<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advice on Various Ways to Block Endpoints in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5033419#M587898</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Thanks for the guiding questions; I realized that I should have provided more context.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am working at a cybersecurity company, and we want to integrate our product with Cisco ISE using the APIs so we can quarantine endpoints that we determine to be suspicious. Our company as of now doesn’t use Cisco ISE, but many of our customers do.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for sharing the link to the API. I still have questions about the higher-level pros/cons as well as the differences between the various ways of blocking an endpoint (ex: complete block, dACL, VLAN, authentication, ANC quarantine, etc.) In addition, I’m not sure exactly how to block an endpoint on the GUI through some of the ways (ex: blocking via identity groups).&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Mar 2024 08:38:58 GMT</pubDate>
    <dc:creator>emf</dc:creator>
    <dc:date>2024-03-04T08:38:58Z</dc:date>
    <item>
      <title>Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5021328#M587505</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Edit: &lt;/STRONG&gt;Thanks for the guiding questions; I realized that I should have provided more context.&lt;/P&gt;&lt;P&gt;I am working at a cybersecurity company, and we want to integrate our product with Cisco ISE using the APIs so we can quarantine endpoints that we determine to be suspicious. Our company as of now doesn’t use Cisco ISE, but many of our customers do.&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;====================================================================&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Original Post&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;New&lt;/SPAN&gt;&lt;SPAN class=""&gt; to ISE here&lt;/SPAN&gt;&lt;SPAN class=""&gt; and I currently have 3.2 (no patches applied yet)&lt;/SPAN&gt;&lt;SPAN class=""&gt;. &lt;/SPAN&gt;&lt;SPAN class=""&gt;I was &lt;/SPAN&gt;&lt;SPAN class=""&gt;reading through&lt;/SPAN&gt; &lt;SPAN class=""&gt;some of &lt;/SPAN&gt;&lt;SPAN class=""&gt;th&lt;/SPAN&gt;&lt;SPAN class=""&gt;ese&lt;/SPAN&gt;&lt;SPAN class=""&gt; post&lt;/SPAN&gt;&lt;SPAN class=""&gt;s&lt;/SPAN&gt;&lt;SPAN class=""&gt; (&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/how-to-block-a-endpoint-pc-in-cisco-ise-system/td-p/2449185" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;https://community.cisco.com/t5/network-access-control/how-to-block-a-endpoint-pc-in-cisco-ise-system/td-p/2449185&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; and &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/ise-1-2-disable-endpoints-with-certain-mac-address/td-p/2520093" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;https://community.cisco.com/t5/network-access-control/ise-1-2-disable-endpoints-with-certain-mac-address/td-p/2520093&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;)&lt;/SPAN&gt;&lt;SPAN class=""&gt;, and still &lt;/SPAN&gt;&lt;SPAN class=""&gt;h&lt;/SPAN&gt;&lt;SPAN class=""&gt;aven’t&lt;/SPAN&gt; &lt;SPAN class=""&gt;exactly &lt;/SPAN&gt;&lt;SPAN class=""&gt;figured out &lt;/SPAN&gt;&lt;SPAN class=""&gt;the best way &lt;/SPAN&gt;&lt;SPAN class=""&gt;to &lt;/SPAN&gt;&lt;SPAN class=""&gt;block&lt;/SPAN&gt;&lt;SPAN class=""&gt; an endpoint.&lt;/SPAN&gt;&lt;SPAN class=""&gt; Have things changed in the 3.2 release?&lt;/SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So far, I have explored several possibilities.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Directly updating the policy of the endpoint through editing an individual endpoint. (? ISE License)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Adding the endpoint to a static identity group that is blocked from accessing the network. (? ISE License)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;2.1: Directly using the Blocked List endpoint group&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Using ANC to quarantine/shutdown a device. (Advantage License)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Doing something with the blocked list portal. (? License)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;Questions&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Re option 1: directly updating the policy of an endpoint&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;How does one create a policy that would block it from the network if it is possible? (Why doesn’t the authorization profiles from Work Centers &amp;gt; BYOD &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authorization Profiles show up in the policy options?)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Re option 2: blocking via identity groups&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;How do you create a policy for that group?&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;I went on Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authorization &amp;gt; Authorization Profiles&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;And I put access type to ACCESS_REJECT, and used advanced attribute settings to filter out the identity group. Hence, the attribute details became&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Access Type = ACCESS_REJECT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;IdentityGroup = my-blocked-list&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Is this correct?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Does that block things properly?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;How do I filter by identity group when I create a policy set? I don’t see that as an option at all in Conditions Studio even after I added it to the Library conditions.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;In what cases is it advisable to create a custom endpoint group rather than directly use the Blocked List endpoint group (besides that I want to create some granularity between the various blocklists)?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Re option 3: ANC to quarantine/shutdown the device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;What would the main difference be between using ANC to quarantine/shutdown a device vs. putting the device on a blocked list?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Re option 4: Doing something with the blocked list portal.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;The Blocked List Portal says, “To authorize a portal for use, you must create an Authorization profile for it and then reference that profile in a rule in the Authorization policy.” Is there a step-by-step guide on how to do that if this is a good solution / relevant to blocking an endpoint?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;What licenses are required for each of these possibilities? (Given that Group-Based Policy and Profiling require an advantage license, does creating custom identity groups require an advantage license)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Which of these options would be the easiest to do using the ERS API? Which one would be most difficult?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;These are a lot of questions, and thanks so much for offering support!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 08:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5021328#M587505</guid>
      <dc:creator>emf</dc:creator>
      <dc:date>2024-03-04T08:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022007#M587506</link>
      <description>&lt;P&gt;Moved your post to Network Access Control, as its an ISE question, not a Cisco Secure Endpoint question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022007#M587506</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2024-02-21T14:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022012#M587508</link>
      <description>&lt;P&gt;Please apply the latest 3.2 patch.&amp;nbsp; What exactly do you mean by "block"?&amp;nbsp; Deny network access completely?&amp;nbsp; Apply a dACL?&amp;nbsp; Change the VLAN?&amp;nbsp; Something else?&amp;nbsp; During first authentication or after a successful authentication?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022012#M587508</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-21T14:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022665#M587558</link>
      <description>&lt;P&gt;Thanks for your response. &lt;SPAN&gt;I just applied 3.2 patch 5, and&amp;nbsp;&lt;/SPAN&gt;I am very much a newbie here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What are the pros and cons of each of those methods? Don’t they roughly do the same thing? For instance, can’t we deny network access by applying a dACL with a deny policy or putting the device in a quarantine VLAN? What licenses do they require? Which ones are easiest with the Cisco API?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 13:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022665#M587558</guid>
      <dc:creator>emf</dc:creator>
      <dc:date>2024-02-22T13:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022670#M587559</link>
      <description>All of these require essentials. Why would you use the API? Why not use RADIUS policy? I would really suggest working with your Cisco Account SE or your preferred Cisco Partner to assist you with the ISE setup.&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2024 13:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022670#M587559</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-22T13:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022786#M587567</link>
      <description>&lt;P&gt;I don't have a Cisco Account SE or a Cisco Partner. We want to use the API so we can block malicious devices immediately based on our own algorithms, we haven't been using ISE, and are currently using evaluation mode. What is the best way of getting my questions answered? Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022786#M587567</guid>
      <dc:creator>emf</dc:creator>
      <dc:date>2024-02-22T15:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022798#M587570</link>
      <description>Then how did you go about buying ISE?&lt;BR /&gt;&lt;BR /&gt;Cisco Devnet has many fantastic examples and documentation of the ISE API: &lt;A href="https://developer.cisco.com/learning/modules/ise-programmability/01-Intro-Cisco-ISE/introduction-to-cisco-ise/" target="_blank"&gt;https://developer.cisco.com/learning/modules/ise-programmability/01-Intro-Cisco-ISE/introduction-to-cisco-ise/&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5022798#M587570</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-22T15:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5033419#M587898</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks for the guiding questions; I realized that I should have provided more context.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am working at a cybersecurity company, and we want to integrate our product with Cisco ISE using the APIs so we can quarantine endpoints that we determine to be suspicious. Our company as of now doesn’t use Cisco ISE, but many of our customers do.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for sharing the link to the API. I still have questions about the higher-level pros/cons as well as the differences between the various ways of blocking an endpoint (ex: complete block, dACL, VLAN, authentication, ANC quarantine, etc.) In addition, I’m not sure exactly how to block an endpoint on the GUI through some of the ways (ex: blocking via identity groups).&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 08:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5033419#M587898</guid>
      <dc:creator>emf</dc:creator>
      <dc:date>2024-03-04T08:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Advice on Various Ways to Block Endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5033704#M587901</link>
      <description>&lt;P&gt;The right thing for us to do is get you in touch with the proper team at Cisco for inter-product connectivity.&lt;/P&gt;
&lt;P&gt;I’ll send you a DM, and get you in touch with the right person.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 15:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/advice-on-various-ways-to-block-endpoints/m-p/5033704#M587901</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2024-03-04T15:59:37Z</dc:date>
    </item>
  </channel>
</rss>

