<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.7 Incorrect Profiling Device-Sensor in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177957#M563621</link>
    <description>&lt;P&gt;Hi Guys,&lt;BR /&gt;&lt;BR /&gt;Thanks for your assistance, appreciate it.&lt;BR /&gt;&lt;BR /&gt;So, we have another ISE installation where we believe the profiling is working correctly, but to be honest, now I'm diving deeper, I'm not sure 'how' it's working correctly.&lt;BR /&gt;&lt;BR /&gt;I have a ATA converter that I can test using MAB.&lt;BR /&gt;We actually have an administered created Profiled Policy to match these devices.&lt;BR /&gt;&lt;BR /&gt;My first question would be, is there a way to see which conditions matched to reach the minimum certainty factor?&lt;BR /&gt;&lt;BR /&gt;I'll be honest, this has stumped me a little. I carried out a Debug on the switch and packet capture on the ISE.&lt;BR /&gt;&lt;BR /&gt;I can see the radius accounting, but I don't see anything regarding CDP.&lt;BR /&gt;For instance we match 4 conditions with a minimum certainty of 40. But one of those conditions which is a MAC address contain rule.&lt;BR /&gt;&lt;BR /&gt;But even though the ATA is profililed as an ATA, it doesn't match the condition that matches part of a MAC address, so even if the other 3 conditions are met, we only have a total of 30....but the minimum certainty is 40....so I'm really wondering how the profiling is working??&lt;BR /&gt;&lt;BR /&gt;Regarding the capture, I don't see anything obvious which is forwarding the CDP information, but again, this is another expression that we are trying to match.&lt;BR /&gt;&lt;BR /&gt;It would be really useful if I could actually see what expressions are matched to profile this device as an ATA. Once I can understand that, it should help me to understand where the other profiled sessions on the other ISE setup are going wrong.&lt;BR /&gt;&lt;BR /&gt;I hope that all makes sense?&lt;BR /&gt;&lt;BR /&gt;According to the documentation I should be seeing the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture1.JPG" style="width: 912px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87621iB13009CC59D1DAF3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture1.JPG" alt="Capture1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But from the capture I ran, this is all I see...and this is actually on a system that I 'believe' is profiling correctly??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture2.JPG" style="width: 956px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87622i6CC6996C442DF654/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture2.JPG" alt="Capture2.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture3.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87623i4449177B332BF9AE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture3.JPG" alt="Capture3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Nov 2020 12:16:58 GMT</pubDate>
    <dc:creator>ShaunGreen</dc:creator>
    <dc:date>2020-11-03T12:16:58Z</dc:date>
    <item>
      <title>ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177317#M563604</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dot1x with certs is working, the issues are with MAB.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have an issue where devices (Cisco Phone 7841 and other cisco devices) are being profiled as a Cisco Device and not an IP Phone and hence failing authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch is:&lt;/P&gt;&lt;P&gt;WS-C2960CX-8PC-L&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;15.2(6)E1&amp;nbsp; &amp;nbsp; &amp;nbsp; C2960CX-UNIVERSALK9-M&lt;/P&gt;&lt;P&gt;ISE VM:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.7.0.356&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I saw from this page that device-sensor is required to send the CDP/LLDP information. I'll post the commands afterwards, but from the Debug, I don't believe this is happening.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Debug should look like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Mar 30 05:34:58.716: RADIUS(00000000): Send Accounting-Request to 1.1.1.1:1813 id 1646/85, len 378
Mar 30 05:34:58.716: RADIUS:  authenticator 17 DA 12 8B 17 96 E2 0F - 5D 3D EC 79 3C ED 69 20
Mar 30 05:34:58.716: RADIUS:  Vendor, Cisco       [26]  40
Mar 30 05:34:58.716: RADIUS:   Cisco AVpair       [1]   34  "&lt;STRONG&gt;cdp-tlv&lt;/STRONG&gt;=                        "
Mar 30 05:34:58.716: RADIUS:  Vendor, Cisco       [26]  23
Mar 30 05:34:58.716: RADIUS:   Cisco AVpair       [1]   17  "&lt;STRONG&gt;cdp-tlv&lt;/STRONG&gt;=       "
Mar 30 05:34:58.721: RADIUS:  Vendor, Cisco       [26]  59
Mar 30 05:34:58.721: RADIUS:   Cisco AVpair       [1]   53  "&lt;STRONG&gt;lldp-tlv&lt;/STRONG&gt;=         &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;With the setup we have we never see these AVpairs being sent (debug from the test environment)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;000052: Nov 2 12:39:41.280 CET: RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;BR /&gt;000053: Nov 2 12:39:41.280 CET: RADIUS(00000000): Config NAS IP: 10.90.163.13&lt;BR /&gt;000054: Nov 2 12:39:41.280 CET: RADIUS(00000000): Config NAS IPv6: ::&lt;BR /&gt;000055: Nov 2 12:39:41.280 CET: RADIUS(00000000): sending&lt;BR /&gt;000056: Nov 2 12:39:41.280 CET: RADIUS: Message Authenticator encoded&lt;BR /&gt;000057: Nov 2 12:39:41.280 CET: RADIUS(00000000): Send Access-Request to 10.4.40.153:1812 onvrf(0) id 1645/17, len 285&lt;BR /&gt;000058: Nov 2 12:39:41.280 CET: RADIUS: authenticator 45 F5 72 80 93 DB 3A EF - CD 44 16 2A 0C 75 CA 72&lt;BR /&gt;000059: Nov 2 12:39:41.280 CET: RADIUS: User-Name [1] 25 "CP-7841-SEPC4B9CD802351"&lt;BR /&gt;000060: Nov 2 12:39:41.280 CET: RADIUS: Service-Type [6] 6 Framed [2]&lt;BR /&gt;000061: Nov 2 12:39:41.280 CET: RADIUS: Vendor, Cisco [26] 27&lt;BR /&gt;000062: Nov 2 12:39:41.280 CET: RADIUS: Cisco AVpair [1] 21 "service-type=Framed"&lt;BR /&gt;000063: Nov 2 12:39:41.283 CET: RADIUS: Framed-MTU [12] 6 1500&lt;BR /&gt;000064: Nov 2 12:39:41.283 CET: RADIUS: Called-Station-Id [30] 19 "00-B0-E1-67-E9-02"&lt;BR /&gt;000065: Nov 2 12:39:41.283 CET: RADIUS: Calling-Station-Id [31] 19 "C4-B9-CD-80-23-51"&lt;BR /&gt;000066: Nov 2 12:39:41.283 CET: RADIUS: EAP-Message [79] 30&lt;BR /&gt;000067: Nov 2 12:39:41.283 CET: RADIUS: 02 01 00 1C 01 43 50 2D 37 38 34 31 2D 53 45 50 43 34 42 39 43 [CP-7841-SEPC4B9C]&lt;BR /&gt;000068: Nov 2 12:39:41.283 CET: RADIUS: 44 38 30 32 33 35 31 [ D802351]&lt;BR /&gt;000069: Nov 2 12:39:41.283 CET: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;000070: Nov 2 12:39:41.283 CET: RADIUS: 23 11 8A E2 6B E3 A7 78 86 00 82 D0 AC 0E F5 27 [ #kx']&lt;BR /&gt;000071: Nov 2 12:39:41.283 CET: RADIUS: EAP-Key-Name [102] 2 *&lt;BR /&gt;000072: Nov 2 12:39:41.283 CET: RADIUS: Vendor, Cisco [26] 49&lt;BR /&gt;000073: Nov 2 12:39:41.283 CET: RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A0110040000000E00065B84"&lt;BR /&gt;000074: Nov 2 12:39:41.283 CET: RADIUS: Vendor, Cisco [26] 20&lt;BR /&gt;000075: Nov 2 12:39:41.283 CET: RADIUS: Cisco AVpair [1] 14 "method=dot1x"&lt;BR /&gt;000076: Nov 2 12:39:41.283 CET: RADIUS: Framed-IP-Address [8] 6 10.4.77.15&lt;BR /&gt;000077: Nov 2 12:39:41.283 CET: RADIUS: NAS-IP-Address [4] 6 10.90.163.13&lt;BR /&gt;000078: Nov 2 12:39:41.283 CET: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2"&lt;BR /&gt;000079: Nov 2 12:39:41.283 CET: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]&lt;BR /&gt;000080: Nov 2 12:39:41.283 CET: RADIUS: NAS-Port [5] 6 50102&lt;BR /&gt;000081: Nov 2 12:39:41.283 CET: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;BR /&gt;000082: Nov 2 12:39:41.283 CET: RADIUS(00000000): Started 5000 sec timeout&lt;BR /&gt;000083: Nov 2 12:39:41.290 CET: RADIUS: Received from id 1645/17 10.4.40.153:1812, Access-Reject, len 38&lt;BR /&gt;000084: Nov 2 12:39:41.290 CET: RADIUS: authenticator 21 E5 B0 81 22 9F F9 0C - 81 07 F0 6E A4 04 8A 9C&lt;BR /&gt;000085: Nov 2 12:39:41.290 CET: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;000086: Nov 2 12:39:41.290 CET: RADIUS: 46 65 10 2E 65 A2 9B 41 9B 3B F7 C4 12 CF 6F 96 [ Fe.eA;o]&lt;BR /&gt;000087: Nov 2 12:39:41.290 CET: RADIUS(00000000): Received from id 1645/17&lt;BR /&gt;000088: Nov 2 12:39:41.290 CET: %DOT1X-5-FAIL: Authentication failed for client (c4b9.cd80.2351) on Interface Gi0/2 AuditSessionID 0A0110040000000E00065B84&lt;BR /&gt;000089: Nov 2 12:39:41.294 CET: RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;BR /&gt;000090: Nov 2 12:39:41.294 CET: RADIUS(00000000): Config NAS IP: 10.90.163.13&lt;BR /&gt;000091: Nov 2 12:39:41.294 CET: RADIUS(00000000): Config NAS IPv6: ::&lt;BR /&gt;000092: Nov 2 12:39:41.294 CET: RADIUS(00000000): sending&lt;BR /&gt;000093: Nov 2 12:39:41.297 CET: RADIUS: Message Authenticator encoded&lt;BR /&gt;000094: Nov 2 12:39:41.297 CET: RADIUS(00000000): Send Access-Request to 10.4.40.153:1812 onvrf(0) id 1645/18, len 264&lt;BR /&gt;000095: Nov 2 12:39:41.297 CET: RADIUS: authenticator F4 EE 04 C7 C7 A1 85 20 - 60 A6 90 F1 B5 30 35 BB&lt;BR /&gt;000096: Nov 2 12:39:41.297 CET: RADIUS: User-Name [1] 14 "c4b9cd802351"&lt;BR /&gt;000097: Nov 2 12:39:41.297 CET: RADIUS: User-Password [2] 18 *&lt;BR /&gt;000098: Nov 2 12:39:41.297 CET: RADIUS: Service-Type [6] 6 Call Check [10]&lt;BR /&gt;000099: Nov 2 12:39:41.297 CET: RADIUS: Vendor, Cisco [26] 31&lt;BR /&gt;000100: Nov 2 12:39:41.297 CET: RADIUS: Cisco AVpair [1] 25 "service-type=Call Check"&lt;BR /&gt;000101: Nov 2 12:39:41.297 CET: RADIUS: Framed-MTU [12] 6 1500&lt;BR /&gt;000102: Nov 2 12:39:41.297 CET: RADIUS: Called-Station-Id [30] 19 "00-B0-E1-67-E9-02"&lt;BR /&gt;000103: Nov 2 12:39:41.297 CET: RADIUS: Calling-Station-Id [31] 19 "C4-B9-CD-80-23-51"&lt;BR /&gt;000104: Nov 2 12:39:41.297 CET: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;000105: Nov 2 12:39:41.297 CET: RADIUS: 62 23 1C 73 3E D7 84 30 D0 65 3C 98 A0 74 49 31 [ b#s&amp;gt;0e&amp;lt;tI1]&lt;BR /&gt;000106: Nov 2 12:39:41.297 CET: RADIUS: EAP-Key-Name [102] 2 *&lt;BR /&gt;000107: Nov 2 12:39:41.297 CET: RADIUS: Vendor, Cisco [26] 49&lt;BR /&gt;000108: Nov 2 12:39:41.297 CET: RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A0110040000000E00065B84"&lt;BR /&gt;000109: Nov 2 12:39:41.297 CET: RADIUS: Vendor, Cisco [26] 18&lt;BR /&gt;000110: Nov 2 12:39:41.297 CET: RADIUS: Cisco AVpair [1] 12 "method=mab"&lt;BR /&gt;000111: Nov 2 12:39:41.297 CET: RADIUS: Framed-IP-Address [8] 6 10.4.77.15&lt;BR /&gt;000112: Nov 2 12:39:41.297 CET: RADIUS: NAS-IP-Address [4] 6 10.90.163.13&lt;BR /&gt;000113: Nov 2 12:39:41.297 CET: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2"&lt;BR /&gt;000114: Nov 2 12:39:41.297 CET: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]&lt;BR /&gt;000115: Nov 2 12:39:41.297 CET: RADIUS: NAS-Port [5] 6 50102&lt;BR /&gt;000116: Nov 2 12:39:41.297 CET: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;BR /&gt;000117: Nov 2 12:39:41.297 CET: RADIUS(00000000): Started 5000 sec timeout&lt;BR /&gt;000118: Nov 2 12:39:41.304 CET: RADIUS: Received from id 1645/18 10.4.40.153:1812, Access-Reject, len 38&lt;BR /&gt;000119: Nov 2 12:39:41.308 CET: RADIUS: authenticator C8 B1 6B 40 4A 08 EE D3 - CD E8 5B 91 AE C0 8E 66&lt;BR /&gt;000120: Nov 2 12:39:41.308 CET: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;000121: Nov 2 12:39:41.308 CET: RADIUS: 2D 38 17 9E D1 05 51 27 54 54 48 ED B1 01 94 AD [ -8Q'TTH]&lt;BR /&gt;000122: Nov 2 12:39:41.308 CET: RADIUS(00000000): Received from id 1645/18&lt;BR /&gt;000123: Nov 2 12:39:41.308 CET: %MAB-5-FAIL: Authentication failed for client (c4b9.cd80.2351) on Interface Gi0/2 AuditSessionID 0A0110040000000E00065B84&lt;/P&gt;&lt;P&gt;#sho access-session int g0/2 det&lt;BR /&gt;Interface: GigabitEthernet0/2&lt;BR /&gt;MAC Address: c4b9.cd80.2351&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 10.4.77.15&lt;BR /&gt;User-Name: c4b9cd802351&lt;BR /&gt;Status: Unauthorized&lt;BR /&gt;Domain: UNKNOWN&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: in&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: N/A&lt;BR /&gt;Session Uptime: 20s&lt;BR /&gt;Common Session ID: 0A0110040000000E00065B84&lt;BR /&gt;Acct Session ID: Unknown&lt;BR /&gt;Handle: 0x8C000003&lt;BR /&gt;Current Policy: PORT-AUTH-POLICY&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;dot1x Stopped&lt;BR /&gt;mab Authc Failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;I thought this might be the issue, but I changed the IOS to one which said it was okay (another post on the community), but still the same issue:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the device-sensor configuration and radius:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;device-sensor filter-list dhcp list DHCP-LIST&lt;BR /&gt;option name host-name&lt;BR /&gt;option name requested-address&lt;BR /&gt;option name parameter-request-list&lt;BR /&gt;option name class-identifier&lt;BR /&gt;option name client-identifier&lt;BR /&gt;!&lt;BR /&gt;device-sensor filter-list lldp list LLDP-LIST&lt;BR /&gt;tlv name system-name&lt;BR /&gt;tlv name system-description&lt;BR /&gt;tlv name system-capabilities&lt;BR /&gt;!&lt;BR /&gt;device-sensor filter-list cdp list CDP-LIST&lt;BR /&gt;tlv name device-name&lt;BR /&gt;tlv name address-type&lt;BR /&gt;tlv name capabilities-type&lt;BR /&gt;tlv name version-type&lt;BR /&gt;tlv name platform-type&lt;BR /&gt;device-sensor filter-spec dhcp include list DHCP-LIST&lt;BR /&gt;device-sensor filter-spec lldp include list LLDP-LIST&lt;BR /&gt;device-sensor filter-spec cdp include list CDP-LIST&lt;BR /&gt;device-sensor notify all-changes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 20 tries 3&lt;BR /&gt;radius-server deadtime 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I've noticed is the documents state the following command is required and my gut feeling tells me this is why the CDP information is not being sent to the ISE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;device-sensor accounting&lt;/PRE&gt;&lt;P&gt;But all of the versions I've tried, there isn't the option to configure this command, not is on by default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#sho device-sensor details&lt;/P&gt;&lt;P&gt;Device-Sensor Details&lt;BR /&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;Status = Enabled&lt;/P&gt;&lt;P&gt;Protocols:&lt;BR /&gt;-----------&lt;BR /&gt;CDP registered&lt;BR /&gt;LLDP registered&lt;BR /&gt;DHCP registered&lt;BR /&gt;HTTP registered&lt;/P&gt;&lt;P&gt;Protocol Filter Configuration:&lt;BR /&gt;---------------------------------&lt;BR /&gt;CDP Include List - CDP-LIST&lt;BR /&gt;LLDP Include List - LLDP-LIST&lt;BR /&gt;DHCP Include List - DHCP-LIST&lt;BR /&gt;HTTP None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device: c4b9.cd80.2351 on port GigabitEthernet0/2&lt;BR /&gt;--------------------------------------------------&lt;BR /&gt;Proto Type:Name Len Value&lt;BR /&gt;LLDP 7:system-capabilities 6 0E 04 00 24 00 24&lt;BR /&gt;LLDP 6:system-description 50 0C 30 43 69 73 63 6F 20 49 50 20 50 68 6F 6E 65&lt;BR /&gt;20 37 38 34 31 2C 20 56 31 2C 20 73 69 70 37 38&lt;BR /&gt;78 78 2E 31 31 2D 35 2D 31 2D 31 38 2E 6C 6F 61&lt;BR /&gt;64 73&lt;BR /&gt;LLDP 5:system-name 17 0A 0F 53 45 50 43 34 42 39 43 44 38 30 32 33 35&lt;BR /&gt;31&lt;BR /&gt;CDP 28:secondport-status-type 7 00 1C 00 07 00 02 00&lt;BR /&gt;CDP 6:platform-type 23 00 06 00 17 43 69 73 63 6F 20 49 50 20 50 68 6F&lt;BR /&gt;6E 65 20 37 38 34 31&lt;BR /&gt;CDP 5:version-type 27 00 05 00 1B 73 69 70 37 38 78 78 2E 31 31 2D 35&lt;BR /&gt;2D 31 2D 31 38 2E 6C 6F 61 64 73&lt;BR /&gt;CDP 4:capabilities-type 8 00 04 00 08 00 00 04 90&lt;BR /&gt;CDP 2:address-type 17 00 02 00 11 00 00 00 01 01 01 CC 00 04 0A 04 4D&lt;BR /&gt;0F&lt;BR /&gt;CDP 1:device-name 19 00 01 00 13 53 45 50 43 34 42 39 43 44 38 30 32&lt;BR /&gt;33 35 31&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have any other ideas or experience of MAB with 2960CX's?&lt;BR /&gt;&lt;BR /&gt;I've tried various SW's, but keep hitting the same thing. I think the problem is because the CDP information isn't being sent to the ISE, but I don't know how I can configure this to happen.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Simon&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 11:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177317#M563604</guid>
      <dc:creator>ShaunGreen</dc:creator>
      <dc:date>2020-11-02T11:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177415#M563607</link>
      <description>&lt;P&gt;Have you considered not using the default out-of-box profiles? Essentially you could identify attributes that you could target to create a new profile to profile the devices that have a higher MCF.&amp;nbsp; You would then reference the profiled group in your authz policy.&amp;nbsp; Note that at this point you would require plus licensing in a 1-1 ratio.&amp;nbsp; This would/could help with your issue.&amp;nbsp; TBH when I rely on profiling I typically build out custom profiles.&amp;nbsp; HTH!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 15:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177415#M563607</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-11-02T15:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177432#M563609</link>
      <description>&lt;P&gt;Hi Simon,&lt;/P&gt;
&lt;P&gt;I would suggest you to take a packet capture on the ISE server receiving the authentication request to verify if the RADIUS AV Pairs are received by ISE in the RADIUS accounting packet or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 15:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177432#M563609</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-11-02T15:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177957#M563621</link>
      <description>&lt;P&gt;Hi Guys,&lt;BR /&gt;&lt;BR /&gt;Thanks for your assistance, appreciate it.&lt;BR /&gt;&lt;BR /&gt;So, we have another ISE installation where we believe the profiling is working correctly, but to be honest, now I'm diving deeper, I'm not sure 'how' it's working correctly.&lt;BR /&gt;&lt;BR /&gt;I have a ATA converter that I can test using MAB.&lt;BR /&gt;We actually have an administered created Profiled Policy to match these devices.&lt;BR /&gt;&lt;BR /&gt;My first question would be, is there a way to see which conditions matched to reach the minimum certainty factor?&lt;BR /&gt;&lt;BR /&gt;I'll be honest, this has stumped me a little. I carried out a Debug on the switch and packet capture on the ISE.&lt;BR /&gt;&lt;BR /&gt;I can see the radius accounting, but I don't see anything regarding CDP.&lt;BR /&gt;For instance we match 4 conditions with a minimum certainty of 40. But one of those conditions which is a MAC address contain rule.&lt;BR /&gt;&lt;BR /&gt;But even though the ATA is profililed as an ATA, it doesn't match the condition that matches part of a MAC address, so even if the other 3 conditions are met, we only have a total of 30....but the minimum certainty is 40....so I'm really wondering how the profiling is working??&lt;BR /&gt;&lt;BR /&gt;Regarding the capture, I don't see anything obvious which is forwarding the CDP information, but again, this is another expression that we are trying to match.&lt;BR /&gt;&lt;BR /&gt;It would be really useful if I could actually see what expressions are matched to profile this device as an ATA. Once I can understand that, it should help me to understand where the other profiled sessions on the other ISE setup are going wrong.&lt;BR /&gt;&lt;BR /&gt;I hope that all makes sense?&lt;BR /&gt;&lt;BR /&gt;According to the documentation I should be seeing the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture1.JPG" style="width: 912px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87621iB13009CC59D1DAF3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture1.JPG" alt="Capture1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But from the capture I ran, this is all I see...and this is actually on a system that I 'believe' is profiling correctly??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture2.JPG" style="width: 956px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87622i6CC6996C442DF654/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture2.JPG" alt="Capture2.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture3.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87623i4449177B332BF9AE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture3.JPG" alt="Capture3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 12:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4177957#M563621</guid>
      <dc:creator>ShaunGreen</dc:creator>
      <dc:date>2020-11-03T12:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179222#M563640</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/252688"&gt;@ShaunGreen&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that the device sensor data is sent only if the MAC address successfully authenticated. The device sensor data is carried in the RADIUS accounting packets and there is no RADIUS accounting for MAC addresses which failed authentication. As far as I know there is no option to carry the information in the RADIUS authentication packet. Therefore, you need to allow some kind of temporary access to get the device sensor data. E.g. RADIUS Access-Accept with an DACL which only allows DHCP and DNS. Also make sure, that your global and/or profile specific configuration triggers a CoA after the profile change, so that device gets the appropriate access after profiling.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 10:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179222#M563640</guid>
      <dc:creator>martin.fischer</dc:creator>
      <dc:date>2020-11-05T10:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179286#M563643</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/262907"&gt;@martin.fischer&lt;/a&gt;&amp;nbsp;Thanks for the information.&lt;BR /&gt;&lt;BR /&gt;According to the documentation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Until the client is authenticated, 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), &lt;STRONG&gt;Cisco Discovery Protocol (CDP),&lt;/STRONG&gt; and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've created a Profile Policy to match the CDP:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture12.JPG" style="width: 926px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87848i1A32FB368EE57AAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture12.JPG" alt="Capture12.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And then call on the logical profile in the Policy set:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture13.JPG" style="width: 830px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87849i8A429E6B8135776A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture13.JPG" alt="Capture13.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture11.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87850i9CBA4D25DBE1DC8A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture11.JPG" alt="Capture11.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But because the ISE never receives the CDP information, it just ends up seeing it as a Cisco-Device and ending up in the Default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture14.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87852i994C6B18F26C3948/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture14.JPG" alt="Capture14.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could try creating an exception rule, but that does seem the right way to go.&lt;BR /&gt;&lt;BR /&gt;I'm now testing with a 2960x 15.2(7) E3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 12:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179286#M563643</guid>
      <dc:creator>ShaunGreen</dc:creator>
      <dc:date>2020-11-05T12:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179290#M563644</link>
      <description>&lt;P&gt;Yes, CDP is allowed before authentication but its informations are not transported by the device sensor via RADIUS accounting as long as the session is not authenticated. Alternatively, you can enable and configure the SNMP profiler as it is capable to read the CDP MIB of the switch.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 12:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179290#M563644</guid>
      <dc:creator>martin.fischer</dc:creator>
      <dc:date>2020-11-05T12:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179337#M563647</link>
      <description>&lt;P&gt;Hi Martin,&lt;BR /&gt;&lt;BR /&gt;From this doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume the bold command below was responsible for sending the CDP/LLDP information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;device-sensor filter-list cdp list cdp-list
 tlv name device-name&lt;BR /&gt;&amp;nbsp;tlv name platform-type
!
device-sensor filter-list lldp list lldp-list
 tlv name system-description
!
device-sensor filter-spec lldp include list lldp-list
device-sensor filter-spec cdp include list cdp-list
!
&lt;STRONG&gt;device-sensor accounting&lt;/STRONG&gt;
device-sensor notify all-changes&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;But from all of the version of IOS I've used, that command is not available.&lt;BR /&gt;&lt;BR /&gt;Looking through the document, things seem straight forward, but unfortunately that's not been the case.&lt;BR /&gt;&lt;BR /&gt;I've configured things with SNMP and it's looking much better. I delete the device from ISE profile with the port shut down, Bring up the port and it profiles correctly.&lt;BR /&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 14:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4179337#M563647</guid>
      <dc:creator>ShaunGreen</dc:creator>
      <dc:date>2020-11-05T14:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Incorrect Profiling Device-Sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4276276#M564884</link>
      <description>&lt;P&gt;Use following:&lt;/P&gt;
&lt;PRE&gt;SWITCH(config)#&lt;STRONG&gt;access-session attributes filter-list list DS&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config-com-filter-list)#&lt;STRONG&gt;cdp&lt;/STRONG&gt; &lt;BR /&gt;SWITCH(config-com-filter-list)#&lt;STRONG&gt;lldp&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config-com-filter-list)#&lt;STRONG&gt;dhcp&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config-com-filter-list)#&lt;STRONG&gt;http&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config-com-filter-list)#&lt;STRONG&gt;exit&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config)#&lt;BR /&gt;SWITCH(config)#&lt;STRONG&gt;access-session accounting attributes filter-spec include list DS&lt;/STRONG&gt;&lt;BR /&gt;SWITCH(config)#&lt;/PRE&gt;</description>
      <pubDate>Wed, 20 Jan 2021 22:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-incorrect-profiling-device-sensor/m-p/4276276#M564884</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2021-01-20T22:21:34Z</dc:date>
    </item>
  </channel>
</rss>

