Cisco ISE Profiling Service-1
Cisco ISE Profiling Service-1
The profiling service in Cisco Identity Services Engine (ISE) identifies the devices that connect to your network
and their location. The endpoints are profiled based on the endpoint profiling policies configured in Cisco
ISE. Cisco ISE then grants permission to the endpoints to access the resources in your network based on the
result of the policy evaluation.
The profiling service:
• Facilitates anefficient and effective deployment and ongoing management of authentication by
using IEEE standard 802.1X port-based authentication access control, MAC Authentication
Bypass (MAB) authentication, and Network Admission Control (NAC) for any enterprise network
of varying scale and complexity.
• Identifies, locates, and determines the capabilities of all of the attached network endpoints
regardless of endpoint types.
• Protects against inadvertently denying access to some endpoints.
Profiler Dashboard
The Profiler dashboard (Work Centers > Profiler > Endpoint Classification) is a centralized monitoring
tool for the profiles, endpoints, and assets in your network. The dashboard represents data in both
graphical and table formats. The Profiles dashlet displays the logical and endpoint profiles that are
currently active in the network. The Endpoints dashlet displays the identity group, PSNs, OS types of the
endpoints that connect to your network. The Assets dashlet displays flows such as Guest, BYOD, and
Corporate. The table displays the various endpoints that are connected and you can also add new
endpoints.
Endpoint Cache
• maxEndPointsInLocalDb = 100000 (endpoint objects in cache)
• endPointsPurgeIntervalSec = 300 (endpoint cache purge thread interval in seconds)
• numberOfProfilingThreads = 8 (number of threads)
The limit is applicable to all profiler internal event handlers. A monitoring alarm is triggered when queue size
limit is reached.
Event Handlers
• NetworkDeviceEventHandler: For network device events, in addition to filtering duplicate
Network Access Device (NAD) IP addresses, which are already cached.
• ARPCacheEventHandler: For ARP Cache events.
Martian IP Addresses
Martian IP addresses are not displayed in Context Visibility > Endpoints and Work Centers > Profiler >
Endpoint Classification windows as the RADIUS parser removes such addresses before they reach the
profiling service. Martian IP addresses are a security concern as they are vulnerable to attacks. However,
martian IP addresses are displayed in MnT logs for auditing purposes. This behaviour stands true in the case
of multicast IP addresses as well.
NetFlow Probe
Cisco ISE profiler implements Cisco IOS NetFlow Version 9. We recommend using NetFlow Version 9,
which has additional functionality needed to enhance the profiler to support the Cisco ISE profiling service.
You can collect NetFlow Version 9 attributes from the NetFlow-enabled network access devices to create an
endpoint, or update an existing endpoint in the Cisco ISE database. You can configure NetFlow Version 9 to
attach the source and destination MAC addresses of endpoints and update them. You can also create a dictionary
of NetFlow attributes to support NetFlow-based profiling.
For more information on the NetFlow Version 9 Record Format, see Table 6, “NetFlow Version 9 Field
Type Definitions” of the NetFlow Version 9 Flow-Record Format document.
In addition, Cisco ISE supports NetFlow versions earlier than Version 5. If you use NetFlow Version 5
in your network, then you can use Version 5 only on the primary network access device (NAD) at the
access layer because it will not work anywhere else.
Cisco IOS NetFlow Version 5 packets do not contain MAC addresses of endpoints. The attributes that are
collected from NetFlow Version 5 cannot be directly added to the Cisco ISE database. You can discover
endpoints by using their IP addresses, and append the NetFlow Version 5 attributes to endpoints, which
can be done by combining IP addresses of the network access devices and IP addresses obtained from the
NetFlow Version 5 attributes. However, these endpoints must have been previously discovered with the
RADIUS or SNMP probe.
The MAC address is not a part of IP flows in earlier versions of NetFlow Version 5, which requires you to
profile endpoints with their IP addresses by correlating the attributes information collected from the
network access devices in the endpoints cache.
For more information on the NetFlow Version 5 Record Format, see Table 2, “Cisco IOS NetFlow Flow
Record and Export Format Content Information” of the NetFlow Services Solutions Guide.
DHCP Probe
The Dynamic Host Configuration Protocol probe in your Cisco ISE deployment allows the Cisco ISE profiling
service to reprofile endpoints based only on new requests of INIT-REBOOT and SELECTING message types.
Though other DHCP message types such as RENEWING and REBINDING are processed, they are not used
for profiling endpoints. Any attribute parsed out of DHCP packets is mapped to endpoint attributes.
From Cisco ISE Release 3.3 onwards, IPv6 is supported in DHCP Probe.
