Cisco NAC Appliance - Clean Access Manager Configuration Guide, Release 4.8(3)
Monitoring and Troubleshooting Agent Sessions
Downloads: This chapterpdf (PDF - 1.04MB) The complete bookPDF (PDF - 19.87MB) | Feedback

Monitoring and Troubleshooting Agent Sessions

Table Of Contents

Monitoring and Troubleshooting Agent Sessions

Viewing Agent Reports

Exporting Agent Reports

Limiting the Number of Reports

Create Agent Log Files Using the Cisco Log Packager

Manage Certified Devices

Add Exempt Device

Clear Certified or Exempt Devices Manually

View Reports for Certified Devices

View Switch/WLC Information for Out-of-Band Certified Devices

Configure Certified Device Timer

Add Floating Devices

Report Settings

Settings

Current Status

Canned Reports

User Activity Log Files

Known Issues

Online Users list

Interpreting Active Users

View Online Users

In-Band Users

Out-of-Band Users

Display Settings

Agent Troubleshooting

Debug Logging for Cisco NAC Appliance Agents

Generate Cisco NAC Agent Debug Logs

Cisco NAC Web Agent Logs

Generate Mac OS X Agent Debug Log

Client Cannot Connect/Login

No Agent Pop-Up/Login Disabled

Client Cannot Connect (Traffic Policy Related)

AV/AS Rule Troubleshooting

Cisco NAC Web Agent Status Codes

Known Issue for Windows Script 5.6

Known Issue for MS Update Scanning Tool (KB873333)


Monitoring and Troubleshooting Agent Sessions


This chapter provides information on compiling and accessing various Cisco NAC Appliance Agent reports and log files and troubleshooting Agent connection and operation issues:

Viewing Agent Reports

Create Agent Log Files Using the Cisco Log Packager

Manage Certified Devices

Report Settings

Online Users list

Agent Troubleshooting

Viewing Agent Reports

The administrator Agent Reports page (under Device Management > Clean Access > Clean Access Agent > Reports > Report Viewer) gives you detailed information about user Agent sessions. The information includes user access attempts and system check results.

Using the Reports page, administrators can log and search Agent reports to facilitate information gathering and export compiled report data to aid statistical analysis and Agent connection issue troubleshooting. The Reports page presents Agent report entry information using the following column headings:

Status—Green or red flag indicates successful or unsuccessful Agent connection

User—The user ID used to establish the session from the client machine

Agent—Specifies the type of Cisco NAC Appliance Agent used to initiate the client session

Type—Specifies whether the report has been generated due to Login posture or Passive Re-assessment.

IP—The client machine IP address

MAC—The client machine interface MAC address

OS—The operating system detected on the client machine

Time—The date and time the user attempted to initiate the Agent session


Note Report List entries with a red background indicate clients who failed system checking.


Figure 11-1 Agent Administrator Report

The Reports page also enables you to filter the list of user session reports by activating and defining additional client report display criteria. For example, if you have a very large user access base where users log in every day (even multiple times per day) and you want to limit the number of reports to a more manageable total, you can choose to display user session information for a single user ID or all user sessions from a specific device. The filter parameters available in the dropdown menu are:

Status—Allows you to list either successful or unsuccessful, or both types of user sessions

Username—Allows you to specify all or part of a specific user ID to display in the client report list

IP—Allows you to limit the list of client reports to match all or part of a specified IP address (you could use this parameter to limit the user list to only IP addresses in the 10.12.4.<x> range by specifying "starts with" "10.12.4.", for example)

MAC—Allows you to limit the list of client reports to match all or part of a specified source MAC address

OS—Allows you to display client reports based on the operating system detected on the client machine

Time—Allows you to display client report entries either since or before a point in time (like within the last hour or before the last day, for example)

Software—Allows you to display client reports for specific installed AntiVirus, Antispyware, and/or any Unsupported AV/AS software

Requirement—Allows you to display only client reports associated with a specific Agent requirement

Requirement Status—Allows you to display client reports for successful or unsuccessful Agent requirements for the specified Requirement (above)

System Name—Allows you to display client reports associated with all or part of a specific client system name

System User—Allows you to display client reports associated with a specific system user (that is, the user logged in to the client machine at the time the actual user session was initiated, which is not necessarily the same ID as the Username, above)

System Domain—Allows you to display only client reports based on the system domain into which the client machine has been logged in

User Domain—Allows you to display only client reports based on the user domain with which client System User ID is associated

Click the Filter button after selecting and defining parameters for any of the search options to display a summary of all client report entries that match the criteria as well as the detailed administrator report for each client.

