cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
9802
Views
8
Helpful
18
Replies

Logging MAC address of endpoints connecting over VPN

Istvan Segyik
Cisco Employee
Cisco Employee

Dear Colleagues,

The customer would like to log the MAC addresses of the endpoints connecting over VPN into their SIEM.

As far as I know we can't do that. Seemingly we can't even send the MAC to ISE from ASA over the MDM-tlv attributes.

Is there any trick, e.g. getting the MAC address from Windows registry with the posture scan agent and log that out somehow, or custom DAP LUA script running on ASA?

Best regards,

Istvan

1 Accepted Solution

Accepted Solutions

Hostscan should not be required.   Viktor is correct and  not all OSes will expose the MAC address to an application. 

I would debug the RADIUS at the ASA or could get packet capture after ASA to see the RADIUS attributes (or TCP dump at PSN).  You will see the mdm-tlvs that are being sent.  Most Windows clients expose the MAC address.

Support to send MDM TLV attributes over RADIUS via ACIDEX requires ASA 9.3.2+ and AC 4.1+.

Craig

View solution in original post

18 Replies 18

Timothy Abbott
Cisco Employee
Cisco Employee

Istvan,

Not that I'm aware of and I don't think extracting the MAC using posture is going to work because of the possibility the endpoint has more than one NIC.  I don't think what you are asking for is currently possible.

Regards,

-Tim

Hi Tim,

Thank you. Please follow my post that I am adding below. I re-tested in a dcloud LAB for some reasons the MAC is now there and seemingly it has been parsed from the ASA mdm-tlv attribute.

vibobrov
Cisco Employee
Cisco Employee

What version of ASA, Anyconnect and ISE are you using? Anyconnect on Windows and MAC send the client MAC address to ASA. Latest version of ASA (9.3+ I think) will send that information to ASA via ACIDEX. New versions of ISE (1.4+ I think, but may be later) will log that MAC address.

MAC address is not made available to Anyconnect client on iOS by Apple. To keep mobile clients consistent, Android version of Anyconnect also does not send the MAC address to the ASA. So for those mobile devices, you won't get the MAC address from Anyconnect.

Istvan Segyik
Cisco Employee
Cisco Employee

Hi Tim, Viktor,

I have opened the dCloud Rapid Threat Containment lab where I knew that we use ASAv and AnyConnect with ISE (actually 2.0).

I used the same lab but a different pod before. That time no MAC address was presented in Livelog in ISE and the 'mdm-tlv=device-mac=...' string was not in the Cisco A/V pair in the authentication event details.

This last time the MAC address was presented without any change.

The questions are:

- How can this behavior controlled?

- Once it is there, can we send it to an upstream SIEM over syslog?

Auth_details_with_MAC.jpg

Livelog_with_MAC.jpg

The test I did in my lab didn't send the MAC address either but I was using a different version of anyconnect.  I was using the latest version of AnyConnect for IOS so I'm wondering if it is version / platform specific.  I'll ask one of my AC colleagues to chime in.  If the MAC address shows up in the live log / session directory, ISE can forward that information over syslog.

Regards,

-Tim

Thank you in advance!

Hi Istvan,

I mentioned about this in my previous post. Apple blocks any Apps from accessing the MAC address, so you will never get a MAC address from Anyconnect on iOS. You will find the same for Android. Although, on Android, Anyconnect can get the MAC, the BU disabled it to keep all mobile clients consistent.

Hi Viktor,

At the moment the focus is Windows. And it seems - Tim's anyconnect friend hasn't confirmed yet - sending MAC address is not consistent across AnyConnect for Windows versions.

Hopefully Time can come up with a response from his fellow engineer.

Do you have Hostscan enabled on the PC that's not reporting the MAC address? That may be required for Anyconnect to grab the MAC address.

On the firewall, enable debug dap trace and see what attributes you're seeing there.

Hostscan should not be required.   Viktor is correct and  not all OSes will expose the MAC address to an application. 

I would debug the RADIUS at the ASA or could get packet capture after ASA to see the RADIUS attributes (or TCP dump at PSN).  You will see the mdm-tlvs that are being sent.  Most Windows clients expose the MAC address.

Support to send MDM TLV attributes over RADIUS via ACIDEX requires ASA 9.3.2+ and AC 4.1+.

Craig

Hi Craig,

Thank you for Jumping in.

So can we say that with ASA 9.3.2 and AC 4.1 or later this is expected to work, if not there is something to troubleshoot?

Please run debug dap trace on the ASA to see what attributes anyconnect is reporting to the ASA. And as chyps mentioned, debug radius