<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Profiling Query in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538006#M537262</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Only MAC is needed to be added to the endpoint DB. However, IP is required to connect between MAC address to any of the L4+ profile attributes. If this is Cisco switch, then ip device tracking can be enabled to send IP to ISE via RADIUS Accounting. Once&amp;nbsp; IP is available to ISE, Netwflow or NMAP may be used to further enhance profile. However, Netflow is generally not recommended due to amount of events ISE has to process.&lt;/P&gt;&lt;P&gt;2. There are certain mis-configurations that ISE can identify and report, but if ISE is not getting any events in the first place the answer is no.&lt;/P&gt;&lt;P&gt;3. Not natively. It may be possible if you have 3rd party SIEM or syslog receiver to craft event when certain switch does not send authentication request. You can couple that with periodic RADIUS keepalives or reauth to find out the ones not sending any request. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 23 Oct 2016 07:50:33 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2016-10-23T07:50:33Z</dc:date>
    <item>
      <title>ISE Profiling Query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538005#M537261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #000000; font-family: Calibri, sans-serif; font-size: 14px;"&gt;Hi,&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, sans-serif; font-size: 14px;"&gt;&lt;/P&gt;&lt;DIV&gt;We are looking for ISE opportunity for Bank customer. They have some queries and need clarity on the following&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;ATM machines&amp;nbsp; Profiling Only&lt;/STRONG&gt;&lt;OL&gt;&lt;LI&gt;These non-802.1x devices today are connected to an L3 device (IDU). They have static IP address.&lt;/LI&gt;&lt;LI&gt;Is there a way to profile these devices ? Since the&amp;nbsp; ATM is connected to a non-cisco switch , can Netflow (from the central location ) be used to profile an ATM as they use specific port numbers &lt;/LI&gt;&lt;LI&gt;Document states that ISE needs both IP and MAC association to end points- is this needed for profiling an ATM like device which is connected to a device from where there is no way to get the endpoint MAC&lt;/LI&gt;&lt;LI&gt;The requirement here is to only profile the asset as an ATM, not really&amp;nbsp; authenticate it &lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Switch replacement&lt;/STRONG&gt;&lt;OL&gt;&lt;LI&gt;If a currently 802.1x switch fails and is replaced with an RMA’ed switch / new switch&amp;nbsp; is introduced , it is possible that the new switch may not get 802.1x configs (human errors). In such a scenario is there a way to identify this ?&lt;/LI&gt;&lt;LI&gt;Assuming the new switch does not get an 802.1x/ RADIUS configs, can we depend on the Netflow probe to understand that new endpoints have been introduced in the network &lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Reports&lt;/STRONG&gt;&lt;OL&gt;&lt;LI&gt;If a current NAD is powered off, is there a way to figure out that the NAD is no longer available ?? Any report that will give this to us&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Oct 2016 15:30:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538005#M537261</guid>
      <dc:creator>dngore</dc:creator>
      <dc:date>2016-10-21T15:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling Query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538006#M537262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Only MAC is needed to be added to the endpoint DB. However, IP is required to connect between MAC address to any of the L4+ profile attributes. If this is Cisco switch, then ip device tracking can be enabled to send IP to ISE via RADIUS Accounting. Once&amp;nbsp; IP is available to ISE, Netwflow or NMAP may be used to further enhance profile. However, Netflow is generally not recommended due to amount of events ISE has to process.&lt;/P&gt;&lt;P&gt;2. There are certain mis-configurations that ISE can identify and report, but if ISE is not getting any events in the first place the answer is no.&lt;/P&gt;&lt;P&gt;3. Not natively. It may be possible if you have 3rd party SIEM or syslog receiver to craft event when certain switch does not send authentication request. You can couple that with periodic RADIUS keepalives or reauth to find out the ones not sending any request. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Oct 2016 07:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538006#M537262</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-10-23T07:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Profiling Query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538007#M537263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to Hosuk's response, these questions were answered in detail on an internal communication from Khizar Alimia. Please do not replicate queries across teams as it exhausts available resources to support entire community. My responses to Khizar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;STRONG&gt;ATM machines&amp;nbsp; Profiling Only&lt;/STRONG&gt; &lt;/LI&gt;&lt;/OL&gt;&lt;OL start="1"&gt;&lt;OL start="1"&gt;&lt;LI&gt;These non-802.1x devices today are connected to an L3 device (IDU)&lt;/LI&gt;&lt;LI&gt;Is there a way to profile these devices ? Since the&amp;nbsp; ATM is connected to a non-cisco switch , can Netflow (from the central location ) be used to profile an ATM as they have specific port numbers &lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="color: blue;"&gt;[Craig] It is not clear if the ATM is connected to L3 device which is then connected to non-Cisco switch, then to 2960?&amp;nbsp; Or if treating the L3 device as the “non-Cisco” device which is connected to 2960.