For example, you can use the OS filter option to refine the Agent report display to a smaller number of report entries by selecting one of the options form the dropdown list (Figure 11-2).

Figure 11-2 Agent Administrator Report—OS Filter Option

You can click Reset to negate any of the optional search criteria from the filter dropdown menu and return the client report display list to default settings.

Click the View icon (far-right magnifying glass icon) to see an individual user report, as shown in Figure 11-3.

Figure 11-3 Example Agent Report

In addition to user, operating system, Agent version, and domain information, the Agent report lists the requirements applicable for the user role (both mandatory and optional). Requirements that the user met are listed in green, and failed requirements are listed in red. The individual checks making up the requirement are listed by status of Passed, Failed, or Not executed. This allows you to view exactly which check a user failed when a requirement was not met.

Not Executed checks are checks that were not applied, for example because they apply to a different operating system. Failed checks may be the result of an "OR" operation. To clear the reports, click the Delete button. The button clears all the report entries that are currently selected by the filtering criteria.

Exporting Agent Reports

You can use the Export and Export (with text) buttons to save CSV files containing Agent report data to your local hard drive to search, view, and manipulate whenever needed for troubleshooting or statistical analysis purposes.


Step 1 Go to under Device Management > Clean Access > Clean Access Agent > Reports > Report Viewer (see Figure 11-4).

Step 2 Click Export or Export (with text).


Note Due to limits native to the Microsoft Excel application, you can only export up to 65534 entries using this function.


Figure 11-4 Exporting Agent Reports

Step 3 Do one of the following:

Click Open to view the resulting Agent report file.

Click Save, navigate to a directory on your local machine where you want to save the Agent report file, enter a name for the file, and click Save in the navigation dialog so you can view the report at a later date.


Limiting the Number of Reports

You can limit the number of reports in the log under Device Management > Clean Access > Clean Access Agent > Reports > Report Setting. Specify the maximum number of reports as a value between 100 and 200000 (default is 30000).

Agent reports are stored in their own table and are separate from the general Event Logs.

Create Agent Log Files Using the Cisco Log Packager

When users download the Cisco NAC Agent, the installation process also adds the Cisco Log Packager utility to the client machine in the same relative Program File location as Agent files. The Log Packager utility compiles and saves a number of different types of Agent logs in a single .zip file (named CiscoSupportReport.zip) and saves it on the client machine's desktop, so the user can access the information easily and forward on to network administrators to help troubleshoot Agent session login and/or operation issues.


Note In Cisco NAC Appliance Release 4.6(1) and later, the Cisco Log Packager application is only available for English and Japanese Windows platforms.


To launch the Cisco Log Packager:


Step 1 On the Windows client machine, navigate to Start > Program Files > Cisco > Client Utilities > Cisco Log Packager (Figure 11-5).

Figure 11-5 Cisco Log Packager

Step 2 Click Collect Data and wait for the Cisco Log Packager to complete compiling the Agent log information. This step takes anywhere from several seconds to a couple of minutes or so. The process is complete when you see a "Log file has been archived" message in the Cisco Log Packager display window and the Copy to Clipboard and Locate Log File buttons become active (Figure 11-6).

Figure 11-6 Cisco Log Packager—Log File Archive Complete

Step 3 To automatically navigate to the location on the client machine where the log file has been compiled and saved, click Locate Log File. A Windows Explorer dialog box opens highlighting the location of the new CiscoSupprtReport.zip log file on the client machine desktop (Figure 11-7).

Figure 11-7 Agent Log File Location

Use the CiscoSupprtReport.zip log file to help diagnose and troubleshoot Agent login/operation issues. Users can send the .zip file to their respective Cisco NAC Appliance system administrator or, if performing local troubleshooting, extract and view the contents of the various Cisco Log Packager files on the client machine. For details on the files included in the CiscoSupprtReport.zip log file and their purpose, see Figure 11-7.

