<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling radius probes as best practice in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495434#M496139</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Utkarsh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the use case here.&lt;/P&gt;&lt;P&gt;ISE profiling requires MAC and IP address as a neccessary attribute for profiling to work.&lt;/P&gt;&lt;P&gt;MAC and IP can be gathered by DHCP and RADIUS typically. Other probes that typically uses IP address such as NMAP needs this information. Also for NMAP to work you have to make sure to disable firewall on endpoints and try a manual scan as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the Profiling best practices guide(pg 127 through 139) for information on what probes should be used in what situation.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-64017"&gt;ISE Profiling&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jul 2018 19:16:21 GMT</pubDate>
    <dc:creator>kthiruve</dc:creator>
    <dc:date>2018-07-16T19:16:21Z</dc:date>
    <item>
      <title>Enabling radius probes as best practice</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495431#M496136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a customer who has disabled Radius probes on recommendation by TAC. I should get more clarity today.&lt;/P&gt;&lt;P&gt;It was my understanding that enabling Radius probes was a best practice recommendation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also Craig mentioned before on the below link that there was a plan to make Radius probe mandatory.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/message/232471"&gt;Re: MAC address using only DHCP probes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also seen some weird behaviour in lab while testing NMAP profiling without Radius probes enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2018 14:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495431#M496136</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-07-16T14:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling radius probes as best practice</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495432#M496137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt; "It was my understanding that enabling Radius probes was a best practice recommendation."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is False and RADIUS profiling is critical to support a number of core functions.&amp;nbsp; It is actually enabled by default and runs without Plus license.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2018 16:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495432#M496137</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-07-16T16:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling radius probes as best practice</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495433#M496138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig, so RADIUS profiling should always be enabled even though there is an option to disable it ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2018 16:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495433#M496138</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-07-16T16:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling radius probes as best practice</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495434#M496139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Utkarsh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the use case here.&lt;/P&gt;&lt;P&gt;ISE profiling requires MAC and IP address as a neccessary attribute for profiling to work.&lt;/P&gt;&lt;P&gt;MAC and IP can be gathered by DHCP and RADIUS typically. Other probes that typically uses IP address such as NMAP needs this information. Also for NMAP to work you have to make sure to disable firewall on endpoints and try a manual scan as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the Profiling best practices guide(pg 127 through 139) for information on what probes should be used in what situation.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-64017"&gt;ISE Profiling&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2018 19:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495434#M496139</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2018-07-16T19:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling radius probes as best practice</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495435#M496140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have to chime in here because this topic has bothered me since day 1.&amp;nbsp; By default, the Profiling checkbox is enabled when you install ISE.&amp;nbsp; And in the past I always unchecked that box for customers who don't have Plus licensing.&amp;nbsp; I thought this made some logical sense.&amp;nbsp; As Craig always says, only enable what needs to be enabled.&amp;nbsp; Right???&amp;nbsp; I have no idea how much compute power I save by doing that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the murky details about what is really happening under the covers has never been properly explained (or at least I have not found that explanation).&amp;nbsp; Here is what I believe is happening&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Scenario 1: No Plus License installed -&amp;nbsp; Profiling &lt;STRONG&gt;disabled&lt;/STRONG&gt; - PSN will still "profile" the data from Device Sensor Radius Accounting Interim Updates.&amp;nbsp; (this is the poor man's profiling and comes for free.&amp;nbsp; No Plus license required because there are no AuthZ rules.&amp;nbsp; It's just like magic)&lt;/LI&gt;&lt;LI&gt;Scenario 2: No Plus License installed -&amp;nbsp; Profiling &lt;STRONG&gt;enabled&lt;/STRONG&gt; - PSN will "profile" the data from Device Sensor Radius Accounting Interim Updates.&amp;nbsp; Same as above.&amp;nbsp; But, what is the PSN now doing in addition??&amp;nbsp; Let's say I enable Radius probe only.&amp;nbsp; Have I enabled any additional functionality, given that perhaps I only want to use the Device Sensor data as my source?&amp;nbsp; Is this better magic than Scenario 1?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The word "probe" is misleading in the case where NAD's are sending Device Sensor data via Radius Acct because ISE is not doing any active probing at all.&amp;nbsp; It's a gratuitous piece of data from the NAD that ISE decodes and uses for various purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to save myself the heartache , I just leave Profiling enabled even for customers who don't have Plus Licenses.&amp;nbsp; On the upside, the application services don't restart when I do that (bonus!) and what's the worst that can happen, right? &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/silly.png" /&gt; - customer who don't care about profiling for their AuthZ might still be interested to know what types of devices are on their network (just for statistical purposes)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 23:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-radius-probes-as-best-practice/m-p/3495435#M496140</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-07-17T23:09:33Z</dc:date>
    </item>
  </channel>
</rss>

