<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Through probes using profiling can we authorize the user in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624399#M575193</link>
    <description>&lt;P&gt;Use low-impact with dACLs instead of closed mode.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jun 2022 23:25:15 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-06-03T23:25:15Z</dc:date>
    <item>
      <title>Through probes using profiling can we authorize the user</title>
      <link>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624274#M575188</link>
      <description>&lt;HR /&gt;
&lt;P&gt;Through probes using profiling how can we create Authorization policy set and assign the endpoints specific vlan, i have gone through various videos &amp;amp; documents i have understood the concept to what extent but not complete.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because there is a rule which says, if switchport is in closed authentication then no traffic will be send except Eapol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So how can we make Authorization policy in Policy set and authorize the user&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 18:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624274#M575188</guid>
      <dc:creator>RohitSingh91693</dc:creator>
      <dc:date>2022-06-03T18:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Through probes using profiling can we authorize the user</title>
      <link>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624329#M575189</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It depends on the user/device attributes that ISE would require to successfully profile them.&lt;/P&gt;&lt;P&gt;In closed mode:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CDP/LLDP&lt;/STRONG&gt;: if profiling requires these attributes, ISE can use SNMP probe to collect them from the switch (they can also be sent in Access-Request if you are using ibns 2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DHCP&lt;/STRONG&gt;: if profiling requires DHCP attributes, ISE could authorize with a DACL that permits DHCP only. ISE can get these attributes with DHCP probe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NMAP&lt;/STRONG&gt;: if profiling requires port/OS attributes, ISE could authorize with a DACL that permits only the required ports (with the PSNs as destination).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 20:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624329#M575189</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-06-03T20:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Through probes using profiling can we authorize the user</title>
      <link>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624351#M575190</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1177229"&gt;@RohitSingh91693&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;beyond what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/255857"&gt;@andrewswanson&lt;/a&gt;&amp;nbsp;said ... please take a look at: &lt;A href="https://ciscocustomer.lookbookhq.com/iseguidedjourney/ISE-device-admin" target="_blank" rel="noopener"&gt;Cisco ISE Device Administration Prescriptive Deployment Guide&lt;/A&gt;, search for &lt;STRONG&gt;Device Admin Policy Sets&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;About Probes ... remember that:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;1st&lt;/STRONG&gt; &lt;STRONG&gt;Network Probe&lt;/STRONG&gt; is a method used to collect an attribute or a set of attributes from an &lt;STRONG&gt;Endpoint&lt;/STRONG&gt; on your network. It analyzes received Network Traffic (ex.: &lt;STRONG&gt;RADIUS&lt;/STRONG&gt;, &lt;STRONG&gt;SNMP&lt;/STRONG&gt;, &lt;STRONG&gt;DHCP&lt;/STRONG&gt;, &lt;STRONG&gt;HTTP&lt;/STRONG&gt; and more) by collecting &lt;STRONG&gt;Endpoint Attributes&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;2nd&lt;/STRONG&gt; Most &lt;STRONG&gt;Probes&lt;/STRONG&gt; are &lt;U&gt;passive&lt;/U&gt; ... traffic MUST be delivered to &lt;STRONG&gt;ISE&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;3rd&lt;/STRONG&gt; It is &lt;U&gt;NOT recommended&lt;/U&gt; to configure &lt;STRONG&gt;ALL Probes&lt;/STRONG&gt;, especially in a &lt;STRONG&gt;Production Deployment&lt;/STRONG&gt;, as this may result in &lt;U&gt;excessive data collection&lt;/U&gt; than is required to achieve the desired goal !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Note: you are able to enable &lt;STRONG&gt;Probes&lt;/STRONG&gt; at &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Deployment &amp;gt;&lt;/STRONG&gt; select the &lt;STRONG&gt;PSN&lt;/STRONG&gt; &amp;gt; select &lt;STRONG&gt;Profiling Configuration&lt;/STRONG&gt;&amp;nbsp;tab.&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 21:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624351#M575190</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-06-03T21:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: Through probes using profiling can we authorize the user</title>
      <link>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624399#M575193</link>
      <description>&lt;P&gt;Use low-impact with dACLs instead of closed mode.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 23:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/through-probes-using-profiling-can-we-authorize-the-user/m-p/4624399#M575193</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-06-03T23:25:15Z</dc:date>
    </item>
  </channel>
</rss>

