<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect VPN Client DHCP Profiling in ISE to tell Corporate from BYOD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779797#M1039668</link>
    <description>&lt;P&gt;Thanks Muhammed,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firepower 6.3 does seem to support CoA -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/firepower_threat_defense_remote_access_vpns.html#id_RADIUS_CoA&amp;nbsp;&amp;nbsp;" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/firepower_threat_defense_remote_access_vpns.html#id_RADIUS_CoA&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I get the correct MAC address (as&amp;nbsp;a unique Endpoint record in ISE), which shows all relevant RADIUS attributes under it. The issue is it doesn't has&amp;nbsp;any hostname field. So AD prob doesn't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which RADIUS attributes are you using for profiling?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jan 2019 05:51:00 GMT</pubDate>
    <dc:creator>rick505d3</dc:creator>
    <dc:date>2019-01-15T05:51:00Z</dc:date>
    <item>
      <title>AnyConnect VPN Client DHCP Profiling in ISE to tell Corporate from BYOD</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779754#M1039622</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to get the AnyConnet VPN client device's hostname in ISE. DHCP profiling probe is enabled on ISE and works for LAN devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AnyConnect is 4.6 version. The headend firewall is FTD 2110, 6.2.3. ISE is running 2.4 patch&amp;nbsp;5.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The VPN client gets an&amp;nbsp;IP address via DHCP. The DHCP server (Windows) shows the active lease and displays the client's hostname correctly. ISE is also configured as a 3rd DHCP server on FTD for profiling purposes. However, the ISE DHCP profiling of AnyConnect clients is not working as ISE&amp;nbsp;sees the DHCP request coming from the FTD's MAC address - confirmed on ISE through tcpdump&amp;nbsp;capture.&amp;nbsp;ISE create a new Endpoint record for the FTD's MAC address and&amp;nbsp;shows the client's hostname under it. When a new client connects, ISE updates the FTD Endpoint MAC to that client's hostname. The actual client's MAC address also gets created as Endpoint in ISE but misses all the DHCP related profiling info, most importantly for me, the host-name attribute.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is if there is a command to&amp;nbsp;tell the FTD to send the original client's MAC address in the DHCP discover message instead?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need the above as a guestimate to tell apart Corporate from BYOD VPN devices. The customer doesn't have CA deployment so can't identify corporate devices through certificates. My&amp;nbsp;intention is to use ISE AD Profiling Probe to assess that a device really is a corporate asset. AD Profiling Probe relies on hostname of the device to validate AD join status.&amp;nbsp;I can't use DNS based probing as there is no DDNS setup on the central DHCP/DNS servers for VPN clients. ISE Posture&amp;nbsp;could be an option (check for certain registry key for AD join) but even the latest FTD code 6.3 doesn't seem to support ISE Posture. Any other way we can identify VPN corporate from VPN BYOD devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 11:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779754#M1039622</guid>
      <dc:creator>rick505d3</dc:creator>
      <dc:date>2019-03-12T11:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client DHCP Profiling in ISE to tell Corporate from BYOD</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779781#M1039644</link>
      <description>I don't think you can do much in FTD. If it is ASA, I would advice to go&lt;BR /&gt;for ISE authorization for VPN connections which will help to profile using&lt;BR /&gt;Radius attributes. From Radius attributes you will get the correct mac&lt;BR /&gt;address of the endpoint and map it to AD using hostname which will achieve&lt;BR /&gt;what you are looking for. I am using it and working perfectly.&lt;BR /&gt;&lt;BR /&gt;The problem with FTD that it doesn't support CoA yet which makes ISE&lt;BR /&gt;authorization for FTD anyconnect no possible yet. Hence, I stayed with ASA&lt;BR /&gt;and FP service module instead of FTD for VPN headend.&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Jan 2019 05:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779781#M1039644</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-01-15T05:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client DHCP Profiling in ISE to tell Corporate from BYOD</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779797#M1039668</link>
      <description>&lt;P&gt;Thanks Muhammed,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firepower 6.3 does seem to support CoA -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/firepower_threat_defense_remote_access_vpns.html#id_RADIUS_CoA&amp;nbsp;&amp;nbsp;" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/firepower_threat_defense_remote_access_vpns.html#id_RADIUS_CoA&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I get the correct MAC address (as&amp;nbsp;a unique Endpoint record in ISE), which shows all relevant RADIUS attributes under it. The issue is it doesn't has&amp;nbsp;any hostname field. So AD prob doesn't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which RADIUS attributes are you using for profiling?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 05:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3779797#M1039668</guid>
      <dc:creator>rick505d3</dc:creator>
      <dc:date>2019-01-15T05:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client DHCP Profiling in ISE to tell Corporate from BYOD</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3780817#M1039681</link>
      <description>Hi Rick,&lt;BR /&gt;&lt;BR /&gt;I didn't know that 6.3 is already out. I will be testing the feature with&lt;BR /&gt;it. ASA-TLVs are used to send the hostname to NAC which it uses to scan AD.&lt;BR /&gt;</description>
      <pubDate>Wed, 16 Jan 2019 05:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-dhcp-profiling-in-ise-to-tell-corporate/m-p/3780817#M1039681</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-01-16T05:55:04Z</dc:date>
    </item>
  </channel>
</rss>

