<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NMAP Profiler Details in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551291#M537041</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am doing an ISE install at a large hospital and they are concerned about the NMAP profilers effect on some of their legacy medical equipment.&amp;nbsp; I have done 75-100 installs at all sorts of customers including hospitals and manufacturing environment and have never had an issue with the selective NMAP scans ISE uses.&amp;nbsp; However, the customer would like more detail on exactly what the NMAP scan will be doing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I believe the default NMAP scan in 2.x is SNMP + OS scan.&amp;nbsp; So the SNMP port check is easy to explain, but what is involved in the OS scan?&amp;nbsp; If ISE is using the standard NMAP process under the covers what switches (options) are run for the OS detection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not worried about ISE causing an issue, but I need to provide details as the customer has had other products like Qualys take down their PAX system.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Nov 2016 18:10:47 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2016-11-09T18:10:47Z</dc:date>
    <item>
      <title>NMAP Profiler Details</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551291#M537041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am doing an ISE install at a large hospital and they are concerned about the NMAP profilers effect on some of their legacy medical equipment.&amp;nbsp; I have done 75-100 installs at all sorts of customers including hospitals and manufacturing environment and have never had an issue with the selective NMAP scans ISE uses.&amp;nbsp; However, the customer would like more detail on exactly what the NMAP scan will be doing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I believe the default NMAP scan in 2.x is SNMP + OS scan.&amp;nbsp; So the SNMP port check is easy to explain, but what is involved in the OS scan?&amp;nbsp; If ISE is using the standard NMAP process under the covers what switches (options) are run for the OS detection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not worried about ISE causing an issue, but I need to provide details as the customer has had other products like Qualys take down their PAX system.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2016 18:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551291#M537041</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-11-09T18:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Profiler Details</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551292#M537042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are correct ISE is using the open-source NMAP utility for this. &lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="68156" data-objecttype="102" href="https://community.cisco.com/docs/DOC-68156" style="font-size: 12px; font-family: arial; color: #0a63a7;"&gt;How To: ISE Profiling Design Guide&lt;/A&gt; has the info and this&amp;nbsp; is still true for ISE 2.x.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2016 22:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551292#M537042</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-11-09T22:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Profiler Details</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551293#M537043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also found the base command used in the admin guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nmap -O -sU -p U:161,162 –oN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2016 22:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-profiler-details/m-p/3551293#M537043</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-11-09T22:55:23Z</dc:date>
    </item>
  </channel>
</rss>

