Showing results for 
Search instead for 
Did you mean: 

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.


iphone profiled as Cisco-Switch based on nmapOSscan

any idea why i have iPhones being profiled as Cisco-Switches???


MAC Address: 2C:33:61:8B:87:BB
Endpoint Profile: Apple-iPhone
Current IP Address:
Location: SOPS


General Attributes
Static Assignment true
Endpoint Policy Apple-iPhone
Static Group Assignment false
Identity Group Assignment Apple-iPhone
Custom Attributes
Attribute String
Attribute Value

No data found. Add custom attributes here.
Other Attributes
AAA-Server PSN
AllowedProtocolMatchedRule Dot1X
AuthenticationIdentityStore GRANITE
AuthenticationMethod MSCHAPV2
AuthorizationPolicyMatchedRule MDM
BYODRegistration Unknown
Called-Station-ID WAP:SSID
Calling-Station-ID 2c-33-61-8b-87-bb
DTLSSupport Unknown
Device Type Device Type#All Device Types#WLC
DeviceCompliance Compliant
DeviceRegistrationStatus NotRegistered
ElapsedDays 0
EndPointPolicy Apple-iPhone <- I forced this to get the device onto the wifi
EndPointProfilerServer PSN
EndPointSource NMAP Probe
FQDN Users-Phone.domain.invalid
FailureReason -
IdentityGroup Apple-iPhone
InactiveDays 0
LastNmapScanTime 2019-Dec-17 10:39:18 EST
Location Location#All Locations#Campus
LogicalProfile Apple-iDevices,Mobile Devices,Apple-iDevices
MACAddress 2C:33:61:8B:87:BB
MDMCompliant true
MDMDiskEncrypted false
MDMEnrolled true
MDMImei xxxx
MDMJailBroken false
MDMManufacturer Apple
MDMModel iPhone 7
MDMOSVersion iOS 13
MDMPhoneNumber xxxx
MDMPinLockSet true
MDMSerialNumber xxxx
MDMServerName Maas360
MDMServerReachable true
MDMUpdateTime 1576596257968
MatchedPolicy Cisco-Device
MessageCode 3000
NAS-Port-Type Wireless - IEEE 802.11
NetworkDeviceName WLC
NmapScanCount 1
OUI Apple, Inc.
PhoneID xxxx
PhoneIDType UDID
PolicyVersion 66
PostureApplicable Yes
SelectedAuthorizationProfiles WLAN FULL ACCESS
StaticAssignment true
StaticGroupAssignment false
Total Certainty Factor 10
User-AD-Last-Fetch-Time 1576596258860
User-Fetch-Department DRA
User-Fetch-Email xxxx
User-Fetch-First-Name xxx
User-Fetch-Last-Name xxx
User-Fetch-User-Name xxx
User-Name xxx
host-name xxxx
operating-system Cisco Nexus 7000 switch (NX-OS 4.2.6) (accuracy 99%)
operating-system-result Cisco Nexus 7000 switch (NX-OS 4.2.6) (accuracy 99%)



VIP Advocate

The default out of the box 'Cisco-Device' policy is setup to perform an OS-scan via the configured NMAP action. The OS-scan performs tcp/udp fingerprinting to determine its results. My suggestion would be to either change the action to NONE to see if that changes your profiled result. Or even better would be to create your own policies with a higher MCF to ensure that your byod devices/corporate apple devices get profiled based on attributes that you wish to profile on.

okay i can see why it was profiled as such based on the nmap scan result.

so now i'd like to know why the nmapOSscan thinks the iphone is a Nexus OS device. where can i see the results of that scan? and why on earth would it get that kind of result? i mean this is the 10th or 11th iteration of this product and it still isn't profiling things properly. and it's not like this was a brand new phone or something, this is an iphone7.

I would suggest taking a look here as it will aide in answering additional questions:
As I mentioned earlier, I personally prefer building out my own profiles with higher MCF in an attempt to alleviate issues such as the one you have identified.


Have a look at bug CSCuz62668 (ISE NMAP probe profiles iPad and iPhone as Cisco-Device).


It is listed as fixed but doesn't give a fixed release version.


Also, other thread with same issue is below:




Per the bug ID that @andrewswanson mentioned, it is recommended to disable the NMAP OS scan for apple devices.  I had to do this in my ISE 2.4 P9 environment for a different issue, and Apple devices on my wireless network still get profiled properly due to the User-Agent attribute being passed.  Unfortunately, the User-Agent is only passed via wireless and not the hard line, but it avoids mis-classification of apple devices caused by NMAP scans.

Content for Community-Ad