The pxGrid probe leverages Cisco pxGrid for receiving endpoint context from external
sources. Prior to Cisco ISE 2.4, Cisco ISE served only as a publisher and shared various
context information such as session identity and group information as well as
configuration elements to external subscribers. With the introduction of the pxGrid probe
in Cisco ISE 2.4, other solutions serve as the publishers and Cisco ISE Policy Service
nodes become the subscribers.
The pxGrid probe is based on pxGrid v2 specification using the Endpoint Asset topic
/topic/com.cisco.endpoint.asset with Service Name com.cisco.endpoint.asset. The
following table displays the topic attributes all of which are preceded by the prefix asset.
In addition to the attributes commonly used to track networked assets such as device
MAC address (assetMacAddress) and IP address (assetIpAddress), the topic allows
vendors to publish unique endpoint information as Custom Attributes
(assetCustomAttributes). The use of Endpoint Custom Attributes in Cisco ISE makes the
topic extensible to a variety of use cases without requiring schema updates for each new
set of unique vendor attributes shared over pxGrid.
RADIUS Probe
You can configure Cisco ISE for authentication with RADIUS, where you can define a shared secret that you
can use in client-server transactions. With the RADIUS request and response messages that are received from
the RADIUS servers, the profiler can collect RADIUS attributes, which can be used for profiling endpoints.
Cisco ISE can function as a RADIUS server, and a RADIUS proxy client to other RADIUS servers. When it
acts as a proxy client, it uses external RADIUS servers to process RADIUS requests and response messages.
The RADIUS probe also collects attributes sent in RADIUS accounting packets by device sensors. The
RADIUS probe is running by default, even for systems not configured for Profiling Service to ensure ISE
can track endpoint authentication and authorization details for use in Context Visibility Services.
The RADIUS probe and Profiling Services are also used to track the creation and update times for registered
endpoints for purposes of purge operations.
From Cisco ISE Release 3.3 onwards, IPv6 is supported in RADIUS Probe.
The NMAP manual subnet scan is useful for detecting devices such as printers with a static IP address
assigned to them that are connected constantly to the Cisco ISE network, and therefore these devices cannot
be discovered by other probes.
-O Enables OS detection
-sU UDP scan
-p <port ranges> Scans only specified ports. For example, U:161, 162
oN Normal output
oX XML output
SNMP Read Only Community Strings for NMAP Manual Subnet Scan
The NMAP manual subnet scan is augmented with an SNMP Query whenever the scan discovers that UDP
port 161 is open on an endpoint that results in more attributes being collected. During the NMAP manual
subnet scan, the Network Scan probe detects whether SNMP port 161 is open on the device. If the port is
open, an SNMP Query is triggered with a default community string (public) with SNMP version 2c.
If the device supports SNMP and the default Read Only community string is set to public, you can obtain the
MAC address of the device from the MIB value “ifPhysAddress”.
In addition, you can configure additional SNMP Read Only community strings separated by a comma for the
NMAP manual network scan in the Profiler Configuration window. You can also specify new Read Only
community strings for an SNMP MIB walk with SNMP versions 1 and 2c.
For an iDevice, and other mobile devices that do not support SNMP, the MAC address can be discovered by
the ARP table, which can be queried from the network access device by an SNMP Query probe.
Attribute Setting
LLDP global state Disabled
LLDP holdtime (before discarding) 120 seconds
LLDP 2 seconds
reinitialization delay
LLDP tlv-select Enabled to send and receive all TLVs.
LLDP interface state Enabled
LLDP receive Enabled
LLDP transmit Enabled
LLDP Enabled to send all LLDP-MED TLVs
med-tlv-select
You can enable the AD probe under Administration > System > Deployment > Profiling
Configuration. When this probe is enabled, Cisco ISE fetches the AD attributes for a new endpoint as
soon as it receives a hostname. The hostname is typically learned from the DHCP or DNS probes. Once
successfully retrieved, ISE does not attempt to query AD again for the same endpoint until a the rescan
timer expires. This is to limit the load on AD for attribute queries. The rescan timer is configurable in the
Days Before Rescan field (Administration > System > Deployment > Profiling Configuration >
Active Directory). If there is additional profiling activity on the endpoint, the AD is queried again.
The following AD probe attributes can be matched in the Policy > Policy Elements > Profiling using the
ACTIVEDIRECTORY condition. AD attributes collected using the AD Probe appear with the prefix “AD”
in the endpoint details on the Context Visibility > Endpoints window.
• AD-Host-Exists
• AD-Join-Point
• AD-Operating-System
• AD-OS-Version
• AD-Service-Pack
Global Configuration of Change of Authorization for Authenticated Endpoints
You can use the global configuration feature to disable change of authorization (CoA) by using the default
No CoA option or enable CoA by using port bounce and reauthentication options. If you have configured Port
Bounce for CoA in Cisco ISE, the profiling service may still issue other CoAs as described in the “CoA
Exemptions” section.
The global configuration chosen dictates the default CoA behavior only in the absense of more specific settings.
You can use the RADIUS probe or the Monitoring persona REST API to authenticate the endpoints. You can
enable the RADIUS probe, which allows faster performance. If you have enabled CoA, then we recommend
that you enable the RADIUS probe in conjunction with your CoA configuration in the Cisco ISE application
for faster performance. The profiling service can then issue an appropriate CoA for endpoints by using the
RADIUS attributes that are collected.
If you have disabled the RADIUS probe in the Cisco ISE application, then you can rely on the Monitoring
persona REST API to issue CoAs. This allows the profiling service to support a wider range of endpoints. In a
distributed deployment, your network must have at least one Cisco ISE node that assumes the Monitoring
persona to rely on the Monitoring persona REST API to issue a CoA.
Cisco ISE arbitrarily will designate either the primary or secondary Monitoring node as the default destination
for REST queries in your distributed deployment, because both the primary and secondary Monitoring nodes
have identical session directory information.
EndPointPolicy EndPointPolicyID
EndPointProfilerServer EndPointSource
FQDN FirstCollection
Framed-IP-Address IdentityGroup
IdentityGroupID IdentityStoreGUID
IdentityStoreName L4_DST_PORT
LastNmapScanTime MACAddress
MatchedPolicy MatchedPolicyID
NADAddress NAS-IP-Address
NAS-Port-Id NAS-Port-Type
NmapScanCount NmapSubnetScanID
OS Version OUI
PolicyVersion PortalUser
PostureApplicable Product
RegistrationTimeStamp —
StaticAssignment StaticGroupAssignment
User-Agent cdpCacheAddress
cdpCacheCapabilities cdpCacheDeviceId
cdpCachePlatform cdpCacheVersion
ciaddr dhcp-class-identifier
dhcp-requested-address host-name
hrDeviceDescr ifIndex
ip lldpCacheCapabilities
lldpCapabilitiesMapSupported lldpSystemDescription
operating-system sysDescr
161-udp —
Attributes Collection from Cisco IOS Sensor-Embedded Switches
An Cisco IOS sensor integration allows Cisco ISE run time and the Cisco ISE profiler to collect any or all of the
attributes that are sent from the switch. You can collect DHCP, CDP, and LLDP attributes directly from
the switch by using the RADIUS protocol. The attributes that are collected for DHCP, CDP, and LLDP are then
parsed and mapped to attributes in the profiler dictionaries in the following location: Policy > Policy Elements >
Dictionaries.
• Data collector that is embedded in the network access device (switch) for gathering DHCP, CDP, and LLDP
data
• Analyzers for processing the data and determining the device-type of endpoints
There are two ways of deploying an analyzer, but they are not expected to be used in conjunction with each other:
• An analyzer can be deployed in Cisco ISE
ConfigurationChecklistforCiscoIOSSensor-EnabledNetworkAccessDevices
This section summarizes a list of tasks that you must configure in the Cisco IOS sensor-enabled switches and Cisco
ISE to collect DHCP, CDP, and LLDP attributes directly from the switch:
• Ensure that the RADIUS probe is enabled in Cisco ISE.
• Ensure that network access devices support an IOS sensor for collecting DHCP, CDP, and LLDP
information.
• Ensure that network access devices run the following CDP and LLDP commands to capture CDP and
LLDP information from endpoints:
cdp enable
lldp run
• Ensure that session accounting is enabled separately by using the standard AAA and RADIUS commands. For
example, use the following commands:
aaa new-model
aaa accounting dot1x default start-stop group radius
You must enable the network access devices to add Cisco IOS sensor protocol data to the RADIUS accounting
messages and to generate additional accounting events when it detects new sensor protocol data. This means that any
RADIUS accounting message should include all CDP, LLDP, and DHCP attributes.
Enter the following global command:
device-sensor accounting
• Disabling Accounting Augmentation
To disable (accounting) network access devices and add Cisco IOS sensor protocol data to the RADIUS accounting
messages for sessions that are hosted on a given port (if the accounting feature is globally enabled), enter the following
command at the appropriate port:
no device-sensor accounting
• TLV Change Tracking
By default, for each supported peer protocol, client notifications and accounting events are generated only when an
incoming packet includes a type, length, and value (TLV) that has not been received previously in the context of a
given session.
You must enable client notifications and accounting events for all TLV changes where there are either new TLVs, or
where previously received TLVs have different values. Enter the following command:
device-sensor notify all-changes
• Be sure that you disable the Cisco IOS Device Classifier (local analyzer) in the network access devices. Enter the
following command:
If the same endpoint is received from two or more publishers (Cisco IND), Cisco ISE only keeps the last publisher's
data for that endpoint.
