<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: anomalous client detection - how to remove client in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499211#M537544</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check out &lt;A href="https://community.cisco.com//u1/12698"&gt;aawoland&lt;/A&gt; blog that discusses this and shows the mechanisms to disable, there is screenshot for ISE 2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html" title="http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html"&gt;http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Sep 2016 15:45:41 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2016-09-16T15:45:41Z</dc:date>
    <item>
      <title>anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499208#M537540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clients are getting caught by the anomalous client detection function in ISE.&amp;nbsp; The list of clients can be displayed via the misconfigured supplicants report.&amp;nbsp; Is there a way to remove a device from this list to allow it to attempt to reconnect before the timer expires?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 14:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499208#M537540</guid>
      <dc:creator>greg2.0</dc:creator>
      <dc:date>2016-09-16T14:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499209#M537542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of ISE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 15:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499209#M537542</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-16T15:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499210#M537543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1.4 patch 3&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 15:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499210#M537543</guid>
      <dc:creator>greg2.0</dc:creator>
      <dc:date>2016-09-16T15:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499211#M537544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check out &lt;A href="https://community.cisco.com//u1/12698"&gt;aawoland&lt;/A&gt; blog that discusses this and shows the mechanisms to disable, there is screenshot for ISE 2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html" title="http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html"&gt;http://www.networkworld.com/article/3053669/security/troubleshooting-ciscos-ise-without-tac.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 15:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499211#M537544</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-16T15:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499212#M537545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jason.&lt;/P&gt;&lt;P&gt;To clarify, will disabling log suppression for the single client also remove the client from the anomalous blacklist?&amp;nbsp; Right now system is configured to reject requests for 60 minutes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 15:58:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499212#M537545</guid>
      <dc:creator>greg2.0</dc:creator>
      <dc:date>2016-09-16T15:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499213#M537546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It will remove it for 1 hour, if its acting correctly then it won't be put back into the bad list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2016 16:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499213#M537546</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-16T16:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499214#M537547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Further clarification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt; font-family: Calibri, sans-serif; color: #1f497d;"&gt;Key difference is whether client hits Access-Reject or not.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000;"&gt;&lt;SPAN style="font-size: 11pt; font-family: Calibri, sans-serif; color: #1f497d;"&gt;If client is simply flagged anomalous, then PSN suppresses the sending of logs to MnT, but auth fully processed as Hsing noted.&amp;nbsp; I think it is possible to bypass suppression if simply flagged anomalous.&amp;nbsp; However, if client marked for Access Reject, PSN no longer processes the requests for the rejection interval which can be set as low as 5 min.&amp;nbsp;&amp;nbsp;&amp;nbsp; If bypass suppression at this point, I don’t think client will be removed from access-reject response.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Sep 2016 14:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499214#M537547</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-20T14:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499215#M537548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are using the default setting for [ Request Rejection Interval ], which is 60 minutes, then the endpoint will jail for an hour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to allow the endpoint fully re-evaluated for authentications, the options are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create a collection filter to by-pass the suppression on the endpoint MAC address.&lt;/LI&gt;&lt;LI&gt;Lower the request rejection interval for anomalous client detection.&lt;/LI&gt;&lt;LI&gt;Disable the option to suppress anomalous clients. &amp;lt;-- OK for lab testing but not recommended for production.&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Sep 2016 21:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499215#M537548</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-09-20T21:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499216#M537549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One additional question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on my testing and the following note from Aaron Rowand (Cisco Expert), when the authentication fails TWICE no matter the DETECTION INTERVAL you have configured, the MAC address is added to the suppression list so any AUTHC request is rejected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Detection Interval &lt;SPAN style="text-decoration: underline;"&gt;will flag misbehaving&lt;/SPAN&gt;&lt;/STRONG&gt; supplicants when they fail authentication &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;more than once per interval&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, looks like this behavior only applies to MAB AUTHC because I tried on PEAP using AD valid credentials and nothing happened with the MAC of the device failing the authentication (only I locked the AD acct after multiple wrong passwords). More testing in progress.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Sep 2016 21:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499216#M537549</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2016-09-20T21:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: anomalous client detection - how to remove client</title>
      <link>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499217#M537550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1 minutes is the minimal value for the detection interval. Thus, an endpoint will get flagged as misbehaving in case 2+ consecutive failures within a minute. If failing only once every few minutes while the detection interval sets to 1 minute, then all the auth failures will be shown in M&amp;amp;T.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Sep 2016 21:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anomalous-client-detection-how-to-remove-client/m-p/3499217#M537550</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-09-20T21:55:24Z</dc:date>
    </item>
  </channel>
</rss>

