<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Since there is no re in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646341#M74602</link>
    <description>Since there is no re-profiling after mac is in relevant profiled group, you can take any device with the same mac and getting an access to the network (of course with the right VLAN and dACL correspond to profile group)</description>
    <pubDate>Wed, 11 Feb 2015 11:35:10 GMT</pubDate>
    <dc:creator>nir-r</dc:creator>
    <dc:date>2015-02-11T11:35:10Z</dc:date>
    <item>
      <title>Profiling with NMAP</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646338#M74595</link>
      <description>&lt;P&gt;I'm using NMAP for profiling and it seems that it runs only once for new devices on DB.&lt;/P&gt;&lt;P&gt;There is no re-profiling after the device was discover for the first time and populate&amp;nbsp;into endpoint identity groups&amp;nbsp;with attribute list.&lt;/P&gt;&lt;P&gt;In this case if profiled endpoint change his NMAP attriube list it will stay on the same identity group&amp;nbsp;despite of the fact that there is no match on profile&lt;/P&gt;&lt;P&gt;policy and it will not be moved dynamically to a different identity group.&lt;/P&gt;&lt;P&gt;Is it possible to run re-profiling on an existing device and dynamically move it to a different identity group for example each time device is reauthenticated?&lt;/P&gt;&lt;P&gt;If there is an option to have&amp;nbsp;continues profiling&amp;nbsp;&amp;nbsp;it will add&amp;nbsp;some security&amp;nbsp;to MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646338#M74595</guid>
      <dc:creator>nir-r</dc:creator>
      <dc:date>2019-03-11T05:26:16Z</dc:date>
    </item>
    <item>
      <title>I believe the profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646339#M74596</link>
      <description>&lt;P&gt;I believe the profiling function continues to happen and ISE continues to collect attributes. However, a device will only be re-profiled/moved to a different group if the "certainty factor" for that new profiling rule is higher than the current one. If the certainty factor is lower or the same then the device will remain in the existing profiled group.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 22:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646339#M74596</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-02-10T22:10:58Z</dc:date>
    </item>
    <item>
      <title>Unfortunately is doesn't work</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646340#M74600</link>
      <description>Unfortunately is doesn't work with NMAP.
If for example you profile a device for SSH port and device id profiled to this group and then you stop SSH service.
endpoint device will stay on the same profiled group until you delete the mac and device will be profiled once again.</description>
      <pubDate>Tue, 10 Feb 2015 22:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646340#M74600</guid>
      <dc:creator>nir-r</dc:creator>
      <dc:date>2015-02-10T22:16:04Z</dc:date>
    </item>
    <item>
      <title>Since there is no re</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646341#M74602</link>
      <description>Since there is no re-profiling after mac is in relevant profiled group, you can take any device with the same mac and getting an access to the network (of course with the right VLAN and dACL correspond to profile group)</description>
      <pubDate>Wed, 11 Feb 2015 11:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-with-nmap/m-p/2646341#M74602</guid>
      <dc:creator>nir-r</dc:creator>
      <dc:date>2015-02-11T11:35:10Z</dc:date>
    </item>
  </channel>
</rss>

