<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Profiling without Active Auth in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523287#M527454</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE will get port information without enabling dot1x or mab. You can see that in context visibility &amp;gt; endpoints. Just make sure that NAS-PORT-ID is selected in your columns to be viewed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Aug 2017 08:34:27 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2017-08-24T08:34:27Z</dc:date>
    <item>
      <title>ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523286#M527451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is more of a product enhancement request or question on why ISE doesn't do this already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE's profiling capabilities are great in identifying what is on your network.&amp;nbsp; You can answer a lot of the "What is on my network?" question with ISE profiling without enabling active authentication (MAB or 802.1x).&amp;nbsp; For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;As soon as I import the NAD devices into ISE with SNMP polling enabled, ISE will poll the switches and gather attached MAC addresses and gather things like CDP/LLDP information. &lt;/LI&gt;&lt;LI&gt;If you forward DHCP requests to ISE, ISE can start to gather DHCP information.&lt;/LI&gt;&lt;LI&gt;If ISE learns the IP of the devices it can then kick of NMAP scans for OS detection and open ports.&lt;/LI&gt;&lt;LI&gt;If ISE learns the IP it can do a FQDN lookup on the IP.&lt;/LI&gt;&lt;LI&gt;If ISE learns the FQDN or hostname via DHCP, it can do an AD lookup to see if that object exists in AD.&lt;/LI&gt;&lt;LI&gt;If ISE learns SNMP is open it can SNMP scan the endpoints.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of this can be done without having to worry about compatible IOS versions on switches.&amp;nbsp; I call this ISE Lite when I talk to customers.&amp;nbsp; Basically allowing me to show value, while they are upgrading their switches to compatible version and allowing me to get a jump on profiling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The part that is frustrating is that this ISE Lite concept can't answer the "Where is the stuff plugged into my network?" question when there really is no technical reason it can't answer this.&amp;nbsp; The database already has fields for NAD and NAD port so no changes would need to be made in the database.&amp;nbsp; The only piece that is missing is during the SNMP poll of the NAD, ISE is not correlating the obtained MAC addresses to switch ports.&amp;nbsp; All that information is available via SNMP and should be easy to correlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identifying where something is plugged in without active authentication would be a huge boost to ISE.&amp;nbsp; I know that doesn't consume licenses, but it shows off the power of the products.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is, what am I missing here?&amp;nbsp; This seems like an easy thing to add in the SNMP polling process of the NADs.&amp;nbsp; Cisco Prime already does this, so the coding has already been done in the Cisco world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Aug 2017 21:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523286#M527451</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-23T21:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523287#M527454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE will get port information without enabling dot1x or mab. You can see that in context visibility &amp;gt; endpoints. Just make sure that NAS-PORT-ID is selected in your columns to be viewed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Aug 2017 08:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523287#M527454</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-08-24T08:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523288#M527458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think that is true and I just retested again on 2.2 in my lab.&amp;nbsp; I have my test switch defined to ISE with just SNMP enabled:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="110750" alt="Capture.JPG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/110750_Capture.JPG" style="height: 550px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;You can see the MAC addresses it learned from the switch, but no NAD name or port in Context visibility (only MACs in system are one learned from SNMP poll):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="110752" alt="Capture.JPG" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/110752_Capture.JPG" style="height: 106px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;If you drill into a MAC you can see it was learned via SNMP (well now it changed to NMAP because it was scanned).&amp;nbsp; It has the IP of the NAD, but ISE didn't populate the name of the NAD even though it knows it and it didn't populate the port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="110753" alt="Capture.JPG" class="jive-image image-3" src="https://community.cisco.com/legacyfs/online/fusion/110753_Capture.JPG" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where are you seeing NAD details reported for SNMP polling?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Aug 2017 13:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523288#M527458</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-24T13:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523289#M527461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see the snapshot below from ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-08-24 at 10.01.13 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/110754_Screen Shot 2017-08-24 at 10.01.13 PM.png" style="height: 335px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you see the switch isn't using mab or dot1x on the switch ports of both devices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-08-24 at 10.03.29 PM.png" class="jive-image image-2" src="/legacyfs/online/fusion/110756_Screen Shot 2017-08-24 at 10.03.29 PM.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes the endpoint is using snmpquery probe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other Attributes&lt;/P&gt;&lt;TABLE style="font-size: 12px; color: #333333; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;161-udp&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;snmp&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;162-udp&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;snmptrap&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;443-tcp&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;https&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;80-tcp&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;http&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;AAA-Server&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;########hidden#######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;AllowedProtocolMatchedRule&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;dot1x&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;BYODRegistration&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Unknown&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Called-Station-ID&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;7C-69-F6-7A-93-92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Calling-Station-ID&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;94-57-A5-57-DB-74&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;DTLSSupport&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Unknown&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;DestinationIPAddress&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;######hidden######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;DestinationPort&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;1813&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Device IP Address&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;#####hidden######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Device Port&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;1646&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Device Type&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Device Type#All Device