Cisco ISE gets Cisco IND data from the service names com.cisco.endpoint.asset and
/topic/com.cisco.endpoint.assetin pxGrid.
Cisco IND Profiling Process Flow
Cisco IND Asset discovery finds an IoT device and publishes the endpoint data for that device to pxGrid. Cisco
ISE sees the event on pxGrid, and gets the endpoint data. Profiler policies in Cisco ISE assign the device data to
attributes in the ISE profiler dictionary, and applies those attributes to the endpoint in Cisco ISE.
IoT endpoint data which does not meet the existing attributes in Cisco ISE are not saved. But you can create more
attributes in Cisco ISE, and register them with Cisco IND.
Cisco ISE does a bulk download of endpoints when the connection to Cisco IND through pxGrid is first
established. If there is a network failure, Cisco ISE does another bulk download of accumulated endpoint changes.
1. Choose Administration > Deployment. Edit the PSN that you plan to use as pxGrid consumer, and
enable pxGrid. This PSN is the one that creates endpoints from pxGrid data published by Cisco IND and
profiling.
2. Choose Administration > pxGrid Services to verify that pxGrid is running. Then click the
Certificates
tab, and fill in the certificate fields. Click Create to issue the certificate and download the certificate.
• For I want to, select “Generate a single certificate (without a certificate signing request),
Common Name, and enter a name for the Cisco IND you are connecting with.
• For Certificate Download Format, choose PKS12 format.
• For Certificate Password, create a password.
3. In Cisco IND, choose Settings > pxGrid, and click Download .pem IND certificate.
Keep this window open.
4. In Cisco ISE, choose Administration > pxGrid Services > All Clients. When you see the Cisco
IND pxGrid client, approve it.
5. In Cisco IND, move the slider to enable pxGrid. Another screen opens, where you define the
location of the ISE node, the name of the certificate that you entered for this pxGrid server in ISE,
and the password you provided. Click Upload Certificate, and locate the ISE pxGrid PEM file.
6. In ISE, choose Administration > Certificates > Trusted Certificates. Click Import and enter the path to
the certificate you got from Cisco IND.
7. In Cisco IND, click Activate.
8. In Cisco ISE, choose Adminstration > Deployment. Select the PSN you are using for the Cisco IND
connection, select the Profiling window, and enable the pxGrid probe.
9. The pxGrid connection between ISE and Cisco IND is now active. Verify that by displaying the IoT
endpoints that Cisco IND has found.
Add an Attribute for IND Profiling
Cisco IND may return attributes that are not in the ISE dictionary. You can add more attributes to Cisco ISE,
so you can more accurately profile that IoT device. To add a new attribute, you create a custom attribute in
Cisco ISE, and send that attribute to Cisco IND over pxGrid.
1. Choose Administration > Identity Management > Settings, and select Endpoint
Custom Attributes. Create an attribute endpoint attribute.
2. You can now use this attribute in a profiler policy to identify assets with the new
attribute. Choose Policy > Profiling, and create a new profiler policy. In the Rules
section, create a new rule. When you add an attribute/value, select the
CUSTOMATTRIBUTE folder, and the custom attribute you created.
Cisco ISE supports the following profiling protocols and profiling probes:
• LLDP and Radius - TLV 127
• DHCP - Option 161
As more IoT devices are classified, all devices of the same category or group with same MUD-URL are
assigned to the same endpoint group. For example, if a Molex light connects, and is classified, a profiler
group is created for that Molex light. As more Molex lights of the same type (with the same MUD-URL) are
classified, they inherit the same classification or endpoint identity group.
• MFC Hardware Manufacture, for example, Xerox Corporation, Google, Inc., TP-LINK
TECHNOLOGIES CO.,LTD
• MFC Hardware Mode, for example, Xerox-Printer-Phaser3250, TP-LINK-Device
• MFC Operating System, for example, Windows, Lexmark-OS
To receive multifactor classification endpoint attributes, we recommend that you enable the following probes:
• Active Directory
• DHCP
• DHCP SPAN
• DNS
• HTTP
• NetFlow
• SNMP Trap
• SNMP Query
Multifactor classification adds four new labels as endpoint attributes, enabling you to create effective
authorization policies that enhance endpoint visibility. The multifactor classification labels and the collected
data can be exported as reports.
To view and use multifactor classification attributes, you must have Advantage licenses in your Cisco ISE
deployment.
The multifactor classification profiler is enabled by default in Cisco ISE Release 3.3 and runs on Policy
Service Nodes (PSN) and the primary Policy Administration Node (PAN).
To disable multifactor classification, in the Cisco ISE administration portal, choose Work Centers > Profiler
> Settings > Profiler Settings. In the MFC Profiling area, uncheck the MFC Profiling and AI Rules
check box.
Disabling MFC Profiling stops the Multi-Factor Classification feature on all the Cisco ISE PSNs. Data
collection until the time of disablement is retained in Cisco ISE. You might continue to view the old data
in the Context Visibility > Endpoints > Authentication window.
Cisco AI-ML Rule Proposals for Endpoint Profiling does not work when you uncheck the MFC Profiling
and AI Rules check box.
The attribute data fetched by the Multi-Factor Classification feature is displayed in the Context Visibility
> Endpoints > Authentication window. Four new columns display the endpoint attribute data—MFC
Endpoint Type, MFC Hardware Manufacturer, MFC Hardware Model, MFC Operating System.
Figure 26: Multi-Factor Classification Endpoint Attributes in the Context Visibility > Endpoints Window
Rule Prioritization
Profiling rules have the following inalterable order of priority in multifactor classification, with the first
rule having the highest priority:
1. System Rules
a. Cisco-managed direct mapping attribute values. The dictionary lookup order is
MDM, Wi-Fi Device Analytics, IOT-Assets, Posture, and ACIDEX.
b. Cisco-managed MFC rules—Existing profiling policies in Cisco ISE that
generate multifactor classification labels.
2. AI-ML rules—These are user-accepted AI-ML profiling policies that generate
multifactor classification labels.
3. System library rules—Cisco-managed user agent and OUI rules.
If an MFC label is provided by a higher priority rule, the label is not overwritten by a lower priority rule.
Consider a scenario where a system rule provides an endpoint's Hardware Manufacturer label. If an AI-
ML rule exists for the endpoint containing all four labels, the Hardware Manufacturer value from the
system rule is retained. Only the other three labels are taken from the AI-ML rule.
Create Authorization Policy Sets Using Multifactor Classification Attributes
You can create authorization policy sets using multifactor classification attributes in the Policy > Policy Sets
> Default > Authorization Policy window.
Multifactor classification attributes are automatically added to the Endpoints Dictionary. When you create
a new policy or update an existing one, you can choose from the four MFC-prefixed attributes to leverage
these details and define a focused authorization policy.
The following image displays the four multifactor classification attributes available for use in the conditions
studio, along with an example of a complete policy set that uses multifactor classification endpoint attributes:
Figure 27: Authorization Policies with Conditions that Use Multifactor Classification Attributes
The ordering of the policy sets in the Authorization Policy area is important. An endpoint is profiled according
to the first policy set it matches. We recommend that you place your policy set with multifactor classification
attribute conditions ahead of other policy sets to effectively use this nuanced endpoint information.
To view the endpoints that have matched these policy sets, go to the Operations > RADIUS > Live Logs
window. If there are any changes to an endpoint’s profiling because of the newly defined policies, a CoA is
automatically triggered.
To receive AI Proposals, the Multi-Factor Classification for Enhanced Endpoint Visibility feature must be
enabled in the Work Centers > Profiler > Settings > Profiler Settings window. This feature is enabled in
Cisco ISE by default.
If both Cisco AI Analytics and MFC Profiling features are enabled, you can expect AI proposals for
the endpoints that have at least two endpoint attribute values. We recommend that you enable the
following sources for the AI proposals engine:
• Active Directory
• DHCP
• DHCP SPAN
• DNS
• HTTP
• Netflow
• Network Scan (NMAP)
• RADIUS
• SNMP Trap
• SNMP Query
The AI proposals engine does not process unique endpoint identifiers like IP and MAC addresses.
You can view, review, and apply AI Proposals in the Context Visibility > Endpoints > Endpoint
Classification window.
Cisco ISE shares any new or modified endpoint information with the AI proposals engine every 12 hours.
Endpoint data collected over the last 7 days are analyzed every 24 hours for ML modeling and rule
proposal creation.
When you apply an AI-proposed rule, only the unknown and unprofiled endpoints that are part of the
proposal group are impacted. Endpoints that are already profiled by existing system rules are not reprofiled
or impacted in any way.
The AI Proposals window displays endpoint attributes from the Multi-Factor Classification (MFC)
profiler. Each column displays the suggested label and the percentage of endpoints in the group that are
already profiled.
Click View Proposals for the endpoint group that you want to review.
Figure 28: AI Proposals for an Endpoint Group
A slide-in pane displays the rule suggestion and allows you to name the profiling policies and update label
values as required. The Profile Rule and Attributes tab displays the number of unknown endpoints in the
group, and the attribute information that informed the AI proposal. The tab also displays the last known
network access devices for the endpoints.
The Endpoints tab displays the list of endpoints in the selected proposal group.
After you edit the labels as required and review the details of the AI proposal, you can choose to accept or
reject the proposal by clicking the relevant button at the end of the pane. You cannot modify the rule condition
for a proposal. Accepting the profiling rule applies the proposal to the unknown endpoints in the selected
endpoint group.
If you reject the grouping, the proposal is removed from your Cisco ISE and will not be presented again.
Profiler Conditions
Profiling conditions are policy elements and are similar to other conditions. However unlike authentication,
authorization, and guest conditions, the profiling conditions can be based on a limited number of attributes.
The Profiler Conditions page lists the attributes that are available in Cisco ISE and their description.
Profiler conditions can be one of the following:
• Cisco Provided: Cisco ISE includes predefined profiling conditions when deployed and they are
identified as Cisco Provided in the Profiler Conditions window. You cannot delete Cisco Provided
profiling conditions.
You can also find Cisco Provided conditions in the System profiler dictionaries in the following location:
Policy > Policy Elements > Dictionaries > System.
For example, MAC dictionary. For some products, the OUI (Organizationally Unique Identifier) is an
unique attribute that you can use it first for identifying the manufacturing organization of devices. It is a
component of the device MAC address. The MAC dictionary contains the MACAddress and OUI
attributes.
• Administrator Created: Profiler conditions that you create as an administrator of Cisco ISE or
predefined profiling conditions that are duplicated are identified as Administrator Created. You can
create a profiler condition of DHCP, MAC, SNMP, IP, RADIUS, NetFlow, CDP, LLDP, and
NMAP types using the profiler dictionaries in the Profiler Conditions window.
Although, the recommended upper limit for the number of profiling policies is 1000, you can stretch up to
2000 profiling policies.
incorrect operating-system attribute for those devices. Cisco ISE displays the operating-system attribute,
even if the accuracy is not 100%.
You should configure endpoint profiling policies that use the NMAP operating-system attribute in their
rules to have low certainty value conditions (Certainty Factor values). We recommend that whenever you
create an endpoint profiling policy based on the NMAP:operating-system attribute, include an AND
condition to help filter out false results from NMAP.
The following NMAP command scans the operating system when you associate Scan OS with an endpoint profiling
policy:
nmap -sS -O -F -oN /opt/CSCOcpm/logs/nmap.log -append-output -oX - <IP-address>
The following NMAP command scans a subnet and sends the output to nmapSubnet.log:
nmap -O -sU -p U:161,162 -oN /opt/CSCOcpm/logs/nmapSubnet.log
--append-output -oX - <subnet>
-O Enables OS detection
-sU UDP scan
-p <port ranges> Scans only specified ports. For example, U:161, 162
oN Normal output
oX XML output
1 3 4 6 7 9 13 17 19
20 21 22 23 24 25 26 30 32
33 37 42 43 49 53 70 79 80
81 82 83 84 85 88 89 90 99
100 106 109 110 111 113 119 125 135
139 143 144 146 161 163 179 199 211
212 222 254 255 256 259 264 280 301
306 311 340 366 389 406 407 416 417
425 427 443 444 445 458 464 465 481
497 500 512 513 514 515 524 541 543
544 545 548 554 555 563 587 593 616
617 625 631 636 646 648 666 667 668
683 687 691 700 705 711 714 720 722
726 749 765 777 783 787 800 801 808
843 873 880 888 898 900 901 902 903
911 912 981 987 990 992 993 995 999
1000 1001 1002 1007 1009 1010 1011 1021 1022
1023 1024 1025 1026 1027 1028 1029 1030 1031
1032 1033 1034 1035 1036 1037 1038 1039 1040-1100
1102 1104 1105 1106 1107 1108 1110 1111 1112
1113 1114 1117 1119 1121 1122 1123 1124 1126
1130 1131 1132 1137 1138 1141 1145 1147 1148
1149 1151 1152 1154 1163 1164 1165 1166 1169
1174 1175 1183 1185 1186 1187 1192 1198 1199
1201 1213 1216 1217 1218 1233 1234 1236 1244
1247 1248 1259 1271 1272 1277 1287 1296 1300
1301 1309 1310 1311 1322 1328 1334 1352 1417
1433 1434 1443 1455 1461 1494 1500 1501 1503
1521 1524 1533 1556 1580 1583 1594 1600 1641
1658 1666 1687 1688 1700 1717 1718 1719 1720
1721 1723 1755 1761 1782 1783 1801 1805 1812
1839 1840 1862 1863 1864 1875 1900 1914 1935
1947 1971 1972 1974 1984 1998-2010 2013 2020 2021
2022 2030 2033 2034 2035 2038 2040-2043 2045-2049 2065
2068 2099 2100 2103 2105-2107 2111 2119 2121 2126
2135 2144 2160 2161 2170 2179 2190 2191 2196
2200 2222 2251 2260 2288 2301 2323 2366 2381-2383
2393 2394 2399 2401 2492 2500 2522 2525 2557
2601 2602 2604 2605 2607 2608 2638 2701 2702
2710 2717 2718 2725 2800 2809 2811 2869 2875
2909 2910 2920 2967 2968 2998 3000 3001 3003
3005 3006 3007 3011 3013 3017 3030 3031 3052
3071 3077 3128 3168 3211 3221 3260 3261 3268
3269 3283 3300 3301 3306 3322 3323 3324 3325
3333 3351 3367 3369 3370 3371 3372 3389 3390
3404 3476 3493 3517 3527 3546 3551 3580 3659
3689 3690 3703 3737 3766 3784 3800 3801 3809
3814 3826 3827 3828 3851 3869 3871 3878 3880
3889 3905 3914 3918 3920 3945 3971 3986 3995
3998 4000-4006 4045 4111 4125 4126 4129 4224 4242
4279 4321 4343 4443 4444 4445 4446 4449 4550
4567 4662 4848 4899 4900 4998 5000-5004 5009 5030
5033 5050 5051 5054 5060 5061 5080 5087 5100
5101 5102 5120 5190 5200 5214 5221 5222 5225
5226 5269 5280 5298 5357 5405 5414 5431 5432
5440 5500 5510 5544 5550 5555 5560 5566 5631
5633 5666 5678 5679 5718 5730 5800 5801 5802
5810 5811 5815 5822 5825 5850 5859 5862 5877
5900-5907 5910 5911 5915 5922 5925 5950 5952 5959
5960-5963 5987-5989 5998-6007 6009 6025 6059 6100 6101 6106
6112 6123 6129 6156 6346 6389 6502 6510 6543
6547 6565-6567 6580 6646 6666 6667 6668 6669 6689
6692 6699 6779 6788 6789 6792 6839 6881 6901
6969 7000 7001 7002 7004 7007 7019 7025 7070
7100 7103 7106 7200 7201 7402 7435 7443 7496
7512 7625 7627 7676 7741 7777 7778 7800 7911
7920 7921 7937 7938 7999 8000 8001 8002 8007
8008 8009 8010 8011 8021 8022 8031 8042 8045
8080-8090 8093 8099 8100 8180 8181 8192 8193 8194
8200 8222 8254 8290 8291 8292 8300 8333 8383
8400 8402 8443 8500 8600 8649 8651 8652 8654
8701 8800 8873 8888 8899 8994 9000 9001 9002
9003 9009 9010 9011 9040 9050 9071 9080 9081
9090 9091 9099 9100 9101 9102 9103 9110 9111
9200 9207 9220 9290 9415 9418 9485 9500 9502
9503 9535 9575 9593 9594 9595 9618 9666 9876
9877 9878 9898 9900 9917 9929 9943 9944 9968
9998 9999 10000 10001 10002 10003 10004 10009 10010
10012 10024 10025 10082 10180 10215 10243 10566 10616
10617 10621 10626 10628 10629 10778 11110 11111 11967
12000 12174 12265 12345 13456 13722 13782 13783 14000
14238 14441 14442 15000 15002 15003 15004 15660 15742
16000 16001 16012 16016 16018 16080 16113 16992 16993
17877 17988 18040 18101 18988 19101 19283 19315 19350
19780 19801 19842 20000 20005 20031 20221 20222 20828
21571 22939 23502 24444 24800 25734 25735 26214 27000
27352 27353 27355 27356 27715 28201 30000 30718 30951
31038 31337 32768 32769 32770 32771 32772 32773 32774
32775 32776 32777 32778 32779 32780 32781 32782 32783
32784 32785 33354 33899 34571 34572 34573 34601 35500
36869 38292 40193 40911 41511 42510 44176 44442 44443
44501 45100 48080 49152 49153 49154 49155 49156 49157
49158 49159 49160 49161 49163 49165 49167 49175 49176
49400 49999 50000 50001 50002 50003 50006 50300 50389
50500 50636 50800 51103 51493 52673 52822 52848 52869
54045 54328 55055 55056 55555 55600 56737 56738 57294
57797 58080 60020 60443 61532 61900 62078 63331 64623
64680 65000 65129 65389
Common Ports
The following table lists the common ports that NMAP uses for scanning.
Table 107: Common Ports
In addition to the common ports, you can use custom ports (Work Centers > Profiler > Policy Elements >
NMAP Scan Actions or Policy > Policy Elements > Results > Profiling > Network Scan (NMAP) Actions) to
specify automatic and manual NMAP scan actions. NMAP probes collect the attributes from endpoints via the
specified custom ports that are open. These attributes are updated in the endpoint's attribute list in the ISE Identities
page (Work Centers > Network Access > Identities > Endpoints). You can specify up to 10 UDP and 10 TCP
ports for each scan action. You cannot use the same port numbers that you have specified as common ports
NMAP Include Service Version Information Scan
The Include Service Version Information NMAP probe automatically scans the endpoints to better classify
them, by collecting information about services running on the device. The service version option can be
combined with common ports or custom ports.
