<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Profile Transitions and the use of Exception Actions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5259533#M594923</link>
    <description>&lt;H3 id="toc-hId--757305094" data-start="2014" data-end="2063"&gt;&lt;STRONG data-start="2018" data-end="2061"&gt;Expected Behavior vs. Observed Behavior&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="2064" data-end="2369"&gt;
&lt;LI data-start="2064" data-end="2236"&gt;&lt;STRONG data-start="2066" data-end="2082"&gt;Expectation:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Anomalous behavior detection should have triggered due to the mismatch in endpoint attributes (e.g., OS fingerprinting, device type, SNMP details).&lt;/LI&gt;
&lt;LI data-start="2237" data-end="2369"&gt;&lt;STRONG data-start="2239" data-end="2255"&gt;Observation:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ISE permitted access to the spoofed MAC laptop endpoint&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 id="toc-hId-1730207739" data-start="2371" data-end="2404"&gt;&lt;STRONG data-start="2375" data-end="2402"&gt;Seeking Community Input&lt;/STRONG&gt;&lt;/H3&gt;
&lt;OL data-start="2405" data-end="2758"&gt;
&lt;LI data-start="2405" data-end="2513"&gt;Is there a way to enforce profiling-based validation beyond MAC address to mitigate spoofing risks?&lt;/LI&gt;
&lt;LI data-start="2514" data-end="2654"&gt;Can Anomalous Behavior Detection (ABD) be fine-tuned to detect attribute mismatches (e.g., OS, SNMP, hostname inconsistencies)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-start="2760" data-end="2871"&gt;Any guidance on remediating MAC spoofing risks within ISE profiling policies would be highly appreciated.&lt;BR /&gt;Shall we enable CoA as reauth OR make Anomalous Endpoint Detection Enforcement by creating rule as mentioned in link&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/200973-configure-anomalous-endpoint-detection-a.html#anc9" target="_blank" rel="nofollow noopener noreferrer"&gt;Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco&lt;/A&gt;&lt;BR /&gt;But for&amp;nbsp;Enforcement at least it should flag as&amp;nbsp;Anomalous Endpoint which is not happening in my case.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 07:41:28 GMT</pubDate>
    <dc:creator>jitendrac</dc:creator>
    <dc:date>2025-02-12T07:41:28Z</dc:date>
    <item>
      <title>Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5197884#M591940</link>
      <description>&lt;P&gt;How to avoid mac spoofing in MAB using Profiling&amp;nbsp;Transitions and the use of Exception Actions&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have ISE 3.3 Patch 3 deployed for one of our customer. For wired printer we are using MAB. For authentication and authorization, we are using the profiling service of PSN. Below is the policy set created&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Policy Set Name - IL-Wired-MAB&lt;/LI&gt;
&lt;LI&gt;Condition – Default Wired_MAB&lt;/LI&gt;
&lt;LI&gt;Authentication Policy - IL-MAB&lt;/LI&gt;
&lt;LI&gt;Condition – Default Wired_MAB&lt;/LI&gt;
&lt;LI&gt;if User Not Found – CONTINUE&lt;/LI&gt;
&lt;LI&gt;if Process Fail – DROP)Use Internal Endpoints&lt;/LI&gt;
&lt;LI&gt;(if Auth Fail – CONTINUE&lt;/LI&gt;
&lt;LI&gt;Authorization Policy - Printer MAB&lt;/LI&gt;
&lt;LI&gt;Condition – End Points Logical Profile EQUALS Printer&lt;/LI&gt;
&lt;LI&gt;Authorization Profiles – IL_Printer (Printer Vlan)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We can see ISE PSN has successfully profiled some printer with Canon Device (CF=10) &amp;nbsp;and some printer with Canon &amp;nbsp;Printer (CF=40)&lt;/P&gt;
&lt;P&gt;However, when we connect the laptop to the printer port, with a MAC address spoof. Laptop gets successfully authenticated and authorised with Canon Device profile. (OUI Match)&lt;/P&gt;
&lt;P&gt;When we looked at the Canon Devie profile, it just matching the OUI of the MAC Address.&lt;/P&gt;
&lt;P&gt;PSN is has following probes enabled&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;RADIUS&lt;/LI&gt;
&lt;LI&gt;DHCP&lt;/LI&gt;
&lt;LI&gt;HTTP&lt;/LI&gt;
&lt;LI&gt;DNS&lt;/LI&gt;
&lt;LI&gt;AD&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We are not using device sensor as Cisco C1000 is not supporting Device Sensor Feature.&lt;/P&gt;
&lt;P&gt;RADIUS is not of use as the Printer does not support 802.1x. DHCP is not of use as the printer has an IP address statically configured.&lt;/P&gt;
&lt;P&gt;Is there any way I can stop MAC Address spoofing method to bypass ISE NAC solution.&lt;/P&gt;
&lt;P&gt;I read about Profile Transitions and the use of Exception Actions to restrict&lt;/P&gt;
&lt;P&gt;Where we can take action with new device profile learned on printer port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;But I'm not sure how to configure it. Can anyone suggest to me how to restrict unauthorised access to wired printer using Profile Transition and Exception&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 02:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5197884#M591940</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-24T02:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5197914#M591941</link>
      <description>&lt;P&gt;This not relate to ISE I think&lt;/P&gt;
&lt;P&gt;The port with single host allow only one Mac in data domain, here I think your SW use multi host and hence more than Mac allow in port.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 04:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5197914#M591941</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-24T04:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198205#M591946</link>
      <description>&lt;P&gt;I think you are referring to ISE Anomalous Behaviour Detection and Enforcement. However, based on what you described probably Anomalous Behaviour wouldn't help in this case because if the printers profile looks only at the OUI of the MAC address then it will be less likely a profile change would happen when the spoofed MAC address is connected.&lt;/P&gt;
&lt;P&gt;Also, the fact the the printer and the spoofing laptop are connected in the same way to the network that will also make Anomalous Behaviour feature less effective. Finally,&amp;nbsp; if the spoofing laptop is also statically assigned an IP, then Anomalous Behaviour feature won't be able to trigger any flag on this as both the printers and the spoofing laptop have same characteristics.&lt;/P&gt;
&lt;P&gt;What I think you can do though would be to open up the printer endpoint attributes page in ISE, try to look at all the collected attributes, and then you can go and edit Canon profiling policy by adding some of those attributes that would be unique to the printers.&lt;/P&gt;
&lt;P&gt;In that case when the spoofing laptop tries to impersonate the printer it won't be "in theory" able to match all the profile conditions, and accordingly it won't be profiled as a printer, although it does have the same MAC address as the printer.&lt;/P&gt;
&lt;P&gt;ISE profiling policies work with the certainty levels, so if the profile has a single condition then there is no way to try to build up any increment to the certainty level. However, if the profile has three conditions, then you can configure it in a way to sum up the conditions values to the certainty level. For instance, you can configure the profile to have a certainty level of 30 and have three conditions, one will be the OUI with a value of 10, another something else (an attribute from the endpoint attributes page) with a value of 10, and the third with something else (an attribute from the endpoint attributes page) with a value of 10. In this case all three conditions must match before a device is profiles with that profile.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 15:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198205#M591946</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-24T15:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198287#M591957</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;
&lt;P&gt;Thanks for your response. When i read&amp;nbsp;ise-profiling-design-guide. I came to know the concept of&amp;nbsp;Profile Transitions and&amp;nbsp;Exception Actions.&lt;BR /&gt;It is mentioned as " it is possible that an endpoint will transition from an Unknown profile to a specific profile (for example, Apple-iPad). The transition may occur in one update, but often the transition occurs in steps as new profile data is acquired from the network (for example, from Unknown to Apple-Device, and then from Apple-Device to Apple-iDevice, and finally to Apple-iPad). Although not as common, it is also possible for “negative” profiling data to be received for an endpoint that results in a transition from a more-specific profile to a less-specific parent profile, &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;or a completely different profile altogether.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; &lt;SPAN&gt;Regardless of the type of profile transition, &lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;a profile change may impact the Authorization Policy rule matched when the endpoint re-authenticates to the network&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&amp;nbsp;&lt;/SPAN&gt;"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Exception Actions&lt;BR /&gt;Exception Actions are the means by which ISE Profiling Services trigger a response to a &lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;profiling event or state change.&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;Now,&lt;/P&gt;
&lt;P&gt;What I understood is that when the MAC address is already profiled as Canon- Device with just OUI filed (CF=10) by PSN and when&amp;nbsp;spoofing laptops is&lt;SPAN&gt;&amp;nbsp;connected. Profiling should change from Canon- Device to Windows 11 workstation because Windows workstation will generate a lot of packets related to RADIUS, DNS, and DHCP that PSN can capture to know that the profile has transitioned from Canon- Device to Windows 11 workstation. And now, when ISE observes a profile change, we can take action using Exception. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In exception Action we can apply different profile and for that profile we can set restricted access in authorization policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;Is my understanding correct ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198287#M591957</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-24T17:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198390#M591967</link>
      <description>&lt;P&gt;We need to remind ourselves that MAB is inherently non-secure. In other words, as its acronym &lt;EM&gt;MAB&lt;/EM&gt; suggests, it's &lt;STRONG&gt;bypassing&lt;/STRONG&gt; secure authentication. MAC spoofing is easy, as you've already discovered. But here are some tips:&lt;/P&gt;
&lt;P&gt;Use DHCP instead of static IPs. Come one. Really, Static IPs are so 1980's and there is no benefit to using them (don't let people convince you that DHCP is problematic - people who say that are either lazy or don't understand how to setup DHCP) - static IPv4 makes more work and causes more issues down the road. Setting up a DHCP server (even on a Cisco router if you have to) is so simple. A bit of effort and some planning can help a lot. The benefit of DHCP is that printers (or devices in general) send a lot of valuable data in the Discovery packet. That is a great start for profiling. It's NOT security, but it's a profiling aid.&lt;/P&gt;
&lt;P&gt;If you're stuck with static IPs then the next best thing for printers is enabling SNMP probing from ISE. But it must be SNMPv1/2 (not v3). This should be easily done, and it will give ISE sysObjectID, or sysDescr etc to make profiling more accurate. Yes of course the hacker can spoof an SNMP agent - see my initial point about MAB being "no security at all". Where there's a will, there's a way!&lt;/P&gt;
&lt;P&gt;Finaly, if you want security, there is only one option. Put a cert on the printer and make it talk 802.1X EAP-TLS. Even my $50 Canon home printer from the supermarket supports this. Put a 5 year cert on there if you have to. The point being, that's going to be super hard to spoof an RSA cert with 2048 bit key length (at least).&lt;/P&gt;
&lt;P&gt;Security doesn't come easy. Some hard work will be involved. My suggestion would be to start with DHCP and SNMP which will make profiling quite accurate and make spoofing harder.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 20:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198390#M591967</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-24T20:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198846#M591982</link>
      <description>&lt;P&gt;Thanks, Arne, for your Response,&lt;BR /&gt;&lt;BR /&gt;We will try to push the customer to use DHCP. Or at least allow PSN to do Active Probes like NMAP scan or SNMP Query.&lt;BR /&gt;However, I was wondering why I can't use ISE's&amp;nbsp;Profile Transitions and&amp;nbsp;Exception Actions feature to detect Spoof MAC.&amp;nbsp;&lt;BR /&gt;If attacker spoof MAC of printer and connect on same printer port at that point Attacker Laptop/Machine will start generating some interstating traffic like DNS, HTTP. ISE PSN can now detect that same MAC address profile is now transition from canon-printer to windows workstation so let's take an action on this behaviour using&amp;nbsp;User-Defined OR System Defined Exception Action where we can apply different Profile Policy OR Initiate COA to bounce the port. (As per document it is mentioned that&amp;nbsp;&lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;Exception Actions are the means by which ISE Profiling Services trigger a response to a profiling event or state change&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;.)&lt;BR /&gt;I am just trying to understand if this will work to detect Spoof MAC ?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 13:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198846#M591982</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-25T13:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198853#M591984</link>
      <description>&lt;P&gt;Hi Aref,&lt;BR /&gt;I think&amp;nbsp;Cisco ISE Anomalous Behavior Detection should work.&lt;BR /&gt;I just watched this video and as per this&amp;nbsp;Cisco ISE Anomalous Behavior Detection can detect MAC Spoof OR Profile Change&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=OP1BGzTGWJw" target="_blank"&gt;https://www.youtube.com/watch?v=OP1BGzTGWJw&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 14:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198853#M591984</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-25T14:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198857#M591985</link>
      <description>&lt;P&gt;You are welcome. It depends on the other profile config. For instance, if Windows workstation profile is configured with multiple conditions, but all of them rely on DHCP traffic then that profile won't be matching the traffic coming from the spoofing laptop because it is assigned an IP statically, so no DHCP traffic will be sent from that laptop. And because of this, there will be no profile or profiling state change from ISE point of view. Also, in a scenario where ISE would have two profiles and both of them would match, I think in that case the profile with the higher certainty level will take precedence. For instance, if Windows profile matches the traffic coming from the spoofing laptop, and that profile happens to have a certainty level higher than Canon profile then the spoofing laptop would be profiled as a Windows workstation. The change of behaviour that would be used by ISE Anomalous behaviour would apply on an endpoint that came to ISE as something, and then it now came as another thing. For instance, if the Canon printer was configured in DHCP and was profiled as a Canon printer, and then the spoofing laptop tried to impersonate it then yes that would be detected by ISE because in this case the MAC address would be the same, but the DHCP attributes and collected data from DHCP traffic would be totally different.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 14:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198857#M591985</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-25T14:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198913#M591990</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"" MAC Address spoofing""are you sure??&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Did you check mac address in SW do you see one Mac or two connect to port&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 16:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5198913#M591990</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-25T16:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199002#M591993</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;the question is not about two concurrent MAC addresses on the port, but rather, two different devices, each connected on-at-a-time, but also having the same MAC address - the bad actor takes the MAC address of a valid device to try to get access to the network.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;&amp;nbsp; ISE Anomaly detection does work as Hari's video shows, but it does rely on the clients using DHCP, because that is how ISE can tell a Windows OS from a Linux OS (for example) - it uses the DHCP client identifier data. It's not very clear what other mechanisms Anomaly Detection uses to do its job, but I have a customer who has thousands of anomalies, and when I investigate them, ISE says it was due to Windows 10 =&amp;gt; Windows 10.&amp;nbsp; Makes no sense.&lt;/P&gt;
&lt;P&gt;I have seen another legitimate case of Polycom desk phones that boot up using a Microsoft IP stack (sends out DHCP with client-identifier = MSFT), initialise themselves and then few seconds later sends out another DHCP identifying itself as Polycom.&amp;nbsp; In my opinion that is just bad implementation of that vendor product, but the reality is that ISE detected that as anomalous and would take action on that legitimate device, if I had enabled Enforcement. But I never enabled Enforcement because of false positives. Which basically renders this feature useless to me - sadly. I don't think Cisco has made enough fanfare about this feature and they have not explained it well enough, or given us enough parameters to tune. Hari's video makes it look so appealing and simple, but the reality is quite different.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 20:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199002#M591993</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-25T20:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199611#M592013</link>
      <description>&lt;P&gt;&lt;SPAN&gt;the bad actor takes the MAC address of a valid device to try to get access to the network. &amp;lt;&amp;lt;- this point I want to be sure about' is SW see one MAC or two&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 19:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199611#M592013</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-26T19:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199625#M592015</link>
      <description>&lt;P&gt;The switch sees one MAC address because only one device is attached to the switch. If the bad actor uses a Windows OS, they can modify the MAC address to be whatever you want it to be. Usually, bad actors will use a Linux based OS which can do the same thing. The Ethernet frame that is sent out of the bad actor's network adapter will have a customised source MAC address. This is what is called MAC spoofing. And obviously the bad actor removes the genuine device from the network, and plugs their own modified device into the network, masquerading as the good devices. 1 MAC address.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 20:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199625#M592015</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-26T20:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199627#M592016</link>
      <description>&lt;P&gt;I need confirming from him'&lt;/P&gt;
&lt;P&gt;He mention ISE see same Mac but never check SW.&lt;/P&gt;
&lt;P&gt;It can simple issue with simple solution&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 21:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199627#M592016</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-26T21:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199720#M592030</link>
      <description>&lt;P&gt;Hi MHM Cisco World&lt;BR /&gt;I am referring to scenario as mentioned by Arne "bad actor removes the genuine device from the network, and plugs their own modified device into the network, masquerading as the good devices MAC"&amp;nbsp;&lt;BR /&gt;Of course Switch has lots of Port Security feature to avoid/Stop MAC spoofing but i an referring&amp;nbsp;bad actor removes the genuine device from the network, and plugs their own modified device into the network, masquerading as the good devices MAC&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 02:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199720#M592030</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-27T02:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199832#M592038</link>
      <description>&lt;P&gt;Still search but some point I get want to share it here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Device sensor not available' so ISE use Mac in radius to get OUI that why both endpoints have same OUI (assuming laptop use same mac of printer).&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 09:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5199832#M592038</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-27T09:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200166#M592059</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;you're barking up the wrong tree mate. I don't know what part of this you don't understand. MAC spoofing is the most basic thing in the world. Your last question about "why both endpoints have same OUI ?" - obviously they'd have the same OUI if the first three bytes of the MAC address is the same - that's what defines the OUI. And MAC address spoofing has nothing to do with device sensor. The switch is not aware that MAC spoofing is going. on.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The original question from&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;was about how to handle the detection of such events, and we answered that already - ISE Anomalous Detection. And this only works if DHCP is involved, since ISE has profiled the MAC address using DHCP as being a Windows PC, and then next time it sees the same MAC address it's a Linux OS. That triggers anomalous detection and a Global Exception in ISE can do stuff to that - watch the YouTube video for an example. I maintain, that this is still flawed, because you can't assume that DHCP is always involved. And Anomalous Detection (in my experience) has flaws (false positives) and the mechanisms used for detection and comparison are not well enough documented. Perhaps the solution lies elsewhere - e.g. using NetFlow record analysis to detect anomalous behaviours - send your client interface NetFlow records to a clever system that can detect the anomalies, and then have that system integrate with ISE pxGrid to quarantine the interface. That would be harder and more expensive, but most likely have better outcomes.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 20:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200166#M592059</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-27T20:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200459#M592072</link>
      <description>&lt;P&gt;We did some testing in the environment&lt;/P&gt;
&lt;P&gt;Here is the result of testing&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The printer is on the network&lt;/LI&gt;
&lt;LI&gt;ISE learns the profile of the printer we get "canon-device" in Matched Policy and&amp;nbsp;End Point Policy in Context Visibility.&lt;/LI&gt;
&lt;LI&gt;We spoof the MAC address of the printer assigned to the laptop, remove the printer, and connect the computer to the printer switch port.&lt;/LI&gt;
&lt;LI&gt;We get access to a network.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This is the problem we are discussing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, I do not get access to the network if I delete the MAC address from context visibility when connecting the same laptop with a spoof MAC address. This time, Context Visibility shows&amp;nbsp;Windows11-Workstation as Matched Policy and&amp;nbsp;End Point Policy.&lt;/P&gt;
&lt;P&gt;This indicates if the MAC address is already profiled and if a new device with the same MAC address comes with a different expected profile. ISE does not change the old profile OR override that old profile with a new one.&lt;/P&gt;
&lt;P&gt;This looks like my&amp;nbsp;Endpoint Profile Change feature is not working as expected. Maybe I am missing some configuration.&lt;/P&gt;
&lt;P&gt;I want to understand following. Let me know if there are any documentation or Cisco Live Webinar that are covering this topic&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;When ISE populates the Context Visibility First Time - Does its populate As soon as Profile matched with CF Score OR will it wait for certain duration till it do not see other Profile coming on same port with same MAC but more CF score ?&lt;/LI&gt;
&lt;LI&gt;What if 2 different profile with same CF matched ? Which one ISE will take as final to mentioned in Context Visibility ?&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Where to define Exception Action ? Do we have to configure&amp;nbsp;Exception Action in already learned Profile ?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Sep 2024 04:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200459#M592072</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-09-29T04:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200552#M592074</link>
      <description>&lt;P&gt;the Printer use below attributes&amp;nbsp;&lt;BR /&gt;-OUI &amp;lt;&amp;lt;- since ISE use mac to get OUI and mac is same then this useless&amp;nbsp;&lt;BR /&gt;-DHCP Class Id &amp;lt;&amp;lt;- this sure you can use it via ip dhcp relay&amp;nbsp;&lt;BR /&gt;-SNMP DeviceDescr &amp;lt;&amp;lt;- you dont have sensor so you can use it&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (176).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230211i1567161CD73DE184/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (176).png" alt="Screenshot (176).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Sep 2024 12:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5200552#M592074</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-29T12:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5201601#M592099</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;However, I do not get access to the network if I delete the MAC address from context visibility when connecting the same laptop with a spoof MAC address. This time, Context Visibility shows&amp;nbsp;Windows11-Workstation as Matched Policy and&amp;nbsp;End Point Policy.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Still with a static IP assigned to that spoofing laptop? if so, that shouldn't happen as the spoofed OUI belongs to Canon. However, if you open up the spoofing laptop page on ISE and you go to the attributes page it should show you all the attributes collected and from there you can see how and why the laptop was profiled as a Windows 11 workstation. If there are two profiles matching an endpoint, the one with the higher certainty will be applied, and if an endpoint was already profiled as something, ISE won't change its profile unless a higher certainty is hit from another profile.&lt;/P&gt;
&lt;P&gt;Also, please take a look at this guide focused on ISE profiling:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456" target="_blank" rel="noopener"&gt;ISE Profiling Design Guide - Cisco Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 09:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5201601#M592099</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-01T09:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Profile Transitions and the use of Exception Actions</title>
      <link>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5201611#M592101</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;MHM ,&lt;/P&gt;
&lt;P&gt;I will check if the customer can allow us to use NMAP scan and SNMP query on the endpoint&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 09:52:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profile-transitions-and-the-use-of-exception-actions/m-p/5201611#M592101</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-10-01T09:52:38Z</dc:date>
    </item>
  </channel>
</rss>