Types#SWITCHES&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;DeviceRegistrationStatus&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;NotRegistered&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;ElapsedDays&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;43&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;EndPointPolicy&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;HP-Device&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;EndPointProfilerServer&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;######hidden######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;EndPointSource&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;SNMPQuery Probe&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;FailureReason&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;11007 Could not locate Network Device or AAA Client&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;IPSEC&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;IPSEC#Is IPSEC Device#No&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;IdentityGroup&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Profiled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;InactiveDays&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;LastNmapScanTime&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;2017-Jul-19 16:26:17 GST&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Location&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Location#All Locations#DXB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;MACAddress&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;94:57:A5:57:DB:74&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;MatchedPolicy&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;HP-Device&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;MessageCode&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;3000&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NADAddress&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;####hidden########&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NAS-IP-Address&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;######hidden#######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NAS-Port&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;50018&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NAS-Port-Id&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;GigabitEthernet0/18&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NAS-Port-Type&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Ethernet&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Network Device Profile&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Cisco&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NetworkDeviceGroups&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Location#All Locations#DXB, Device Type#All Device Types#SWITCHES, IPSEC#Is IPSEC Device#No&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NetworkDeviceName&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;DXB-3560-SW04&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;NmapScanCount&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;3&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;OUI&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Hewlett Packard&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;PolicyVersion&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;56&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;PostureApplicable&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Yes&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;SelectedAccessService&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Default Network Access&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Service-Type&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;Framed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;StaticAssignment&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;false&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;StaticGroupAssignment&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;false&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;Total Certainty Factor&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;10&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;dot1xAuthAuthControlledPortControl&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;dot1xAuthAuthControlledPortStatus&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;ifDescr&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;GigabitEthernet0/18&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;ifIndex&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;10118&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;ifOperStatus&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;ip&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;####hidden######&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;operating-system&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;VMware ESXi 5.1 (accuracy 98%)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 8px;"&gt;operating-system-result&lt;/TD&gt;&lt;TD style="padding: 8px;"&gt;VMware ESXi 5.1 (accuracy 98%)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Aug 2017 18:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523289#M527461</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-08-24T18:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523290#M527464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you running?  Trying to figure why you are seeing something different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You deleted all your endpoint from the Context Visibility and had them pulled in from just SNMP?  I am running a 3560 as my lab switch.  I see you are running 3650.  I can’t see how that would matter but who knows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have SNMP traps or syslog enabled on your switch pointing at ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Aug 2017 18:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523290#M527464</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-24T18:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523291#M527467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also it appears you have done authentication at one time on these MAC addresses.  The one you show below has “Allowed Protocol Match Rule” set to “dot1x” which would not be set if you only did SNMP polling no active auth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like I said before completely delete all your endpoints, turn on only SNMP polling on the NAD, no syslog or SNMP traps to ISE and see what you get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Aug 2017 19:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523291#M527467</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-24T19:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523292#M527469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for later response. I was waiting for new installation. This is out of default installation. &lt;/P&gt;&lt;P&gt;&lt;IMG alt="port-cap.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/111000_port-cap.PNG" style="height: 207px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Sep 2017 09:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523292#M527469</guid>
      <dc:creator>shelfdrilling.it</dc:creator>
      <dc:date>2017-09-06T09:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523293#M527471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes but the default rule set authenticated almost anything.  Click on the ones that have ports shown and you will see active authentication.  Turn off all RADIUS authentication on your network devices and do only SNMP queries.  That was the original question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Sep 2017 12:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/3523293#M527471</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-09-06T12:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling without Active Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/4796430#M580571</link>
      <description>&lt;P&gt;has this feature been implemented?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 10:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-without-active-auth/m-p/4796430#M580571</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2023-03-17T10:51:31Z</dc:date>
    </item>
  </channel>
</rss>

