<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE-Anomalous client detection behaviour in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522742#M511084</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Our testing use cases included&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;1. client on wireless .1x(Android phone), Malicious user on wired MAB(windows 10 workstation)&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;2. client on wired MAB&lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;(cisco IP-phone)&lt;/SPAN&gt;, Malicious user on wired MAB&lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;(windows 10 workstation)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;The case number 1 has succeeded, but for case 2, these are the following problems:&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;1-Anomalous behaviour is showing nothing.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;2-Debug the endpoint &lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;is showing nothing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;3-The worksation (attacker) has been placed in the correct authenticatin and authorization policies( voice VLAN)&amp;nbsp; but can't ping my gateway.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Regarding case 1, is it true that the real endpoint should be shown in Anomalous client detection behaviour page or the attacker endpoint.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Any documents or suggestions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Apr 2018 12:19:50 GMT</pubDate>
    <dc:creator>Ayman El-BACHA</dc:creator>
    <dc:date>2018-04-03T12:19:50Z</dc:date>
    <item>
      <title>ISE-Anomalous client detection behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522742#M511084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Our testing use cases included&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;1. client on wireless .1x(Android phone), Malicious user on wired MAB(windows 10 workstation)&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;2. client on wired MAB&lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;(cisco IP-phone)&lt;/SPAN&gt;, Malicious user on wired MAB&lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;(windows 10 workstation)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;The case number 1 has succeeded, but for case 2, these are the following problems:&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;1-Anomalous behaviour is showing nothing.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;2-Debug the endpoint &lt;SPAN style="color: #58585b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 15px;"&gt;is showing nothing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;3-The worksation (attacker) has been placed in the correct authenticatin and authorization policies( voice VLAN)&amp;nbsp; but can't ping my gateway.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Regarding case 1, is it true that the real endpoint should be shown in Anomalous client detection behaviour page or the attacker endpoint.&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Any documents or suggestions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2018 12:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522742#M511084</guid>
      <dc:creator>Ayman El-BACHA</dc:creator>
      <dc:date>2018-04-03T12:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-Anomalous client detection behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522743#M511085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please review &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" title="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html"&gt;Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is important to understand if one of the matching criteria for Anomaly has been met.&amp;nbsp; For example, changing from wireless to wired (or vice versa) is straight forward as this is captured as part of the RADIUS probe (enabled by default).&amp;nbsp; To determine if there was a profile change or change in DHCP data requires that you validate the before and after profile assignment of the spoofed MAC, and/or the before and after profile details of the spoofed MAC.&amp;nbsp; Since there is no change to the malicious user's data, only to the "real" MAC being spoofed, it is the latter which is flagged as Anomalous.&amp;nbsp;&amp;nbsp;&amp;nbsp; It is the anomaly in attributes associated with the original MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522743#M511085</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-03T14:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-Anomalous client detection behaviour</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522744#M511086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2018 09:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-anomalous-client-detection-behaviour/m-p/3522744#M511086</guid>
      <dc:creator>Ayman El-BACHA</dc:creator>
      <dc:date>2018-04-04T09:11:05Z</dc:date>
    </item>
  </channel>
</rss>

