<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki and ISE profiling in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516176#M517606</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tim.&lt;/P&gt;&lt;P&gt;I'll see what mode we have configured for Meraki. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Feb 2018 19:53:12 GMT</pubDate>
    <dc:creator>AIN UL BADAR</dc:creator>
    <dc:date>2018-02-27T19:53:12Z</dc:date>
    <item>
      <title>Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516171#M517592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;We have a profiling issue with ISE 2.3. Our Apple MAC Books, iPads and iPhones ALL are profiled as Apple Devices, can you please shed some light how do we profile these devices accurately. &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Our Windows devices are profiled as Intel devices. We are using Radius probes, and it turns out to be Not&lt;/SPAN&gt; enough.&amp;nbsp; Appreciate if you could give me a fix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Used this document as a reference.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;A href="https://community.cisco.com/docs/DOC-68192"&gt;How To: Integrate Meraki Networks with ISE&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2018 21:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516171#M517592</guid>
      <dc:creator>AIN UL BADAR</dc:creator>
      <dc:date>2018-02-26T21:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516172#M517595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your reference ISE profiling design guide.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-68156"&gt;How To: ISE Profiling Design Guide&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2018 15:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516172#M517595</guid>
      <dc:creator>ldanny</dc:creator>
      <dc:date>2018-02-27T15:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516173#M517599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Meraki access devices do not support Device Sensor so cannot get detailed attributes via RADIUS Accounting.&amp;nbsp; RADIUS alone will provide minimal data, such as MAC address (OUI).&amp;nbsp; To get additional data, see if possible to send DHCP info to ISE via IP helper and alternatively SPAN.&amp;nbsp; RADIUS Accounting and DHCP can also populate the IP address used for other probes such as DNS and NMAP.&amp;nbsp; It is also possible for ISE to use SNMP to query access device or L3 gateways for useful data.&amp;nbsp; HTTP can also be acquired via web redirection flows to ISE or alternatively via SPAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AD probe is also useful for Windows clients, but will require 802.1X machine auth, DHCP, or DNS to perform the AD lookup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2018 19:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516173#M517599</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-02-27T19:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516174#M517601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig, but based on the document and experience with Meraki, I can't get endpoints to profile accurately. Here is the snippet from the Meraki ISE integration document.&lt;/P&gt;&lt;P&gt;Page 36.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-68192"&gt;How To: Integrate Meraki Networks with ISE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Wireless Network Profiling&lt;/H2&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Times New Roman';"&gt;RADIUS and DHCP profiling using Cisco Meraki wireless networking equipment is compatible with ISE but with limitations.&amp;nbsp; While Cisco Meraki access points can dynamically profile wireless devices during authentication, that information cannot be shared with ISE for use with Authorization Policy.&amp;nbsp; Cisco Meraki access points that are not able to forward DHCP requests.&amp;nbsp; As such, a Catalyst 3560X was used during this configuration example for the ability to forward DHCP requests. RADIUS profiling with Cisco Meraki access points is supported via the calling-station-id attribute.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2018 19:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516174#M517601</guid>
      <dc:creator>AIN UL BADAR</dc:creator>
      <dc:date>2018-02-27T19:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516175#M517603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the document, the Meraki access points were configured in bridge mode so that DHCP in addition to RADIUS information could be sent to ISE.&amp;nbsp; ISE needs additional information beside the OUI to determine what the device is.&amp;nbsp; Like Craig said, try forwarding DHCP requests which will further assist ISE in matching a more granular profile policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2018 19:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516175#M517603</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-02-27T19:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516176#M517606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tim.&lt;/P&gt;&lt;P&gt;I'll see what mode we have configured for Meraki. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2018 19:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516176#M517606</guid>
      <dc:creator>AIN UL BADAR</dc:creator>
      <dc:date>2018-02-27T19:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516177#M517607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In one project I worked on involving Meraki gears, we configured the DHCP settings on the security appliances like below, where 10.1.100.100 is the real DHCP server and 10.1.100.21 is the ISE. This way ISE can get a copy of the DHCP requests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="115536" alt="Screen Shot 2018-02-27 at 7.13.47 PM.png" class="image-1 jive-image" height="147" src="/legacyfs/online/fusion/115536_Screen Shot 2018-02-27 at 7.13.47 PM.png" style="height: 147px; width: 360.927px;" width="361" /&gt;&lt;/P&gt;&lt;P&gt;We've also tried mirroring the client traffic to a wired switch port that connect to another ISE interface and ISE able to collect DHCP and HTTP that way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Feb 2018 03:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3516177#M517607</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-02-28T03:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3998182#M517609</link>
      <description>&lt;P&gt;I am facing this same problem now, but on the Z3 appliances which do not allow for DHCP relay configuration.&amp;nbsp; My scenario is that I need to be able to identify when a domain-joined device connects to the Meraki Z3 appliance vs a personal laptop so that I can provide access accordingly.&amp;nbsp; Since there are no additional DHCP values or RADIUS attributes shared with ISE during the initial connection (and Z3-hosted splash page), ISE only records the system as a generic "Dell-Device".&amp;nbsp; This profile is selected because of the lack of information learned from the RADIUS authentication message and therefore I don't have an ability to determine if it is a corporate asset or a personal device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I can at least get the hostname information in the RADIUS request, that should be enough for me to perform an AD lookup of that hostname object in Active Directory, and therefore be able to determine if the device is joined to the domain or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 21:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/3998182#M517609</guid>
      <dc:creator>Taylor Cook</dc:creator>
      <dc:date>2019-12-12T21:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki and ISE profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/4837725#M581791</link>
      <description>&lt;P&gt;Adding the PSN to the ip helper list on the SVI fixed this problem I was only seeing with raspberry pi devices. DHCP is working full circle now for all of our devices!&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 14:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/meraki-and-ise-profiling/m-p/4837725#M581791</guid>
      <dc:creator>cjjones</dc:creator>
      <dc:date>2023-05-17T14:28:33Z</dc:date>
    </item>
  </channel>
</rss>

