&amp;nbsp; We have detected around 300 wireless devices.&amp;nbsp; I think there should be a lot more."&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;The results we are receiving are inconsistent.&amp;nbsp; I don't see how it could be a network or a config issue if the network devices are getting discovered on a 2nd and subsequent scan.&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;Thanks.&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;Sam&lt;/P&gt;
&lt;P style="margin-top: 0px; margin-bottom: 0px; caret-color: #000000; color: #000000; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 15:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3800188#M485461</guid>
      <dc:creator>scamarda</dc:creator>
      <dc:date>2019-02-12T15:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Visibility Wizard Operation / Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3802869#M485471</link>
      <description>&lt;P&gt;SNMP query probe needs the ARP table on the target network devices to build IP-ARP cache. This might be the reason for inconsistent results.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 16:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-visibility-wizard-operation-behavior/m-p/3802869#M485471</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-02-15T16:47:51Z</dc:date>
    </item>
  </channel>
</rss>

