<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detecting endpoint-hosted virtual machines? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555294#M511658</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless I completely misunderstood your question please note the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kali Linux supports 1x auth&lt;/P&gt;&lt;P&gt;http://www.keyboardbanger.com/configuring-authentication-kali-linux/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco switches Support multi auth&lt;/P&gt;&lt;P&gt;https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-802x-multi-auth.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This feature supports multiple hosts on the same network port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Mar 2018 16:45:00 GMT</pubDate>
    <dc:creator>afahmy</dc:creator>
    <dc:date>2018-03-12T16:45:00Z</dc:date>
    <item>
      <title>Detecting endpoint-hosted virtual machines?</title>
      <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555293#M511657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is my first time posting to the community at-large.. please be gentle.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been working with ISE 2.3 for about two weeks so my apologies in advance if this is a dumb question. We're performing a bake-off with multiple NAC solutions and one of the evaluation criteria is the ability to detect and enforce network access restrictions on guest virtual machines hosted on otherwise approved endpoints. For example, assume a known Windows endpoint connects to the network and is subsequently authenticated and permitted access to the network. That same endpoint them starts a Kali Linux virtual machine and starts pen-testing the internal network. I realize there's an entire ecosystem of solutions meant to detect this "east-west' activity but my question is can a standalone implementation of Cisco ISE (no Stealthwatch, no PxGrid, etc) detect the presence of a hosted virtual machine based on information reported by the access device (netflow, cdp, lldp, etc)? Our access devices for the tests are a 4500x (03.08.01 universal k9) and a 3750x (15.0.2-SE11 universal k9).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been reading day and night and I can't seem to find a straightforward answer on this subject. Granted, I'm just getting started with 802.1x and NAC concepts in general.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;SP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 14:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555293#M511657</guid>
      <dc:creator>SeanP</dc:creator>
      <dc:date>2018-03-12T14:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting endpoint-hosted virtual machines?</title>
      <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555294#M511658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless I completely misunderstood your question please note the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kali Linux supports 1x auth&lt;/P&gt;&lt;P&gt;http://www.keyboardbanger.com/configuring-authentication-kali-linux/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco switches Support multi auth&lt;/P&gt;&lt;P&gt;https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-802x-multi-auth.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This feature supports multiple hosts on the same network port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 16:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555294#M511658</guid>
      <dc:creator>afahmy</dc:creator>
      <dc:date>2018-03-12T16:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting endpoint-hosted virtual machines?</title>
      <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555295#M511659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial',sans-serif; color: #575757;"&gt;Thanks Ahmed,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial',sans-serif; color: #575757;"&gt;&lt;SPAN style="font-family: Arial, sans-serif;"&gt;The muti-auth option seems to work well for daisy-chained scenarios &lt;SPAN style="font-family: Arial, sans-serif;"&gt;(switch-&amp;gt;ip phone-&amp;gt;pc) &lt;/SPAN&gt;and bridged VMs. &lt;/SPAN&gt;I think the concern here is the use of unauthorized virtual machines NAT'd behind an authenticated endpoint; using VMware workstation or VirtualBox for example. In that situation, I'm not sure how the NAC could distinguish the physical host from the guest VM, barring some form of packet analysis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;SP&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial',sans-serif; color: #575757;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial',sans-serif; color: #575757;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 17:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555295#M511659</guid>
      <dc:creator>SeanP</dc:creator>
      <dc:date>2018-03-12T17:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting endpoint-hosted virtual machines?</title>
      <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555296#M511660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to install anyconnect posture module (system scan) on the endpoints to block them from doing this, this would be out of compliance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 23:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555296#M511660</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-03-12T23:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting endpoint-hosted virtual machines?</title>
      <link>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555297#M511661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jason, that appears to be the general consensus in most of my other research. With out some endpoint assessment / enforcement agent, there doesn't appear to be a method for detecting NAT'd virtual systems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2018 17:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/detecting-endpoint-hosted-virtual-machines/m-p/3555297#M511661</guid>
      <dc:creator>SeanP</dc:creator>
      <dc:date>2018-03-13T17:22:10Z</dc:date>
    </item>
  </channel>
</rss>

