<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help Understanding Context Visibility in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909023#M583551</link>
    <description>&lt;P&gt;I checked a sample of network devices and neither of them are configured for SNMP. Additionally, I do not have SNMP probes enabled.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 12:56:52 GMT</pubDate>
    <dc:creator>DannyDulin</dc:creator>
    <dc:date>2023-08-21T12:56:52Z</dc:date>
    <item>
      <title>Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906573#M583466</link>
      <description>&lt;P&gt;Hello everyone.&lt;/P&gt;&lt;P&gt;We are using ISE version 3.1.0.518.&lt;/P&gt;&lt;P&gt;When I take a look at Context Visibility/Endpoint Classification is see over 900 endpoints that ISE sees.&lt;/P&gt;&lt;P&gt;I have created a profile policy that groups endpoints that are joined to our AD domain. I purge all the rest of the endpoints. However, they keep coming back. Within a day or so, the total endpoints grow to over 900 endpoints.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I don't have over 900 endpoints authenticating through ISE, why are these endpoints keep coming back?&lt;BR /&gt;&lt;BR /&gt;I've even deleted endpoints that are categorized as Unknown, buth these still keep coming back.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I permanently remove these endpoints that are most likely stale.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 19:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906573#M583466</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-16T19:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906645#M583467</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236548"&gt;@DannyDulin&lt;/a&gt; are these random MAC addresses? (these change everytime). &lt;A href="https://community.cisco.com/t5/security-knowledge-base/random-mac-address-how-to-deal-with-it-using-ise/ta-p/4049321" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/random-mac-address-how-to-deal-with-it-using-ise/ta-p/4049321&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Typically you'd create a purge schedule to clear down these endpoints at regular intervals.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 20:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906645#M583467</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-08-16T20:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906951#M583479</link>
      <description>&lt;P&gt;What are your use-cases for ISE?&amp;nbsp; Wireless?&amp;nbsp; Do you have guest wireless deployed on ISE?&amp;nbsp; What NADs are these MAC addresses showing connected to?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 10:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4906951#M583479</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-17T10:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907495#M583496</link>
      <description>&lt;P&gt;In addition to what Rob and Adam have said, are you using Profiling and perhaps also running regular SNMP queries against your NAD devices (SNMP configured in the ISE Network Devices definitions)?&amp;nbsp; I have noticed that when I do that, ISE gets a dump of all the MAC addresses of switches, whether those MAC addresses are subject to NAC or not - it's a useful discovery method, but it can also pollute the Context Visibility.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 22:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907495#M583496</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-08-17T22:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907821#M583506</link>
      <description>&lt;P&gt;The immediate use case 3 years ago was to upgrade from ACS -&amp;gt; ISE for VPN and Wireless AAA with the eye on leveraging posturing and profiling.&lt;/P&gt;&lt;P&gt;Good question whether we have Guest Wireless deployed on ISE. I do not think so, but that's something I'll verify.&lt;BR /&gt;&lt;BR /&gt;Another good question NADs MACs are connected to. What would be the relevance here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 13:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907821#M583506</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-18T13:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907822#M583507</link>
      <description>&lt;P&gt;Good question are they random? I'll start to keep track to determine. Thank you for the link.&lt;/P&gt;&lt;P&gt;I have the default purge rules in play. Any tips on best practices for tis.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 13:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907822#M583507</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-18T13:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907823#M583508</link>
      <description>&lt;P&gt;Good question Arne. It's quite possible. I'll check that too.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 13:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4907823#M583508</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-18T13:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909023#M583551</link>
      <description>&lt;P&gt;I checked a sample of network devices and neither of them are configured for SNMP. Additionally, I do not have SNMP probes enabled.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 12:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909023#M583551</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-21T12:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909031#M583552</link>
      <description>&lt;P&gt;Rob, I did an export of all the endpoints. It appears that there are many duplications of endpoints, with different MAC addresses. There are duplicate hostnames with different MAC addresses. There are duplicate endpoint email addresses with different MAC addresses. There are duplicate endpoint IP addresses with different MAC addresses.&lt;/P&gt;&lt;P&gt;I also noticed that 2/3 of the endpoints ISE PAN 1 is the Endpoint Profile Server and 1/3 use IS PAN 2. Is this correct.&lt;/P&gt;&lt;P&gt;How do I know which is the right instance of an enpoint to purge?&lt;/P&gt;&lt;P&gt;This seems much more complex than I first expected.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 13:05:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909031#M583552</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-21T13:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909034#M583553</link>
      <description>So are these wireless MACs then? On a guest network? What NAD are they connected to?&lt;BR /&gt;&lt;BR /&gt;Do you use the DHCP probe?&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Aug 2023 13:09:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909034#M583553</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-21T13:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909036#M583554</link>
      <description>&lt;P&gt;Are these wireless MACs? - Mixed. As you know typically remote users are wireless who connect to our network via VPN and the NAD for those endpoints is our ASA. I should point out that VPN users are authenticated via Duo SSO and Authorized by ISE.&lt;/P&gt;&lt;P&gt;On prem users connect via Wired and Wireless. We are only authenticating the Wireless users via ISE and the NAD is WLC.&lt;/P&gt;&lt;P&gt;We are not utilizing ISE for Wired.&lt;BR /&gt;&lt;BR /&gt;The DHCP probe is being used.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 13:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909036#M583554</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-21T13:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909044#M583555</link>
