07-28-2023 10:46 AM
I am having difficulties implementing Profiling on ISE 3.1. I have roughly 500 hosts and 50% profile correctly to my profile policy and 50% do not. The ones that do not are hosts that have connected to VPN. If I look at the details of a connection, there's no Probe listed.
Any ideas?
Solved! Go to Solution.
07-28-2023 11:11 AM
@DannyDulin on a VPN to validate corporate devices you can either use posture (if you have the licenses) to check the registry to determine the endpoint is connected to the AD domain. Or use machine certificiates issued by your internal PKI environment.
07-28-2023 10:51 AM
@DannyDulin what attributes are you looking for in your profiling policy? When an endpoint connects to a VPN ISE does not learn the same attributes via the same method as it does for wired/wireless. ACIDex attributes learnt from anyconnect are used by ISE to profile VPN clients.
https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456
07-28-2023 10:57 AM
Hi Rob. Thank you for your response.
I am looking for the below attributes:
ACTIVEDIRECTORY_PROBE:AD-Host-Join-Point contains ***Our Domain
IP:FQDN contains ***Our Domain
ACTIVEDIRECTORY_PROBE:AD-Host-Join-Point contains ***Our Domain
I can't seem to find any info on how to verify ACIDex is configured correctly.
07-28-2023 11:01 AM
@DannyDulin the guide I provided previously has a section on ACIDex, you can use the following attributes to aid profiling VPN clients.
I don't believe you can use the AD probe to profile a VPN client.
07-28-2023 11:04 AM
As @Rob Ingram ACIDex work with radius.
07-28-2023 11:10 AM
Thank you for your affirmation. It seems the guide doesn't detail how to actually ensure ACIDex is enabled in the connection profile.
07-28-2023 11:08 AM
Thanks Rob for clarifying you can't use the AD probe to profile a VPN client even though that's a little discouraging. Our ultimate goal is to identify hosts that are owned by our organization, allow those hosts to access VPN and deny non-org owned hosts. I thought that AD-host exists was the best way.
07-28-2023 11:11 AM
@DannyDulin on a VPN to validate corporate devices you can either use posture (if you have the licenses) to check the registry to determine the endpoint is connected to the AD domain. Or use machine certificiates issued by your internal PKI environment.
07-28-2023 11:13 AM
That is extremely helpful Rob. Thank you!!
I've been banging my head against the Profiling wall all week, when Posture is really my answer.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide