09-23-2024 07:10 PM
How to avoid mac spoofing in MAB using Profiling Transitions and the use of Exception Actions
We have ISE 3.3 Patch 3 deployed for one of our customer. For wired printer we are using MAB. For authentication and authorization, we are using the profiling service of PSN. Below is the policy set created
We can see ISE PSN has successfully profiled some printer with Canon Device (CF=10) and some printer with Canon Printer (CF=40)
However, when we connect the laptop to the printer port, with a MAC address spoof. Laptop gets successfully authenticated and authorised with Canon Device profile. (OUI Match)
When we looked at the Canon Devie profile, it just matching the OUI of the MAC Address.
PSN is has following probes enabled
We are not using device sensor as Cisco C1000 is not supporting Device Sensor Feature.
RADIUS is not of use as the Printer does not support 802.1x. DHCP is not of use as the printer has an IP address statically configured.
Is there any way I can stop MAC Address spoofing method to bypass ISE NAC solution.
I read about Profile Transitions and the use of Exception Actions to restrict
Where we can take action with new device profile learned on printer port.
But I'm not sure how to configure it. Can anyone suggest to me how to restrict unauthorised access to wired printer using Profile Transition and Exception
09-27-2024 01:52 PM
@MHM Cisco World you're barking up the wrong tree mate. I don't know what part of this you don't understand. MAC spoofing is the most basic thing in the world. Your last question about "why both endpoints have same OUI ?" - obviously they'd have the same OUI if the first three bytes of the MAC address is the same - that's what defines the OUI. And MAC address spoofing has nothing to do with device sensor. The switch is not aware that MAC spoofing is going. on.
The original question from @jitendrac was about how to handle the detection of such events, and we answered that already - ISE Anomalous Detection. And this only works if DHCP is involved, since ISE has profiled the MAC address using DHCP as being a Windows PC, and then next time it sees the same MAC address it's a Linux OS. That triggers anomalous detection and a Global Exception in ISE can do stuff to that - watch the YouTube video for an example. I maintain, that this is still flawed, because you can't assume that DHCP is always involved. And Anomalous Detection (in my experience) has flaws (false positives) and the mechanisms used for detection and comparison are not well enough documented. Perhaps the solution lies elsewhere - e.g. using NetFlow record analysis to detect anomalous behaviours - send your client interface NetFlow records to a clever system that can detect the anomalies, and then have that system integrate with ISE pxGrid to quarantine the interface. That would be harder and more expensive, but most likely have better outcomes.
09-28-2024 09:43 PM
We did some testing in the environment
Here is the result of testing
This is the problem we are discussing.
However, I do not get access to the network if I delete the MAC address from context visibility when connecting the same laptop with a spoof MAC address. This time, Context Visibility shows Windows11-Workstation as Matched Policy and End Point Policy.
This indicates if the MAC address is already profiled and if a new device with the same MAC address comes with a different expected profile. ISE does not change the old profile OR override that old profile with a new one.
This looks like my Endpoint Profile Change feature is not working as expected. Maybe I am missing some configuration.
I want to understand following. Let me know if there are any documentation or Cisco Live Webinar that are covering this topic
10-01-2024 02:38 AM - edited 10-01-2024 02:40 AM
@jitendrac wrote:
However, I do not get access to the network if I delete the MAC address from context visibility when connecting the same laptop with a spoof MAC address. This time, Context Visibility shows Windows11-Workstation as Matched Policy and End Point Policy.
Still with a static IP assigned to that spoofing laptop? if so, that shouldn't happen as the spoofed OUI belongs to Canon. However, if you open up the spoofing laptop page on ISE and you go to the attributes page it should show you all the attributes collected and from there you can see how and why the laptop was profiled as a Windows 11 workstation. If there are two profiles matching an endpoint, the one with the higher certainty will be applied, and if an endpoint was already profiled as something, ISE won't change its profile unless a higher certainty is hit from another profile.
Also, please take a look at this guide focused on ISE profiling:
10-01-2024 03:07 AM
No that time, the spoofing laptop did not have a static IP. Maybe due to DHCP and other probes it got profiled as Windows 11 workstation
I will test again by assigning a same IP address of printer and same MAC as of that printer. Lets see what ISE detect after deleting MAC from context visibility
10-01-2024 03:15 AM
When we use dhcp we dont look for IP we look for
Dhcp-class-identifier <<- this will make ISE can differentiate between laserPinter and workstation
MHM
10-01-2024 03:20 AM
Then that explains why it was profiled as something else.
09-29-2024 05:06 AM
the Printer use below attributes
-OUI <<- since ISE use mac to get OUI and mac is same then this useless
-DHCP Class Id <<- this sure you can use it via ip dhcp relay
-SNMP DeviceDescr <<- you dont have sensor so you can use it
10-01-2024 02:52 AM
Thanks MHM ,
I will check if the customer can allow us to use NMAP scan and SNMP query on the endpoint
10-01-2024 02:54 AM
what about DHCP relay ?
MHM
02-10-2025 11:22 PM
Hello Community,
I am reopening this discussion to gather further insights.
Based on most of your recommendations, we successfully convinced the customer to utilize DHCP for printer profiling. Additionally, we enabled NMAP, SNMP, and DHCP probes for endpoint discovery and classification.
Using the aforementioned probes, we successfully profiled printers and retrieved the attributes, some of which are mentioned below:
A custom user-defined profiling policy rule was created utilizing the above attributes. The Minimum Certainty Factor (CF) was set to 80 to ensure accurate classification. Upon rebooting the printer, the endpoint matched the profiling rule successfully.
However, when we spoofed the MAC address of the printer and connected a laptop from a different branch, Cisco ISE did not flag this as anomalous behavior. Surprisingly, the spoofed MAC address was allowed access without any restrictions. This spoofed MAC endpoint also passed through same authorization policy which actual printer passed.
Any guidance on remediating MAC spoofing risks within ISE profiling policies would be highly appreciated.
Shall we enable CoA as reauth OR make Anomalous Endpoint Detection Enforcement by creating rule as mentioned in link Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco
But for Enforcement at least it should flag as Anomalous Endpoint which is not happening in my case.
02-11-2025 11:41 PM
Any guidance on remediating MAC spoofing risks within ISE profiling policies would be highly appreciated.
Shall we enable CoA as reauth OR make Anomalous Endpoint Detection Enforcement by creating rule as mentioned in link Configure Anomalous Endpoint Detection and Enforcement on ISE 2.2 - Cisco
But for Enforcement at least it should flag as Anomalous Endpoint which is not happening in my case.
02-12-2025 02:03 AM
Anything with MAB could be spoofed, the recommendation would be to move to dot1x using certificates if possible, otherwise using username and password. Both these dot1x options are way more secure than relying on MAB.
ISE Anomalous Behavior Detection has its own limitations, the checks that ISE uses aren't that much, hence, I don't believe you can customize it using hostnames, OS, etc.
You need CoA to be enabled if you want to isolate the anomalous endpoint, because the CoA is the key feature here to apply the enforcement. If you don't turn it on there wouldn't be a way to isolate that endpoint.
02-13-2025 11:30 PM
I just need to understand when ISE collects device DHCP Attributes. Is it as soon as the endpoint is connected, or does it have to wait for some time?
02-14-2025 02:21 AM
ISE processes any endpoint DHCP data that it receives either via “ip helper” statements, or via Catalyst Device Sensor feature (via RADIUS interim accounting updates ). Device Sensor can also supply HTTP, CDP and LLDP snooped data. ISE gets this data very soon after authentication. You can see the Device Sensor data in tcpdump.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide