<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block Kali-Linux using Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280507#M595925</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;. Thanks for the response. I understand that this can be achieved by profiling.Any idea on this can be achieved specifically for Kali-Linux?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Apr 2025 08:50:44 GMT</pubDate>
    <dc:creator>anonymus1</dc:creator>
    <dc:date>2025-04-11T08:50:44Z</dc:date>
    <item>
      <title>Block Kali-Linux using Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280418#M595921</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We’ve recently implemented Cisco ISE in our environment and are now looking to enhance our network security by blocking all &lt;STRONG data-start="276" data-end="290"&gt;Kali Linux&lt;/STRONG&gt; systems from gaining access to the network.&lt;/P&gt;
&lt;P class="" data-start="336" data-end="576"&gt;I would appreciate any guidance or best practices on how to effectively detect and block these systems using ISE. Whether it’s through profiling, custom conditions, or policy sets—any suggestions or recommended approaches would be helpful.&lt;/P&gt;
&lt;P class="" data-start="578" data-end="596"&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 05:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280418#M595921</guid>
      <dc:creator>anonymus1</dc:creator>
      <dc:date>2025-04-11T05:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Block Kali-Linux using Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280427#M595922</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1865487"&gt;@anonymus1&lt;/a&gt;&amp;nbsp;hi, this can achieve with profiling. check below links to understand how profiles working and how can it implement.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.thesecurityblogger.com/cisco-identity-services-engine-ise-profiling-profiler-explained/" target="_blank" rel="noopener"&gt;https://www.thesecurityblogger.com/cisco-identity-services-engine-ise-profiling-profiler-explained/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217818-configure-cisco-ise-3-1-posture-with-lin.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217818-configure-cisco-ise-3-1-posture-with-lin.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 06:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280427#M595922</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2025-04-11T06:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Block Kali-Linux using Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280507#M595925</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;. Thanks for the response. I understand that this can be achieved by profiling.Any idea on this can be achieved specifically for Kali-Linux?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 08:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280507#M595925</guid>
      <dc:creator>anonymus1</dc:creator>
      <dc:date>2025-04-11T08:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: Block Kali-Linux using Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280514#M595928</link>
      <description>&lt;P&gt;Found a workaround.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;A title="https://bst.cisco.com/bugsearch/bug/cscvz45806?rfs=qvlogin" href="https://bst.cisco.com/bugsearch/bug/CSCvz45806?rfs=qvlogin" target="_blank" rel="noreferrer noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCvz45806?rfs=qvlogin&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 09:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-kali-linux-using-cisco-ise/m-p/5280514#M595928</guid>
      <dc:creator>anonymus1</dc:creator>
      <dc:date>2025-04-11T09:08:44Z</dc:date>
    </item>
  </channel>
</rss>

