Skip to content

Helps move Cisco ISE wired deployments from Low Impact to Full Enforcement by analyzing authentication reports to identify endpoints hitting Low Impact or Monitor Mode policies.

License

Notifications You must be signed in to change notification settings

gobblegoob/lowimpactplus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Contributors Forks Stargazers Issues MIT License LinkedIn


lowimpactplus

Analyze RADIUS reports for a concise list of wired endpoints hitting specified catch-all policies.
For ISE 3.x versions, use the ISE3 branch!
· Report Bug · Request Feature

Table of Contents
  1. About The Project
  2. Getting Started
  3. Usage
  4. Roadmap
  5. Contributing
  6. License
  7. Contact
  8. Acknowledgments

About The Project

Helps you move toward full wired enforcement by identifying endpoints that are hitting a catch-all permit policy. This phase may be referred to as Low Impact, and helps administrators pushing 802.1x out to their switch ports avoid accidently denying access to an endpoint that has no relevant authorization policy yet. Often, this is a MAB authorization policy at the bottom of your policy list that will simply permit access to all endpoints.

This script ingests a .csv RADIUS Authentications report from Cisco ISE. It deduplicates and weeds out endpoints that are no longer hitting Low Impact catch-all policies. You are left with a csv file listing only the hosts that are hitting the low impact policy. This makes it easy to get a count of endpoints you need to address before you disable your catch-all policy, moving into your final enforcement plan.

(back to top)

Built With

Getting Started

Dependencies:

  • pandas => 1.3.4

Installation

  1. Clone the repo
    git clone https://github.com/gobblegoob/lowimpactplus.git
  2. Install the requirements
pip install -r requirements.txt

(back to top)

Usage

In brief:

  1. Modify the script variables to match your targeted policies.
    • Edit the src_report variable to match the RADIUS report csv file you wish to analyze

src_report

- This is done by editing the li_policy_list list variable to reflect your designated low impact policies.

li_policy_list

2. Export a 30 Day RADIUS Authentication report as a csv file to your selected repository. This will give you the most complete report 3. Save the report csv file to the lowimpact plus directory 4. Execute the script ```sh python3 lowimpactplus.py ``` 5. Use the output file to help you identify and remediate endpoints found

(back to top)

Roadmap

  • Add arguments to set input file
  • Add gui to select input file
  • Utilize OpenPyxl to change output to formatted xml spreadsheet for cleaner deliverable

See the open issues for a full list of proposed features (and known issues).

(back to top)

License

Distributed under the MIT License. See LICENSE.txt for more information.

(back to top)

Contact

Project Link: https://github.com/gobblegoob/lowimpactplus

(back to top)

About

Helps move Cisco ISE wired deployments from Low Impact to Full Enforcement by analyzing authentication reports to identify endpoints hitting Low Impact or Monitor Mode policies.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages