<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NMAP rescan interval in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4387499#M566752</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if NMAP is used for Profiling devices is there some kind of interval which reruns the scan to check if the device is still the same.&lt;/P&gt;&lt;P&gt;I know there is some kind of overload protection for the Node but is there some kind of verification like (if nmap last scan time is older than x) to ensure the scan did not run to often against a single MAC.&lt;/P&gt;</description>
    <pubDate>Thu, 15 Apr 2021 12:25:56 GMT</pubDate>
    <dc:creator>Oliver Laue</dc:creator>
    <dc:date>2021-04-15T12:25:56Z</dc:date>
    <item>
      <title>NMAP rescan interval</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4387499#M566752</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if NMAP is used for Profiling devices is there some kind of interval which reruns the scan to check if the device is still the same.&lt;/P&gt;&lt;P&gt;I know there is some kind of overload protection for the Node but is there some kind of verification like (if nmap last scan time is older than x) to ensure the scan did not run to often against a single MAC.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 12:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4387499#M566752</guid>
      <dc:creator>Oliver Laue</dc:creator>
      <dc:date>2021-04-15T12:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP rescan interval</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4387541#M566753</link>
      <description>&lt;P&gt;NMAP Scans for Unknown MAC Address while probing - you can do manual probing also.&amp;nbsp; it all depends how you configure, some reference .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 13:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4387541#M566753</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-04-15T13:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP rescan interval</title>
      <link>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4402842#M567293</link>
      <description>&lt;P&gt;ISE should only perform an NMAP scan once per authentication.&lt;/P&gt;
&lt;P&gt;It's purpose is to authenticate and profile devices upon connection - not to be a vulnerability scanner.&lt;/P&gt;
&lt;P&gt;You should use a different security service for ongoing port detection and vulnerability scanning.&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 21:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nmap-rescan-interval/m-p/4402842#M567293</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-05-13T21:06:04Z</dc:date>
    </item>
  </channel>
</rss>

