<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Do nmap scan on every authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760246#M487361</link>
    <description>it would be great to define endpoints which should be scanned continous.  --&amp;gt; Check with TAC if an enhancement request can be filed for this.&lt;BR /&gt;&lt;BR /&gt;How is the nmap scan exactly triggered? Which attributes must change that a new scan is done? --&amp;gt; The first one i've answered in the previous reply. For the second part, any attributes learnt that cause the profile to change.   &lt;BR /&gt;&lt;BR /&gt;How does this work with other profiling information like dhcp? Are these informations instantly updated and could inititate a coa? For example a new device connects on the printer port with the same mac address (spoofed) an sends some dhcp requests which differ from the one which the printer sends...can this issue a coa?&lt;BR /&gt;&lt;BR /&gt;As soon as new attributes are learnt (including DHCP), based on the certainty factor of those attributes, a profile of an endpoint is ought to be changed. Once this happens, based on the type of CoA you set for profiler, a CoA will be issued.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Sun, 09 Dec 2018 15:53:57 GMT</pubDate>
    <dc:creator>Surendra</dc:creator>
    <dc:date>2018-12-09T15:53:57Z</dc:date>
    <item>
      <title>Do nmap scan on every authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760210#M487345</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have a few printers which are authenticated with mab.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to do nmap profiling on every authentication to ensure that this devices are real printers....i made&amp;nbsp; it work that the endpoint get profiled once - but after the first successful nmap scan no more scans are made.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only solution i found is endpoint purge..so every printer gets profiled new after a day....is it possible to scan on every authentication?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Dec 2018 13:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760210#M487345</guid>
      <dc:creator>kskksaa</dc:creator>
      <dc:date>2018-12-09T13:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Do nmap scan on every authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760221#M487351</link>
      <description>NMAP scan is triggered for only new endpoints because of the following reasons:&lt;BR /&gt;&lt;BR /&gt;1. The information collected directly from the endpoint by scanning them is not expected to change over a period of time.&lt;BR /&gt;2. NMAP can cause a serious performance and memory issue if run for every authentication that happens for an endpoint. Especially in deployments where there are more than a hundred thousand endpoints and on top of that considering re-authentications configure etc. this could potentially bring down the nodes.&lt;BR /&gt;3. Having said, that an NMAP scan is triggered again for an endpoint if the profile of the endpoint significantly changes. (Ex: IP Phone to a Telepresence device)etc.&lt;BR /&gt;</description>
      <pubDate>Sun, 09 Dec 2018 14:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760221#M487351</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-09T14:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Do nmap scan on every authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760232#M487356</link>
      <description>&lt;P&gt;Okay thank you for your answer.&lt;/P&gt;
&lt;P&gt;Makes sense, but it would be great to define endpoints which should be scanned continous.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How is the nmap scan exactly triggered? Which attributes must change that a new scan is done?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How does this work with&amp;nbsp;other profiling information like dhcp? Are these informations instantly updated and could inititate a coa? For example a new device connects on the printer port with the same mac address (spoofed) an sends some dhcp requests which differ from the one which the printer sends...can this issue a coa?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Dec 2018 15:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760232#M487356</guid>
      <dc:creator>kskksaa</dc:creator>
      <dc:date>2018-12-09T15:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Do nmap scan on every authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760246#M487361</link>
      <description>it would be great to define endpoints which should be scanned continous.  --&amp;gt; Check with TAC if an enhancement request can be filed for this.&lt;BR /&gt;&lt;BR /&gt;How is the nmap scan exactly triggered? Which attributes must change that a new scan is done? --&amp;gt; The first one i've answered in the previous reply. For the second part, any attributes learnt that cause the profile to change.   &lt;BR /&gt;&lt;BR /&gt;How does this work with other profiling information like dhcp? Are these informations instantly updated and could inititate a coa? For example a new device connects on the printer port with the same mac address (spoofed) an sends some dhcp requests which differ from the one which the printer sends...can this issue a coa?&lt;BR /&gt;&lt;BR /&gt;As soon as new attributes are learnt (including DHCP), based on the certainty factor of those attributes, a profile of an endpoint is ought to be changed. Once this happens, based on the type of CoA you set for profiler, a CoA will be issued.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 09 Dec 2018 15:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/do-nmap-scan-on-every-authentication/m-p/3760246#M487361</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-09T15:53:57Z</dc:date>
    </item>
  </channel>
</rss>

