<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE device profiling / NMAP OS detected in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749274#M488054</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a known issue and we are working on a fix.&amp;nbsp; Suggest trying to use another profiling probe instead of NMAP OS scan in the mean time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;-Tim&lt;/P&gt;</description>
    <pubDate>Mon, 19 Nov 2018 14:20:15 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2018-11-19T14:20:15Z</dc:date>
    <item>
      <title>ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749177#M488053</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently working&amp;nbsp;with a customer&amp;nbsp;who is running&amp;nbsp;ISE 2.4 patch 3&amp;nbsp;and&amp;nbsp;experiencing issues&amp;nbsp;with NMAP OS detected. The devices are being profiled as Apple iPhone devices correctly, but NMAP then reports the OS detected as&lt;SPAN&gt;&amp;nbsp;running "Cisco Nexus 7010 switch (NX-OS 5) (accuracy 98%)".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;E4:9A:DC:5B:47:D4&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;MAC Address: E4:9A:DC:5B:47:D4&lt;/P&gt;
&lt;P&gt;Username:&amp;nbsp;removed&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Endpoint Profile: Apple-Device&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Current IP Address: 10.56.226.59&lt;/P&gt;
&lt;P&gt;Location: LocationAll Locations&lt;/P&gt;
&lt;P&gt;Applications Attributes Authentication Threats Vulnerabilities&lt;/P&gt;
&lt;P&gt;General Attributes&lt;/P&gt;
&lt;P&gt;Description&lt;/P&gt;
&lt;P&gt;Static Assignment false&lt;/P&gt;
&lt;P&gt;Endpoint Policy Apple-Device&lt;/P&gt;
&lt;P&gt;Static Group Assignment false&lt;/P&gt;
&lt;P&gt;Identity Group Assignment Profiled&lt;/P&gt;
&lt;P&gt;Custom Attributes&lt;/P&gt;
&lt;P&gt;Attribute Name Attribute Value&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Attribute Name&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Attribute Value&lt;/P&gt;
&lt;P&gt;No data found. Add custom attributes here.&lt;/P&gt;
&lt;P&gt;Other Attributes&lt;/P&gt;
&lt;P&gt;AAA-Server cosisepsn1&lt;/P&gt;
&lt;P&gt;AD-Error-Details Domain trust is one-way&lt;/P&gt;
&lt;P&gt;AD-Groups-Names agilent.com/Users/Domain Users&lt;/P&gt;
&lt;P&gt;AD-User-Candidate-Identities removed&lt;A href="mailto:taknakai@agilent.com" target="_blank"&gt;@removed.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;AD-User-DNS-Domain removed.com&lt;/P&gt;
&lt;P&gt;AD-User-Join-Point removed.COM&lt;/P&gt;
&lt;P&gt;AD-User-NetBios-Name&amp;nbsp;removed&lt;/P&gt;
&lt;P&gt;AD-User-Qualified-Name removed&lt;A href="mailto:takashi_nakai@agilent.com" target="_blank"&gt;@removed.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;AD-User-Resolved-DNs CN=removed\,CN=Users\,DC=removed\,DC=com&lt;/P&gt;
&lt;P&gt;AD-User-Resolved-Identities removed&lt;A href="mailto:taknakai@agilent.com" target="_blank"&gt;@removed.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;AD-User-SamAccount-Name&amp;nbsp;removed&lt;/P&gt;
&lt;P&gt;Airespace-Wlan-Id 1&lt;/P&gt;
&lt;P&gt;AuthenticationIdentityStore&amp;nbsp;removed&lt;/P&gt;
&lt;P&gt;AuthenticationMethod MSCHAPV2&lt;/P&gt;
&lt;P&gt;AuthenticationStatus AuthenticationPassed&lt;/P&gt;
&lt;P&gt;AuthorizationPolicyMatchedRule PEAP Authentication&lt;/P&gt;
&lt;P&gt;BYODRegistration Unknown&lt;/P&gt;
&lt;P&gt;Called-Station-ID 00-27-0d-49-5d-30:spark&lt;/P&gt;
&lt;P&gt;Calling-Station-ID e4-9a-dc-5b-47-d4&lt;/P&gt;
&lt;P&gt;Chargeable-User-Identity c8:&lt;/P&gt;
&lt;P&gt;DTLSSupport Unknown&lt;/P&gt;
&lt;P&gt;DestinationIPAddress 130.30.1.79&lt;/P&gt;
&lt;P&gt;DestinationPort 1812&lt;/P&gt;
&lt;P&gt;DetailedInfo Authentication succeed&lt;/P&gt;
&lt;P&gt;Device IP Address 10.2.49.200&lt;/P&gt;
&lt;P&gt;Device Port 52813&lt;/P&gt;
&lt;P&gt;Device Type Device Type#All Device Types&lt;/P&gt;
&lt;P&gt;DeviceRegistrationStatus NotRegistered&lt;/P&gt;
&lt;P&gt;ElapsedDays 66&lt;/P&gt;
&lt;P&gt;EndPointMACAddress E4-9A-DC-5B-47-D4&lt;/P&gt;
&lt;P&gt;EndPointPolicy Apple-Device&lt;/P&gt;
&lt;P&gt;EndPointProfilerServer cosisepsn1.ns.removed.net&lt;/P&gt;
&lt;P&gt;EndPointSource RADIUS Probe&lt;/P&gt;
&lt;P&gt;FailureReason -&lt;/P&gt;
&lt;P&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;/P&gt;
&lt;P&gt;IdentityAccessRestricted false&lt;/P&gt;
&lt;P&gt;IdentityGroup Profiled&lt;/P&gt;
&lt;P&gt;IdentityPolicyMatchedRule PEAP Authentication&lt;/P&gt;
&lt;P&gt;InactiveDays 6&lt;/P&gt;
&lt;P&gt;IsMachineAuthentication false&lt;/P&gt;
&lt;P&gt;IsMachineIdentity false&lt;/P&gt;
&lt;P&gt;IsThirdPartyDeviceFlow false&lt;/P&gt;
&lt;P&gt;LastNmapScanTime 2018-Oct-22 08:54:17 UTC&lt;/P&gt;
&lt;P&gt;Location Location#All Locations&lt;/P&gt;
&lt;P&gt;Location-Capable 00:00:00:01&lt;/P&gt;
&lt;P&gt;LogicalProfile Mobile Devices&lt;/P&gt;
&lt;P&gt;MACAddress E4:9A:DC:5B:47:D4&lt;/P&gt;
&lt;P&gt;MatchedPolicy Apple-Device&lt;/P&gt;
&lt;P&gt;MessageCode 3001&lt;/P&gt;
&lt;P&gt;NAS-IP-Address 10.2.49.200&lt;/P&gt;
&lt;P&gt;NAS-Identifier SGPWLC01&lt;/P&gt;
&lt;P&gt;NAS-Port 8&lt;/P&gt;
&lt;P&gt;NAS-Port-Type Wireless - IEEE 802.11&lt;/P&gt;
&lt;P&gt;Network Device Profile Cisco&lt;/P&gt;
&lt;P&gt;NetworkDeviceGroups IPSEC#Is IPSEC Device#No, Location#All Locations, Device Type#All Device Types&lt;/P&gt;
&lt;P&gt;NetworkDeviceName SGPWLC01&lt;/P&gt;
&lt;P&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;/P&gt;
&lt;P&gt;NetworkDeviceProfileName Cisco&lt;/P&gt;
&lt;P&gt;NmapScanCount 3&lt;/P&gt;
&lt;P&gt;OUI Apple, Inc.&lt;/P&gt;
&lt;P&gt;PolicyVersion 25&lt;/P&gt;
&lt;P&gt;PostureApplicable Yes&lt;/P&gt;
&lt;P&gt;PostureAssessmentStatus NotApplicable&lt;/P&gt;
&lt;P&gt;RadiusFlowType Wireless802_1x&lt;/P&gt;
&lt;P&gt;RadiusPacketType Drop&lt;/P&gt;
&lt;P&gt;SSID 00-27-0d-49-5d-30:spark&lt;/P&gt;
&lt;P&gt;SelectedAccessService Default Network Access&lt;/P&gt;
&lt;P&gt;SelectedAuthenticationIdentityStores Internal Users,&amp;nbsp;removed&lt;/P&gt;
&lt;P&gt;SelectedAuthorizationProfiles removed-Permit-Employee, SPARK&lt;/P&gt;
&lt;P&gt;Service-Type Framed&lt;/P&gt;
&lt;P&gt;StaticAssignment false&lt;/P&gt;
&lt;P&gt;StaticGroupAssignment false&lt;/P&gt;
&lt;P&gt;StepData 4= Airespace.Airespace-Wlan-Id, 5= DEVICE.Device Type, 6= Radius.User-Name, 70= Radius.NAS-Port-Type, 71= Radius.Service-Type, 72= Network Access.EapAuthentication, 73= Network Access.EapTunnel, 74=removed, 75=Internal Users, 78=removed, 79=removed, 80=removed, 81=removed.com, 82=removed.com, 83=MTP.local\,Domain trust is one-way, 84=dmxtest.removed.com\,Domain trust is one-way, 85=removed.removed.com\,Domain trust is one-way,&amp;nbsp;&lt;A href="mailto:87=taknakai@agilent.com" target="_blank"&gt;87=user&amp;amp;customer.com&lt;/A&gt;, 88=Removed, 107= Radius.User-Name, 108= Radius.Called-Station-ID, 109= EndPoints.LogicalProfile, 116=Removed, 117=Removed.com, 118=REMOVED&lt;/P&gt;
&lt;P&gt;TLSCipher ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;
&lt;P&gt;TLSVersion TLSv1.2&lt;/P&gt;
&lt;P&gt;Total Certainty Factor 100&lt;/P&gt;
&lt;P&gt;User-AD-Last-Fetch-Time 1541753618565&lt;/P&gt;
&lt;P&gt;User-Fetch-CountryName&amp;nbsp;*Country Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-Department *Dept Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-Email&amp;nbsp;*Email Address Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-First-Name&amp;nbsp;*First Name Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-Last-Name&amp;nbsp;*Last Name Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-LocalityName&amp;nbsp;*Locality Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-Organizational-Unit&amp;nbsp;*Customer OU Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-StateOrProvinceName 13&lt;/P&gt;
&lt;P&gt;User-Fetch-StreetAddress 9-1&amp;nbsp;*Street Address Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-Telephone&amp;nbsp;*Telephone Removed*&lt;/P&gt;
&lt;P&gt;User-Fetch-User-Name&amp;nbsp;*Name Removed*&lt;/P&gt;
&lt;P&gt;User-Name&amp;nbsp;*Username Removed*&lt;/P&gt;
&lt;P&gt;UserAccountControl 512&lt;/P&gt;
&lt;P&gt;allowEasyWiredSession false&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;operating-system Cisco Nexus 7010 switch (NX-OS 5) (accuracy 98%)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Obviously an Apple iPhone is not running a Nexus 7010 OS, any help or pointers would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 11:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749177#M488053</guid>
