<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anamolous detection issue for ise 2.3 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3742440#M542849</link>
    <description>&lt;P&gt;My take on enabling Anomalous Detection also didn't work correctly, I engaged TAC and it turned into a dead end. I'm also seeing lot of false detections when we turn this on, so I cannot recommend this for enforcement, but rather as an indication for things to check.&lt;/P&gt;
&lt;P&gt;I believe that a stronger profiling policy along with proper network design is more effective, if utilizing Dot1x is not possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Nov 2018 20:05:22 GMT</pubDate>
    <dc:creator>Panos Bouras</dc:creator>
    <dc:date>2018-11-08T20:05:22Z</dc:date>
    <item>
      <title>Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3737209#M542831</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many of Windows workstation are detected as Anomalous in&amp;nbsp;ISE 2.3 . Even though the desktop of corporate desktop without any change . As per the log&amp;nbsp;endpoints detected as anomalous because of the DHCP class identifier change as in the case below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2018-09-18 03:20:39,272 INFO&amp;nbsp;&amp;nbsp; [MACSpoofingEventHandler-52-thread-1][] com.cisco.profiler.api.MACSpoofingManager -:ProfilerCollection:- Anomalous Behaviour Detected: 10:60:4B:77:98:61 AttrName: dhcp-class-identifier Old Value: MSFT 5.0 New Value: MS-UC-Client&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attribute values “MSFT” and “MS-UC-Client” are both part of “Microsoft-Workstation” profiling policy rules. I’m unsure why ISE is finding the new value after a while – this change in attribute&amp;nbsp;is causing the anomalous detection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone help with the resolution or workaround for the same.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3737209#M542831</guid>
      <dc:creator>Karry</dc:creator>
      <dc:date>2019-03-11T08:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3737237#M542834</link>
      <description>the issue here is changing on the class identifier value !&lt;BR /&gt;because ISE will consider it as anomalous  detection.&lt;BR /&gt;maybe you can disable the enforcement and keep the detection then you can quarantine manually, this maybe some sort of workaround but not a solution for the issue.&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Nov 2018 13:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3737237#M542834</guid>
      <dc:creator>yalbikaw</dc:creator>
      <dc:date>2018-11-01T13:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3738518#M542837</link>
      <description>&lt;DIV class="lia-message-author-with-avatar"&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Cisco-Employee lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;&lt;A id="link_16" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/83396" target="_self"&gt;yalbikaw&lt;/A&gt;&amp;nbsp;is correct on this. Please engage Cisco TAC to investigate why&amp;nbsp;the UC client making DHCP requests, when it appears not bridged with its own MAC address.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 03 Nov 2018 19:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3738518#M542837</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-11-03T19:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3738555#M542840</link>
      <description>&lt;P&gt;See CSCvh24575 (Ability to filter or ignore certain attributes for Anomalous Client detection)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Nov 2018 20:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3738555#M542840</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-11-03T20:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3741712#M542843</link>
      <description>I am having this issue in ISE 2.4 as well. Thousands of workstations being detected... Makes it a bad option to enable enforcement until this can be fixed.</description>
      <pubDate>Wed, 07 Nov 2018 21:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3741712#M542843</guid>
      <dc:creator>DIEHARDave</dc:creator>
      <dc:date>2018-11-07T21:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3741716#M542846</link>
      <description>&lt;P&gt;Depending on which version/patch combination you are on, this bug also creates false positives, it is not just 4500's as the description would suggest.&amp;nbsp; &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk10674" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk10674&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 22:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3741716#M542846</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-11-07T22:05:17Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3742440#M542849</link>
      <description>&lt;P&gt;My take on enabling Anomalous Detection also didn't work correctly, I engaged TAC and it turned into a dead end. I'm also seeing lot of false detections when we turn this on, so I cannot recommend this for enforcement, but rather as an indication for things to check.&lt;/P&gt;
&lt;P&gt;I believe that a stronger profiling policy along with proper network design is more effective, if utilizing Dot1x is not possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 20:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3742440#M542849</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2018-11-08T20:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3745296#M542852</link>
      <description>Not sure why this was "solved" simply saying open a TAC case but from what I have found it has something with Skype changing the DHCP class identifier when it launches so depending on when the DHCP packets are sent it could show MS-UC-Client or MSFT 5.0.&lt;BR /&gt;&lt;BR /&gt;There is already a bug report for this apparently: &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCum61422" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCum61422&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Workaround:&lt;BR /&gt;Manually create a profiler workstation policy to match against a DHCP-Class-Identifier using "MS-UC-Client"&lt;BR /&gt;&lt;BR /&gt;I have cleared my Anomolus list and will let you know if i see it fill back up!&lt;BR /&gt;</description>
      <pubDate>Mon, 12 Nov 2018 19:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3745296#M542852</guid>
      <dc:creator>DIEHARDave</dc:creator>
      <dc:date>2018-11-12T19:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3745367#M542853</link>
      <description>&lt;P&gt;I read the original post again and they already had this in their Workstation configs... They started showing up again in my list as well after clearing it and trying the "workaround".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue remains the DHCP identifier changes therefor it's Anamolous as that alone triggers it. Even if you add the UC agent string to and existing or new profile. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What was TAC's response?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 21:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3745367#M542853</guid>
      <dc:creator>DIEHARDave</dc:creator>
      <dc:date>2018-11-12T21:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Anamolous detection issue for ise 2.3</title>
      <link>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3926279#M542854</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;Did you get this sorted out ? what was the solution ?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 13:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anamolous-detection-issue-for-ise-2-3/m-p/3926279#M542854</guid>
      <dc:creator>ommaayah</dc:creator>
      <dc:date>2019-09-18T13:47:37Z</dc:date>
    </item>
  </channel>
</rss>