&lt;/SPAN&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: upper-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="color: blue;"&gt;ATM -&amp;gt; IDU -&amp;gt; non-Cisco switch -&amp;gt; 2960&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: blue;"&gt;ATM -&amp;gt; IDU -&amp;gt; 2960&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;If A, then it may be difficult to authenticate all devices depending on what all is attached to non-Cisco switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;If B, then may be simpler, especially if all devices interconnected from IDU are ATMs (or only one ATM per IDU).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;As there is an L3 device between ATM and switch, will the 2960 see individual MAC addresses of ATM(s), or just the L3 device (think router where switch only see L2 MAC address of the router and numerous IP addresses from things behind it.&amp;nbsp; If only one MAC and one IP visible, then ISE could profile the IDU and grant that port access needed for ATMs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: blue;"&gt;If there is a way to profile the ATMs, I am sure we can find it, but actual connection between ATM and 2960s will determine what we (or any vendor) can detect for classification. Also connection type will dictate authentication options.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="3"&gt;&lt;LI&gt; (doc states that ISE needs both IP and MAC association to end points)- is this needed for profiling an ATM like device which is connected to a device from where there is no way to get the endpoint MAC&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="color: blue;"&gt;[Craig] ISE learns MAC addresses from RADIUS auth, DHCP, and SNMP.&amp;nbsp; IP addresses can be learned from RADIUS Accounting, DHCP, or SNMP.&amp;nbsp; IP addresses allow ISE to leverage additional probe data from DNS and NMAP.&amp;nbsp; Netflow is technically possible but typically not recommended today due to the additional requirements on 1) Netflow capable devices (which I don’t see here) and 2) Impact on profiling capacity.&amp;nbsp; Endpoints do not absolutely require IP, but it definitely helps.&amp;nbsp; In any case, the above methods should be able to acquire MAC and IP address info to leverage most/all probes.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;OL start="4"&gt;&lt;LI&gt;The requirement here is to only profile the asset as an ATM, not really&amp;nbsp; authenticate it &lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="color: blue;"&gt;[Craig] If enable a port for RADIUS auth, then may not have a choice, but see responses to #2 above since not certain if 2960 will even “see” the actual ATMs depending on how connected behind the IDU.&lt;/SPAN&gt;&amp;nbsp; &lt;/P&gt;&lt;OL start="2"&gt;&lt;LI&gt;&lt;STRONG&gt;Switch replacement&lt;/STRONG&gt; &lt;OL start="1"&gt;&lt;LI&gt;If a currently 802.1x switch fails and is replaced with an RMA’ed switch / new switch&amp;nbsp; is introduced , it is possible that the new switch may not get 802.1x configs (human errors). In such a scenario is there a way to identify this ?&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="color: blue;"&gt;[Craig] There are ways to bootstrap a switch configuration using auto-discover or other network management tools.&amp;nbsp; This is really not an ISE issue.&amp;nbsp; ISE will not directly detect if switch is misconfigured for 802.1X.&amp;nbsp; I think this is better addressed by tools like Prime to configure switches.&amp;nbsp; &lt;/SPAN&gt;&amp;nbsp; &lt;/P&gt;&lt;OL start="2"&gt;&lt;OL start="2"&gt;&lt;LI&gt;Assuming the new switch does not get an 802.1x/ RADIUS configs, can we depend on the Netflow probe to understand that new endpoints have been introduced in the network &lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="color: blue;"&gt;[Craig] The switch must be configured for communication with ISE in some manner.&amp;nbsp; If RADIUS not configured, then at a minimum the switch must have SNMP enabled to allow ISE to query switchports and detect new things that connect to the network.&amp;nbsp; Of course, without RADIUS configured, ISE cannot enforce access control on the switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="color: blue;"&gt;If switch is not properly configured after RMA, then expect more fundamental issues with network connectivity and manageability.&amp;nbsp; Even if compare approaches from some competitors, the switch would minimally have to have proper SNMP or SSH access configured, so the assumption that switch should still secure network if improperly or partially configured is not a reasonable assumption. A process need to be in place regardless of vendor implementation to ensure switch is properly configured after replacement.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="3"&gt;&lt;LI&gt;&lt;STRONG&gt;Reports&lt;/STRONG&gt; &lt;/LI&gt;&lt;/OL&gt;&lt;OL start="3"&gt;&lt;OL start="1"&gt;&lt;LI&gt;If a current NAD is powered off, is there a way to figure out that the NAD is no longer available ?? Any report that will give this to us&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="color: blue;"&gt;[Craig] I would rely on standard network monitoring tools for this.&amp;nbsp; All customers should have a network management and monitoring system that flags to console and reports when any piece of infrastructure is no longer available or down.&amp;nbsp; Typical case is that net monitoring is looking for activity or response to simple ICMP pings or SNMP queries to detect as soon as network is down.&amp;nbsp; I am sure they have tools that alarm on network going down.&amp;nbsp; Connectivity status is fundamental to net ops.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Oct 2016 15:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-query/m-p/3538007#M537263</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2016-10-24T15:52:36Z</dc:date>
    </item>
  </channel>
</rss>

