<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE profiling - &amp;quot;User-agent&amp;quot; - device-sensor in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785409#M580159</link>
    <description>&lt;P&gt;the document is correct, the http probe info however it's going to retrieved depending on the platform from where you are profiling, kindly review if the one you're using is applicable as per the table&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/device-sensor-catalyst-supported-platforms/ta-p/3618782" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/device-sensor-catalyst-supported-platforms/ta-p/3618782&lt;/A&gt;&amp;nbsp;or review the feature itself within the platform NAD documents to verify.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Mar 2023 01:30:55 GMT</pubDate>
    <dc:creator>Rodrigo Diaz</dc:creator>
    <dc:date>2023-03-02T01:30:55Z</dc:date>
    <item>
      <title>ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785237#M580147</link>
      <description>&lt;P&gt;I'm trying to get additional profiling data into ISE so things like macbooks don't show up as "Free-BSD". It looks like ISE depends heavily on the "User-Agent" http attribute for the apple related profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access switches are 3650's. ISE 3.1. Dot1x / MAB overall works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the profile guide suggests doing it through device-sensor. I must be missing something because that only supports cdp, lldp, and dhcp. How do I use device-sensor to get http info, more specifically "User-Agent" attribute? Is it buried in one of the dhcp options? I already have my ISE nodes listed on the SVI as dhcp helpers along with my dhcp server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 18:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785237#M580147</guid>
      <dc:creator>YC2</dc:creator>
      <dc:date>2023-03-01T18:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785297#M580152</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1293469"&gt;@YC2&lt;/a&gt;&amp;nbsp;the&amp;nbsp;&lt;SPAN&gt;User-Agent information that you mention, this is got when the ISE is used in any redirection flow normally with portals , so you can get some feed from http; the device-sensor that you configured should be enough to listed your apple devices , with such feature&amp;nbsp; the information concerning the apple devices&amp;nbsp;&amp;nbsp;will be sent from the&amp;nbsp; NAD to ISE as radius-accounting packets so I might start from there , or in any case use any kind of flow using portals with ISE to get information through http .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For your reference&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#toc-hId-1396030984" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#toc-hId-1396030984&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if that helped you .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 21:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785297#M580152</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2023-03-01T21:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785321#M580156</link>
      <description>&lt;P&gt;Rodrigo - in that very same document, this paragraph below exists:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;RADIUS Probe with Device Sensor&lt;/H4&gt;&lt;P&gt;As explained later in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#DeviceSensor" target="_blank" rel="noopener"&gt;Device Sensor&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section of this guide, Cisco offers the capability to collect HTTP User-Agent and other information using a local classification technology referred to as Device Sensor. This feature makes it possible to collect the User-Agent attribute even when it is not possible through URL Redirection, direct ISE web portal access, or SPAN techniques. This solution offers a much more efficient and scalable approach to endpoint attribute collection and classification and is generally recommended over other methods when the network access devices support this feature for HTTP profiling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know how it's done, or how to set it up, but apparently its possible unless I'm somehow misinterpreting the document.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 22:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785321#M580156</guid>
      <dc:creator>YC2</dc:creator>
      <dc:date>2023-03-01T22:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785409#M580159</link>
      <description>&lt;P&gt;the document is correct, the http probe info however it's going to retrieved depending on the platform from where you are profiling, kindly review if the one you're using is applicable as per the table&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/device-sensor-catalyst-supported-platforms/ta-p/3618782" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/device-sensor-catalyst-supported-platforms/ta-p/3618782&lt;/A&gt;&amp;nbsp;or review the feature itself within the platform NAD documents to verify.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 01:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785409#M580159</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2023-03-02T01:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785413#M580160</link>
      <description>&lt;P&gt;We are using 3650 access switches running 16.12 code. Chart shows "&lt;SPAN&gt;wireless with Cisco AP&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;From 3.6.1; no filter on switch".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No filter on switch... does that mean it's on by default? I'll try to look through the 16.12/3650 docs to see if I can find anything but didn't have luck the first time around. Link below for 3850, which has same result on the chart. Doesn't mention http or user-agent&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/16-12/configuration_guide/sec/b_1612_sec_3850_cg/configuring_device_sensor.html" target="_blank"&gt;Security Configuration Guide, Cisco IOS XE Gibraltar 16.12.x (Catalyst 3850 Switches) - Configuring Device Sensor [Support] - Cisco&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 01:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785413#M580160</guid>
      <dc:creator>YC2</dc:creator>
      <dc:date>2023-03-02T01:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785703#M580167</link>
      <description>&lt;P&gt;I have not looked into the MACOS DHCP Discovery packet, but if it's anything like Microsoft, then you might get a hint. I assume that is where the FreeBSD comes from (since IIRC MACOS has some relation to FreeBSD). Have a look at the device-sensor cache for a MACOS device when the device is using DCHP.&lt;/P&gt;
&lt;P&gt;To refine that profiling a bit, have you tried running an NMAP against the endpoint?&amp;nbsp; Perhaps that will fingerprint the endoint OS a bit better.&lt;/P&gt;
&lt;P&gt;For the Remote Access VPN using ISE as the RADIUS server, then a MACOS endpoint using AnyConnect will provide very detailed information about the OS.&lt;/P&gt;
&lt;P&gt;As the others have already mentioned, the user-agent only comes if you involve ISE and the endpoint in a http conversation. That happens only for ISE guest portals.&lt;/P&gt;
&lt;P&gt;In the case of AD-joined devices, the ISE AD Probe can glean a lot of&amp;nbsp;information. But if the MAC is not AD joined (not sure if that is even possible) then that doesn't help.&lt;/P&gt;
&lt;P&gt;Ha - if the MACOS ran an SNMP agent (unlikely) then you might glean some information there too - but it might only return the SNMP vendor and not the MACOS.&lt;/P&gt;
&lt;P&gt;I think NMAP is worth a shot.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 09:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785703#M580167</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-03-02T09:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785994#M580174</link>
      <description>&lt;P&gt;I’ll try fussing with nmap. Haven’t touched it yet in this implementation. In a past one I vaguely recall having bad experiences with it completely miss-identifying things so I’m a bit hesitant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quoting the doc, “&lt;SPAN&gt;This feature makes it possible to collect the User-Agent attribute even when it is not possible through URL Redirection, direct ISE web portal access, or SPAN techniques.” Someone put that there for a reason…. There must be a way to do it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 14:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4785994#M580174</guid>
      <dc:creator>YC2</dc:creator>
      <dc:date>2023-03-02T14:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4792151#M580408</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1293469"&gt;@YC2&lt;/a&gt;&amp;nbsp; That is mainly for Cisco wireless network devices. Most of Cisco wired switches do not support HTTP attributes in device-sensor or AFAIK.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2023 17:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4792151#M580408</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-03-12T17:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling - "User-agent" - device-sensor</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4792203#M580417</link>
      <description>&lt;P&gt;Then why is 3850 and 3650 on the comparability chart?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just dawned on me… didn’t those switches have a built in wlc at one point? Perhaps it’s referring to when that feature is turned on, not for the wired clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I noticed ise uses option 55 string from the clients to profile some macs. My test mac is on Ventura. I added that string to the MacBook conditions and it’s ok now.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 00:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-quot-user-agent-quot-device-sensor/m-p/4792203#M580417</guid>
      <dc:creator>YC2</dc:creator>
      <dc:date>2023-03-13T00:01:43Z</dc:date>
    </item>
  </channel>
</rss>

