Endpoint Compliance Flashcards

1
Q

Posture Configuration flow

A

Posture Conditions (What conditions need to be met)

Posture Remediation (Actions for endpoints where Condition isn’t met)

Posture Requirement (Ties together Condition & Requirement)

Posture Policy (Tie together multiple Requirements)

Client Provisioning (Configure settings for AnyConnect)

Access Policy (Tie Posture Policy against Unknown, Non-Compliant or Compliant Authorization policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Posture Condition

A

What CAN be checked & Which conditions need to be met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Posture Remediation

A

What actions are taken if an endpoint fails the Posture Conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Posture Requirement

A

Posture Condition + Posture REmediation + OS + AnyConnect Compliance Module Type/Version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Posture Policy

A

Tie together multiple Requirements and enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client Provisioning

A

Configure settings for AnyConnect agent on ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Policy

A

Configure Unknown, Compliant & Non-Compliant authorization policies.
Unknown endpoints get re-directed to ISE Client Provisioning Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CoA used for

A

Following initial authentication and authorization CoA allows ISE to initiate a request to a NAD to disconnect user session, bounce the port or have endpoint or user perform re-authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CoA Types

A

No CoA: Device remains in Unknown state until next re-authentication
Port Bounce / Session Bounce: ISE forces NAD to reset switchport (wired) or bounce session (Wireles)
Reauth: Forces user/endpoint to re-authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is MAB

A

MAC Authentication Bypass

Device without 802.1x supplicant uses MAC address to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAB RADIUS Service-Type

A

Call-Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How MAB Works

A

MAC address of endpoint is added to Endpoint Identity Group in ISE.
AuthZ Policy configured for MAB devices.
Device authenticates using MAC address
ISE does Lookup against Endpoint Identity Group
If MAC is present AuthC is granted and AuthZ policy applied.
Access-Accept Returned to NAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC address length

A

48-bit Hexadecimal

e.g 1A:2B:3B:4D:5E:6F

1A:2B:3C = Organization Unique Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Devices which often lack Supplicants

A

Printers, Scanners, IP Cameras, Door Card readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can Posture Assessment check for

A

Files including existence, version, date
Registry conditions on Windows OS
If service is running on Windows OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Posture Status types are available

A

Compliant, Non-Compliant, Unknown

17
Q

What happens to Non-Compliant endpoints

A

redirect ACL is defined as dACL and web redirection pointed to Client Profiling Portal on ISE

18
Q

Components of Posture Requirement

A

Conditions & Remediation

19
Q

Ports used in Posture between ISE and endpoint

A

TCP/80

TCP/8905

20
Q

Profiling Probe which collects User-Agent string

A

HTTP

21
Q

ISE service which allows endpoint compliance to be checked

A

Posture

22
Q

Endpoint Identity Group which holds devices which dint match any profile

A

Unknown

23
Q

Which probes need to be used to allow Profile service to bind IP and MAC address

A

RADIUS & DHCP Probes

24
Q

Portal used by endpoint to download Compliance Module

A

Client Provisioning Portal

25
Q

Service used to Identify endpoint device types connecting to network

A

Profiling