Example: CLI Command: nmap -sV -p T:8083 172.21.75.217 Output:
Node Choose the ISE node from which the NMAP scan is run.
Manual Scan Enter the range of subnet IP addresses of endpoints for which you want to run the
Subnet NMAP scan.
Configure NMAP Scan You will be directed to the Work Centers > Profiler > Settings > NMAP Scan
Subnet Exclusions At Subnet Exclusions window. Specify the IP address and subnet mask that should be
excluded. If there is a match, the NMAP scan is not run.
Select an Existing NMAP Displays the Existing NMAP Scan Actions drop-down list that displays the default
Scan profiler NMAP scan actions.
Reset to Default Scan Click this option to restore default settings (all scan options are checked).
Options
No, use existing Check this check box to assign endpoints to the matching parent endpoint identity group using
Identity Group hierarchical construction of profiling policies and identity groups.
hierarchy
This option allows you to make use of the endpoint profiling policies hierarchy to assign endpoints to
one of the matching parent endpoint identity groups, as well as to the associated endpoint identity
groups to the parent identity group.
For example, endpoints that match an existing profile are grouped under the appropriate parent endpoint
identity group. Here, endpoints that match the Unknown profile are grouped under Unknown, and
endpoints that match an existing profile are grouped under the Profiled endpoint identity group. For
example,
• If endpoints match the Cisco-IP-Phone profile, then they are grouped under the Cisco-IP-Phone
endpoint identity group.
• If endpoints match the Workstation profile, then they are grouped under the Workstation
endpoint identity group.
The Cisco-IP-Phone and Workstation endpoint identity groups are associated to the Profiled
endpoint identity group in the system.
Parent Policy Choose a parent profiling policy that are defined in the system to which you want to associate the new
endpoint profiling policy.You can choose a parent profiling policy from which you can inherit rules and
conditions to its child.
Associated Choose one of the following CoA types that you want to associate with the endpoint profiling policy:
CoA Type
• No CoA
• Port Bounce
• Reauth
• Global Settings that is applied from the profiler configuration set in Administration
> System > Settings > Profiling
Rules One or more rules that are defined in endpoint profiling policies determine the matching profiling policy
for endpoints, which allows you to group endpoints according to their profiles. One or more profiling
conditions from the policy elements library are used in rules for validating endpoint attributes and their
values for the overall classification.
Conditions Click the plus [+] sign to expand the Conditions anchored overlay, and click the minus [-] sign, or click
outside the anchored overlay to close it.
Click Select Existing Condition from Library or Create New Condition (Advanced Option) .
Select Existing Condition from Library: You can define an expression by selecting Cisco predefined
conditions from the policy elements library.
Create New Condition (Advanced Option): You can define an expression by selecting attributes from
various system or user-defined dictionaries.
You can associate one of the following with the profiling conditions:
• An integer value for the certainty factor for each condition
• Either an exception action or a network scan action for that condition
Choose one of the following predefined settings to associate with the profiling condition:
• Certainty Factor Increases: Enter the certainty value for each rule, which can be added for all the
matching rules with respect to the overall classification.
• Take Exception Action: Triggers an exception action that is configured in the Exception Action
field for this endpoint profiling policy.
• Take Network Scan Action: Triggers a network scan action that is configured in the Network Scan
(NMAP) Action field for this endpoint profiling policy.
Select Existing You can do the following:
Condition from
• You can choose Cisco predefined conditions that are available in the policy elements library, and
Library
then use an AND or OR operator to add multiple conditions.
• Click the Action icon to do the following in the subsequent steps:
• Add Attribute or Value: You can add ad-hoc attribute or value pairs
• Add Condition from Library: You can add Cisco predefined conditions
• Duplicate: Create a copy of the selected condition
• Add Condition to Library: You can save ad-hoc attribute/value pairs that you create to the
policy elements library
• Delete: Delete the selected condition.
Create New You can do the following:
Condition
• You can add ad-hoc attribute/value pairs to your expression, and then use an AND or OR operator to
(Advance Option)
add multiple conditions.
• Click the Action icon to do the following in the subsequent steps:
• Add Attribute or Value: You can add ad-hoc attribute or value pairs
• Add Condition from Library: You can add Cisco predefined conditions
• Duplicate: Create a copy of the selected condition
• Add Condition to Library: You can save ad-hoc attribute/value pairs that you create to the
policy elements library
• Delete: Delete the selected condition. You can use the AND or OR operator