05-05-2024 11:08 PM
Hi All,
Has anyone tried device profiling for Bank ATM Machines?
ATM Machines generally run Windows Server OS, which Cisco Secure Client does not support.
For ATM Machine Authentication, we can use MAB; however, to avoid the risk of MAC Address Spoofing, can we profile Windows Server?
I wonder which probe can be used for device profiling of ATM Machines.
05-06-2024 01:18 AM
How is this bank network ? (is this private network using satellite or MPLS or VPLS over internet ?)
If you have already VPN network for the PoS to connect to HQ, then you can do different methods ? - but this need to test as this is more critical part of secure system for the financial transactions.
As per ISE concern simple based on the input devices. does the Server can support Certs and also join any AD for machine authentication - or you looking only MAB based ?
Look out some example guides :
https://ciscocustomer.lookbookhq.com/iseguidedjourney/ise-design-endpoint-attributes
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKSEC-2660.pdf
what Windows Server OS is this ?
ISE 3.0 onwards there is support for client less posture also available - not tested myself on Windows Server - but windows 10 onwards works as expected (may be worth check any tweak you can do, as it not mentioned windows server)
I also suggest to reach out cisco local partner for the solution - they might be deploy same solution for other banks, so its easy to offer services to deploy the same for you as PoC.
05-06-2024 06:38 AM
If they are running Windows server and are domain-joined then the AD probe is definitive - it is also the most accurate ISE profiling probe generally speaking.
05-06-2024 05:00 PM
One of my customers (bank) and I decided not to profile for the same reason as you described - old Windows version, and locked down. So we agreed to make an Endpoint Identity Group and put all the MAC addresses of all the ATMs there. They don't have thousands of ATMs, and adding these addresses (based on the low rate of install of ATMs) does not cause them operational overhead. The ISE AuthZ Profile for ATMs should be as restrictive as you can make it - that is probably the best thing you can do. Upstream firewalls should of course also limit the scope of the ATM traffic.
Profiling does not add any security to the MAB process, because a bad actor can spoof anything. Profiling is just a very nice convenience feature.
One mechanism is to use ISE dynamic VLAN assignment for such endpoints. By forcing the VLAN through ISE, it will limit the abuse of MAC spoofing, depending on how you do AuthZ generally. e.g. if you simply return an Access-Accept for MAB, and not perform VLAN Assignment, then it means whoever steals a MAC address (e.g. of a camera), can clone that on their device and plug their device into a port used by Corporate PCs. ISE will think you pugged in a camera, return Access-Accept, and the bad actor is on a switchport with a static VLAN for Corp Data. That's bad news. However, one mitigation is to set the VLAN to the one used by cameras. Now the bad actor is on the camera VLAN, instead of the Corp Data VLAN. Some reduction in risk.
Dynamic VLAN assignment can cause a lot of troubles with DHCP (VLAN switching after DHCP for non-WIndows supplicant) - if that is an issue, then you can also configure your switches to send you the configured access VLAN during Authentication - you can then make an AuthZ decision about what to do - e.g. if the VLAN is a Corp Data VLAN and the MAB should return a Camera AuthZ profile, then you can send back an Access-Reject because something smells fishy.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide