<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE  FIPS mode  authentication with  headless endpoints in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450339#M510716</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a customer that would like to authenticate headless endpoints&amp;nbsp; e.g printers , phones etc attached to&amp;nbsp; Juniper switch&amp;nbsp; with host lookup after FIPS is enabled. I currently have device profile configured for Juniper switch in ISE, and host lookup.&amp;nbsp; Please is there a better way to authenticate headless devices&amp;nbsp; with Juniper device profile configured in ISE with FIPS mode enabled ? . Any pointers will be greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Apr 2018 19:36:40 GMT</pubDate>
    <dc:creator>jideji</dc:creator>
    <dc:date>2018-04-16T19:36:40Z</dc:date>
    <item>
      <title>ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450339#M510716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a customer that would like to authenticate headless endpoints&amp;nbsp; e.g printers , phones etc attached to&amp;nbsp; Juniper switch&amp;nbsp; with host lookup after FIPS is enabled. I currently have device profile configured for Juniper switch in ISE, and host lookup.&amp;nbsp; Please is there a better way to authenticate headless devices&amp;nbsp; with Juniper device profile configured in ISE with FIPS mode enabled ? . Any pointers will be greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450339#M510716</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2018-04-16T19:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450340#M510717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jacob, since multiple questions related to same topic, I am flagging this as a duplicate of &lt;A href="https://community.cisco.com/thread/91041"&gt;MAB with Juniper devices in FIPS mode&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not found a definitive reference related to FIPS compliance with MAC Authentication other than typical statements that unencrypted passwords or weak ciphers/hashes such as EAP-MD5, PAP, CHAP, and MSCHAPv1/v2 are explicitly not supported.&amp;nbsp; Even though these protocols are disabled in FIPS mode, the basic host lookup function can still authenticate endpoints based on their MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most references state that MAC Auth by its nature is easily spoofed since L2 headers appear in clear, but use of EAP-MD5 or other context does offer better security and a next best choice over simple cleartext.&amp;nbsp; I would check with your security officer for more official statement.&amp;nbsp; There may also be the option to implement compensating controls such as MACsec along the link.&amp;nbsp; I don't think Juniper switches support, but ISE also supports DTLS and IPsec for encryption between NAD and PSN.&amp;nbsp; IPsec may be sufficient for this connection, but client to NAD is still in clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a related note, I did find this useful post: &lt;A href="https://security.stackexchange.com/questions/44388/are-radius-and-tacacs-ever-allowed-in-fips-140-2-compliant-scenarios?utm_medium=organic&amp;amp;utm_source=google_rich_qa&amp;amp;utm_campaign=google_rich_qa" title="https://security.stackexchange.com/questions/44388/are-radius-and-tacacs-ever-allowed-in-fips-140-2-compliant-scenarios?utm_medium=organic&amp;amp;utm_source=google_rich_qa&amp;amp;utm_campaign=google_rich_qa"&gt;cisco - Are RADIUS and TACACS+ Ever Allowed in FIPS 140-2 Compliant Scenarios? - Information Security Stack Exchange&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, I think it is best to confirm with your security team/auditor as to best approach where endpoints do not support more secure auth protocols.&amp;nbsp; There is obviously a difference between "will it work" versus "does it sufficiently protect" versus "compliance checkbox".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 22:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450340#M510717</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-16T22:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450341#M510718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks sir. Authenticating the endpoints with their MAC address is exactly what we would like to accomplish under FIPS mode. However we can't&amp;nbsp; find any clear documentation to&amp;nbsp; get this done via host lookup on any type of&amp;nbsp; devices either Cisco switch any other vendor. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 23:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450341#M510718</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2018-04-16T23:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450342#M510719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My point is that you may get it to work using the host lookup option--specific NAD Profile will depend on switch model and config.&amp;nbsp; Cisco switches set Service-Type = Call-Check which is the signal to ISE to treat the flow as a simple MAC lookup in the endpoint database.&amp;nbsp; We use different parameter matches for Juniper (default uses Service-Type = Framed) with optional protocol matches for further checking Calling Station ID and password values.&amp;nbsp;&amp;nbsp; Even then, it may not be deemed FIPS compliant without compensating controls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 23:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450342#M510719</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-16T23:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450343#M510720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If Juniper network devices support it, you might want to consider IPSec instead of FIPS mode. For an example, see &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210519-Configure-ISE-2-2-IPSEC-to-Secure-NAD-I.html" title="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210519-Configure-ISE-2-2-IPSEC-to-Secure-NAD-I.html"&gt;Configure ISE 2.2 IPSEC to Secure NAD (IOS) Communication - Cisco&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 02:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450343#M510720</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-17T02:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450344#M510721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 13:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450344#M510721</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2018-04-17T13:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  FIPS mode  authentication with  headless endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450345#M510722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 13:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fips-mode-authentication-with-headless-endpoints/m-p/3450345#M510722</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2018-04-17T13:47:42Z</dc:date>
    </item>
  </channel>
</rss>