      <description>&lt;P&gt;So if you take one of these "unknown" MACs what is it connected to?&amp;nbsp; The ASA VPN?&amp;nbsp; Wireless?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you use ISE for guest wireless?&amp;nbsp; WLC?&amp;nbsp; AireOS or 9800?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 13:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909044#M583555</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-21T13:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909154#M583561</link>
      <description>&lt;P&gt;Connected to both ASA VPN and WLC.&lt;/P&gt;&lt;P&gt;We are not using ISE for guest wireless.&lt;/P&gt;&lt;P&gt;The WLC is 5500.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909154#M583561</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-21T16:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909160#M583562</link>
      <description>&lt;P&gt;So are those MAC addresses actual clients properly authenticating to your network?&amp;nbsp; Do you have a matching Live Log entry for these MAC addresses?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909160#M583562</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-21T16:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909177#M583563</link>
      <description>&lt;P&gt;I ran a RADIUS authentications report for the last 3 weeks. Approximately 300 endpoints that have authenticated in this time frame match the overall inventory list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909177#M583563</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-21T16:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909186#M583564</link>
      <description>&lt;P&gt;Got it, then this is normal.&amp;nbsp; When an authentication occurs ISE adds the MAC address into the Context Visibility database to give you an view of all of the endpoints which authenticate against ISE.&amp;nbsp; If you wish to remove old entries you can use endpoint purge rules.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_maintain_monitor.html#:~:text=Endpoints%20Purge%20Settings,-You%20can%20define&amp;amp;text=You%20can%20choose%20not%20to,are%20older%20than%2030%20days" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_maintain_monitor.html#:~:text=Endpoints%20Purge%20Settings,-You%20can%20define&amp;amp;text=You%20can%20choose%20not%20to,are%20older%20than%2030%20days&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 17:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909186#M583564</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-21T17:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909953#M583578</link>
      <description>&lt;P&gt;Thank you for the info.&lt;/P&gt;&lt;P&gt;I created a schedule to purge inactive devices. Last night 1004 inactive devices were purged. This morning when I checked Contex Visibility there were 594 endpoints.&lt;BR /&gt;&lt;BR /&gt;I sorted those on endpoints that were connected and there were only 49. I compared that to Live Sessions, which had 50 connected endpoints, and only 5 MAC addresses matched between the two. A mixture of VPN connected devices and Wireless.&lt;/P&gt;&lt;P&gt;At this point, it seems best to turn off all the probes, purge all the endpoints until the database is clear and start adding probes one at a time in order to get useful data.&lt;/P&gt;&lt;P&gt;What do you think about this course of action?&lt;/P&gt;&lt;P&gt;I just don't know why Context Visisbility&amp;gt;Endpoints continues to grow in the several hundreds when I'm certain not that many devices are connecting.&lt;/P&gt;&lt;P&gt;We are a 2 node deployment in HA and Policy Services is enabled on both Nodes.&lt;/P&gt;&lt;P&gt;At present, I have the following probes enabled:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DHCP - with relay sent to ISE&lt;/LI&gt;&lt;LI&gt;RADIUS - We are not doing any wired authentication. This is only for Wireless and VPN&lt;/LI&gt;&lt;LI&gt;NMAP&lt;/LI&gt;&lt;LI&gt;DNS&lt;/LI&gt;&lt;LI&gt;Active Directory&lt;/LI&gt;&lt;LI&gt;pxGrid&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 13:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909953#M583578</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-22T13:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909962#M583579</link>
      <description>So those hundreds of other MACs, where are they connected? What do you show in the details page for these? &lt;BR /&gt;&lt;BR /&gt;Are you using profiling at all? Do you have authz policies that rely on profiling? Do you use pxGrid? &lt;BR /&gt;&lt;BR /&gt;Are your non-wireless or VPN NADs (and their associated SVIs) forwarding DHCP packets to ISE? You should only bother relaying from the wireless and VPN networks to match only the NADs that ISE will actually authenticate.&lt;BR /&gt;&lt;BR /&gt;I would recommend disabling the NMAP probe.&lt;BR /&gt;</description>
      <pubDate>Tue, 22 Aug 2023 13:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909962#M583579</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-22T13:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909972#M583582</link>
      <description>&lt;P&gt;Thanks for bearing with me.&lt;/P&gt;&lt;P&gt;Those hundreds of other MACs are not connected to anything. If I filter in Context Visbility on "connected" the list reduces from several hundred to 30-50 endpoints. Additionally, Live logs only lists about 50-70 sessions.&lt;/P&gt;&lt;P&gt;We are not using profiling yet. We're trying to get there, but I'm not comfortable to relying on profiling for authz policies yet.&lt;BR /&gt;&lt;BR /&gt;Don't have any use for pxGrid at this time.&lt;/P&gt;&lt;P&gt;The non-wireless NADs are forwarding DHCP packets to ISE. VPN NAD is not using DHCP rather IP pools.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regarding this statement "You should only bother relaying from the wireless and VPN networks to match only the NADs that ISE will actually authenticate."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This makes sense now that we're seeing so many duplicate endpoints with different MACs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Disabling PxGrid and NMAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is it a problem having Policy Services enabled on both Nodes?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 13:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909972#M583582</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-08-22T13:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Help Understanding Context Visibility</title>
      <link>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909989#M583584</link>
      <description>Policy Services is the PSN role for RADIUS, this must be enabled for ISE to process RADIUS.&lt;BR /&gt;</description>
      <pubDate>Tue, 22 Aug 2023 14:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-understanding-context-visibility/m-p/4909989#M583584</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-08-22T14:11:05Z</dc:date>
    </item>
  </channel>
</rss>

