<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OS Determination via Profiling in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459482#M530089</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Darren,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;I use NMAP in all of my installs, but the OS detection can be iffy.&amp;nbsp; I use NMAP for my printer identification.&amp;nbsp; Also remember NMAP is required if you want to do SNMP scans to profile devices (not SNMP scans to network devices).&amp;nbsp; If NMAP detects the SNMP port is open then it will kick off a SNMP scan. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;I have never like the built in ISE printer profiles.&amp;nbsp; The first thing I do on a customer install is write a custom NMAP scan policy to check for common ports and OS and apply that to any profiling rules that could contain printers (about 7 or them).&amp;nbsp; Cisco used to do this by default but in 2.0 the default scan for Unknown and most devices was changed to only SNMP ports + OS check.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Now that I have the printer classes being common port scanned I can write a custom profile that pulls in any device on the network that has port 9100 open.&amp;nbsp; Then I can look at those devices and see what SNMP attributes are being learned so my printer rule ultimately looks like:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Minimum certainty factor 200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;NMAP 9100 open then certainty factor increase 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;SNMP Sys Desc contains jetdirect &lt;SPAN style="font-size: 13.3333px;"&gt;then certainty factor increase 100&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;SNMP Sys Desc contains laserjet then certainty factor increase 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;So basically it is a two factor profile where NMAP 9100 open is the key factor plus one of the other factors.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Works well and makes it harder to spoof a printer.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Apr 2017 14:01:41 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2017-04-21T14:01:41Z</dc:date>
    <item>
      <title>OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459478#M530085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My customer would like to use profiling to identify an unauthorized OS connecting to the network.&amp;nbsp; In this case, Windows XP.&amp;nbsp; Can we use DHCP or HTTP (blind redirect) to determine the OS and then if it is unauthorized, assign the appropriate blacklist authz profile?&amp;nbsp; I know I can do this with posture but the customer is looking for a profiling solution.&amp;nbsp; This web site &lt;A href="https://fingerbank.org/about.html" title="https://fingerbank.org/about.html"&gt;https://fingerbank.org/about.html&lt;/A&gt; talks about DHCP fingerprinting. Can I use ISE profiling capabilities to achieve the same?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Apr 2017 00:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459478#M530085</guid>
      <dc:creator>scamarda</dc:creator>
      <dc:date>2017-04-21T00:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459479#M530086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there, that is pretty much what profiling does. In my ISE 2.2 there are three built in conditions to profile XP - one of which uses HTTP as per your post (see condition below). For DHCP you could create your own condition but would need to do some packet captures to find out what fields within the DHCP packet are unique to XP and do not match other OSs such as Windows 7. Once profiled, you can apply the appropriate authz profile to the endpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="XP.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/106419_XP.PNG" style="height: 276px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Apr 2017 00:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459479#M530086</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-04-21T00:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459480#M530087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Or, if you are really brave you can use NMAP within ISE to determine the OS (basically does an NMAP scan). I have never seen or heard of anyone using NMAP in ISE, keen to hear if people out there have tried it and how well it worked?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Apr 2017 01:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459480#M530087</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-04-21T01:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459481#M530088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick response.&amp;nbsp;&amp;nbsp; After I posted the question I thought about NMAP but thought that may not be a scalable option from a user experience perspective.&amp;nbsp; I'll pursue the blind redirect to capture User Agent value and keep the NMAP scan as a last option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Apr 2017 01:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459481#M530088</guid>
      <dc:creator>scamarda</dc:creator>
      <dc:date>2017-04-21T01:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459482#M530089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Darren,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;I use NMAP in all of my installs, but the OS detection can be iffy.&amp;nbsp; I use NMAP for my printer identification.&amp;nbsp; Also remember NMAP is required if you want to do SNMP scans to profile devices (not SNMP scans to network devices).&amp;nbsp; If NMAP detects the SNMP port is open then it will kick off a SNMP scan. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;I have never like the built in ISE printer profiles.&amp;nbsp; The first thing I do on a customer install is write a custom NMAP scan policy to check for common ports and OS and apply that to any profiling rules that could contain printers (about 7 or them).&amp;nbsp; Cisco used to do this by default but in 2.0 the default scan for Unknown and most devices was changed to only SNMP ports + OS check.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Now that I have the printer classes being common port scanned I can write a custom profile that pulls in any device on the network that has port 9100 open.&amp;nbsp; Then I can look at those devices and see what SNMP attributes are being learned so my printer rule ultimately looks like:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Minimum certainty factor 200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;NMAP 9100 open then certainty factor increase 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;SNMP Sys Desc contains jetdirect &lt;SPAN style="font-size: 13.3333px;"&gt;then certainty factor increase 100&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;SNMP Sys Desc contains laserjet then certainty factor increase 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;So basically it is a two factor profile where NMAP 9100 open is the key factor plus one of the other factors.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial, sans-serif;"&gt;Works well and makes it harder to spoof a printer.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Apr 2017 14:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459482#M530089</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-21T14:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459483#M530090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I love this kind of post, informative with a real-world example, thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 01:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459483#M530090</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-04-24T01:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459484#M530091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NMAP SMB Discovery and AD Probe are also useful probes to more definitively validate Windows OS version.&amp;nbsp; Windows XP clients typically use one of the following Option 55 strings, but these can also be seen on Windows 7 and others, so not definitive:&lt;/P&gt;&lt;P&gt;1, 15, 3, 6, 44, 46, 47, 31, 33, 121, 249, 43&lt;/P&gt;&lt;P&gt;1, 15, 3, 6, 44, 46, 47, 31, 33, 121, 249, 43, 0, ...&lt;/P&gt;&lt;P&gt;1, 15, 3, 6, 44, 46, 47, 31, 33, 121, 249, 43, 252, ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NMAP is generally a triggered per matching profile, or once per Unknown detection, so has minimal impact on ISE and network bandwidth.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 20:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459484#M530091</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-04-24T20:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: OS Determination via Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459485#M530092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks folks.&amp;nbsp; Appreciate the info.&amp;nbsp; I will include NMAP as an option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 23:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/os-determination-via-profiling/m-p/3459485#M530092</guid>
      <dc:creator>scamarda</dc:creator>
      <dc:date>2017-04-24T23:38:19Z</dc:date>
    </item>
  </channel>
</rss>

