10-06-2022 10:25 AM
Hello Cisco brains,
I recently deployed Cisco ISE (3.1P3) and I'm running into an issue with Anomalous Behavior and Detection. I understand that in order for ISE to trigger an anomaly, it must hit the following:
We have our switches filtering attributes based off lldp, cdp, dhcp, and vlan-id then being sent to ISE.
The issue we are running into is with our imaging process for new machines on the network. Whenever a device is being imaged, we use Ivanti with PXE so the machine's dhcp-class-identifier shows as "PXEClient". After the imaging process for installing windows is complete, the dhcp-class-identifier changes to "MSFT 5.0" which then triggers the Anomalous Behaviour. I currently have Anomalous Behaviour Detection enabled but I kept Anomalous Behaviour Enforcement disabled so it won't restrict network access. Our security team would prefer to keep enforcement enabled to protect us against mac spoofing.
Does anyone out there have recommendations for imaging new machines while keeping ISE enforcement active?
Thank you!
Solved! Go to Solution.
10-07-2022 04:34 AM
Yeah this is a really common thing with any wired NAC deployment. I've seen customers solve this mainly in these ways:
10-06-2022 12:15 PM
Have a specified set of "build ports" in a secure area that do not have authentication enabled?
10-06-2022 12:44 PM
@ahollifield That would be an easy way out however our Security Team wants us to enable ISE on all ports. Unfortunately having a select group of ports on the network open is not an option.
10-07-2022 04:34 AM
Yeah this is a really common thing with any wired NAC deployment. I've seen customers solve this mainly in these ways:
10-11-2022 05:59 AM
Thanks for the input! @ahollifield . The goal is to keep things as simple as possible without restricting access to deploying new machines. These options helped confirm our thought process as well.
10-06-2022 06:23 PM
I don't think one can influence the PXE Boot client to send a custom client identifier - if you could fake it to be MSFT then it would perhaps solve the issue. I think there is no real solution to this - other than to perform a "clean-up" operation after the PXE boot is done. Deleting the endpoints and then letting them re-auth "clean" is what I would do. I find Anomaly detection quite bothersome to be honest. Perhaps because I haven't found much functionality in ISE to deal with these occurrences.
On a related note, in the Report "Endpoint Profile Changes" I can see that endpoints are constantly being re-reprofiled as the same thing (Current Profile is the same as the Previous Profile) - and then ISE flags that as something I should care about, but provides no data or tools to manage this. At least it tells me that the re-profile event was not due to an update to the Profiler Feed
10-07-2022 09:14 AM
A few years ago, I had a look at using powershell scripts to add/remove PXE clients to ISE using ERS.
I used the site below - it worked well but management decided against using it in production. Could perhaps be a way of working around Anomalous Behaviour and Detection.
hth
Andy
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide