<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791246#M580372</link>
    <description>&lt;P&gt;Thanks! Willdo!&lt;/P&gt;</description>
    <pubDate>Fri, 10 Mar 2023 11:57:59 GMT</pubDate>
    <dc:creator>RobKoerts</dc:creator>
    <dc:date>2023-03-10T11:57:59Z</dc:date>
    <item>
      <title>Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/3872935#M472262</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have question regarding of MAC address spoofing vulnerability, of already authenticated clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lest say in my deployment I have, Cisco ISE and Cisco Cat2960X switches, and clients are authenticated by 802.1X EAP-TLS. And periodic re-authentication is set to 1 hour.&amp;nbsp; Client is connected and authenticated successfully, after authentication someone spoof it MAC address, disconnect legitimate client and connect PC with spoofed MAC, which is MAC of already authenticated PC. (Port don't go down, because PC was connected over IP Phone, or there was HUB...) Does attacker PC have access to Network ? Does Cisco ISE or Cat2960X switches have protection again this king of attacks ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or does 802.1X have protection from this king of attacks ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 08:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/3872935#M472262</guid>
      <dc:creator>newmanf</dc:creator>
      <dc:date>2019-06-14T08:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/3873047#M472263</link>
      <description>Are your interfaces configured to support flexauth? If you only have 8021x enabled on your interfaces with no mab then there should not be an issue unless the attacker PC has a certificate to use for 8021x that ISE trusts and vice versa. What I mean by that is ISE would have to have the attacker chain in its trust store and the attacker PC would have to have the ISE chain in its trust store. There are several ways ISE can aide in deterring this type of attack. To name a few:&lt;BR /&gt;You can enable anomalous endpoint detection. Basically once ISE detects a change based on certain attributes it can force a CoA to shut the port down or quarantine the host. See &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html&lt;/A&gt;&lt;BR /&gt;You can rely on your ISE policies that you build out. What I mean by this is you can utilize conditions such as AD security groups, which would mean the host would have to be a member of AD. Or you could even simply rely on endpoint groups within ISE. However, with that you would need to enable mab.&lt;BR /&gt;You could rely on profiling and using certain attributes such as AD-Host-Exists equals true, or if the hostname obtained contains a certain string. See &lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;And to answer this: Client is connected and authenticated successfully, after authentication someone spoof it MAC address, disconnect legitimate client and connect PC with spoofed MAC, which is MAC of already authenticated PC.&lt;BR /&gt;Unplug and re-connect bounces the port therefore forcing a new authentication session.&lt;BR /&gt;&lt;BR /&gt;HTH!</description>
      <pubDate>Fri, 14 Jun 2019 12:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/3873047#M472263</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-06-14T12:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791232#M580368</link>
      <description>&lt;P&gt;What about this scenario?&lt;/P&gt;
&lt;P&gt;The hacker removes the legitimate supplicant from the switch-interface, identifies its MAC-address, adds a simple switch or HUB to the switch-interface and reconnects the legitimate supplicant. Due tot the disconnect, the 802.1X authentication and authorization starts and the valid supplicant is authenticated once more. The hacker then spoofs the MAC-address on a malicious device, adds this device to the simple switch/HUB and removes the legitimate supplicant. &lt;/P&gt;
&lt;P&gt;This way, the switch-interface will not detect an interface change (down/up) and will not register a new MAC-address. This probably means that it will not attempt to re-authenticate. Does this mean the malicious device now has access to the network?&lt;/P&gt;
&lt;P&gt;Periodic re-authentication on the switch-interface can counter this behavior of course, and proper monitoring should recognize the behavior as malicious. But will this work? &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 11:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791232#M580368</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-10T11:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791233#M580369</link>
      <description>&lt;P&gt;Resurrecting a 2-year old + thread that has an accepted solution limits the number of people that will take a look at it. The best thing to do is to start a new thread.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 11:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791233#M580369</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2023-03-10T11:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE with 802.1X EAP-TLS, MAC Spoofing Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791246#M580372</link>
      <description>&lt;P&gt;Thanks! Willdo!&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 11:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-with-802-1x-eap-tls-mac-spoofing-problem/m-p/4791246#M580372</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-10T11:57:59Z</dc:date>
    </item>
  </channel>
</rss>