      <dc:creator>iagyte</dc:creator>
      <dc:date>2018-11-19T11:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749274#M488054</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a known issue and we are working on a fix.&amp;nbsp; Suggest trying to use another profiling probe instead of NMAP OS scan in the mean time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;-Tim&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 14:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749274#M488054</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-11-19T14:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749293#M488055</link>
      <description>&lt;P&gt;Thanks Tim, appreciate your response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to set expectations with the customer, do you know when we expect to have a fix?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 14:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749293#M488055</guid>
      <dc:creator>iagyte</dc:creator>
      <dc:date>2018-11-19T14:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749299#M488097</link>
      <description>Ian,&lt;BR /&gt;&lt;BR /&gt;Unfortunately we can’t specify an exact date the fix will be issued in a patch.  The reason being is that patch dates could potentially slip and bugs are added and removed from patches all the time for various reasons.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Nov 2018 15:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749299#M488097</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-11-19T15:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749534#M488099</link>
      <description>&lt;P&gt;Tim,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this really a bug?&amp;nbsp; NMAP OS detection has been notoriously sketchy for a long time. I thought it was just a function of NMAP and not so much an ISE issue.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 20:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749534#M488099</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-11-19T20:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749562#M488103</link>
      <description>Yes, there is a bug against it and you’re correct it is a function of NMAP.  Since NMAP is included and not scanning properly, we have to look into it.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Nov 2018 20:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749562#M488103</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-11-19T20:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749569#M488129</link>
      <description>Ahh okay.  I always just explain it as NMAP being NMAP and most customers shake their head and agree.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Nov 2018 21:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3749569#M488129</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-11-19T21:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3916809#M488130</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a similar problem but in my case I have:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;EndPointSource NMAP Probe&lt;/P&gt;&lt;P&gt;OUI Apple, Inc.&lt;/P&gt;&lt;P&gt;host-name iPhone&lt;BR /&gt;operating-system-result Windows 10 Enterprise&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I am not receiving&amp;nbsp; information about "operating-system" parameter only "operating-system-result".&amp;nbsp; Any idea why my iphone is not answering?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 15:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/3916809#M488130</guid>
      <dc:creator>claudio.rosa@vale.com</dc:creator>
      <dc:date>2019-08-30T15:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE device profiling / NMAP OS detected</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/4000298#M488131</link>
      <description />
      <pubDate>Tue, 17 Dec 2019 21:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-profiling-nmap-os-detected/m-p/4000298#M488131</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2019-12-17T21:56:17Z</dc:date>
    </item>
  </channel>
</rss>