Table 11-1 Cisco Log Packager Files

Agent Log File Name
Contents/Description

CiscoSupportReportLog.txt

This text file contains client machine system information, including CPU usage and memory allocation.

ipinfo.log

This log file contains network configuration and network connection status, including client machine IP interface status, IP statistics, and the client ARP table.

NACAgentLogPlugin.log

This user-inaccessible log is one of the modules in the LogPacker component that calls the NACAgentDiags function to generate the NACAgentDiagnosticLog.txt log report.

NACAgentDiagnosticsLog.txt

This user-inaccessible text file contains diagnostic messages used to help debug AV issues.

NACAgentDiagsLogMessages.txt

This text file contains other regular log messages not used in the diagnostics output.

NACAgentLogCurrent.log

This is an encrypted log file that contains the current Cisco NAC Agent messages from the active session and is used primarily to help debug Cisco NAC Agent issues. When the system reboots or services have been restarted, the existing NACAgentLogOld.log is erased, the active NACAgentLogCurrent.log becomes the new NACAgentLogOld.log, and a new NACAgentLogCurrent.log is created.

Note You can configure the size of Agent log files using the LogFileSize parameter in the NACAgentCFG.xml Agent configuration XML file. If set to 0, no logging takes place. If set to non-zero, then the log file does not grow larger than the value (in Megabytes). The default is 5 MB. When NACAgentLogCurrent.log reaches the setting value, it is copied to NACAgentLogOld.log and a new NACAgentLogCurrent.log is created.

NACAgentLogOld.log

This is an encrypted log file that contains output from the previous active Cisco NAC Agent session and is also used to help debug Cisco NAC Agent issues. This file is created in one of two ways:

The "archived" log file from an active Cisco NAC Agent session that reached its maximum size (configured using the LogFileSize parameter in the NACAgentCFG.xml Agent configuration XML file).

When the system reboots or services are restarted, the existing NACAgentLogOld.log is erased, the active NACAgentLogCurrent.log becomes the new NACAgentLogOld.log, and a new NACAgentLogCurrent.log is created.


Users can open any of the .txt files on the client machine using a standard text editor application and view the report contents. Figure 11-8 shows the contents of a CiscoSupportReportLog.txt file opened using Microsoft Notepad on the client machine.

Figure 11-8 CiscoSupportReportLog.txt File Contents


Manage Certified Devices

This section describes the following:

Add Exempt Device

Clear Certified or Exempt Devices Manually

View Reports for Certified Devices

View Switch/WLC Information for Out-of-Band Certified Devices

Configure Certified Device Timer

Add Floating Devices

The Clean Access Manager web console provides two important lists that manage users and their devices: the Online Users list (both In-Band and Out-of-Band) and Certified Devices List. The Online Users list displays logged-in users by IP address and login credentials (see Interpreting Event Logs). When a user device passes network scanning or meets Agent Requirements, the Clean Access Server automatically adds the MAC address of the device to the Certified Devices List (for users with Layer 2 proximity to the CAS).


Note Because the Certified Devices List is based on client MAC addresses, the Certified Devices List never applies to users in Layer 3 deployments. Web login users that are one or more Layer 3 hops away from the CAS are tracked by IP address only, unless the ActiveX/Java applet web client is enabled for the login page (to obtain the MAC address of the client). For further details on Layer 3 deployment, see "Enable L3 Deployment Support" in the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3).


Dropping an In-Band user from the In-Band Online Users list does not remove the client device from the Certified Devices List. However, manually dropping an In-Band client from the Certified Devices List automatically removes the user from the network and the In-Band Online Users list.

Dropping an Out-of-Band user from the Out-of-Band Online Users list has different results depending on your Cisco NAC Appliance configuration:

In a deployment where Out-of-Band Logoff has been enabled, the client machine is also automatically removed from the Certified Devices List.

If Out-of-Band Logoff is not enabled and you kick the user from the Out-of-Band Online Users list, the client machine stays in the Certified Devices List just as with an In-Band deployment.

For more information on Out-of-Band logoff, see Configure Out-of-Band Logoff.

For network scanning, once on the Certified Devices List, the device does not have to be recertified as long as its MAC address is in the Certified Devices List, even if the user of the device logs out and accesses the network again as another user. Dropping a client from the Certified Devices List forces the user to repeat authentication and the device to repeat network scanning to be readmitted to the network. (Multi-user devices should be configured as floating devices to require recertification at each login.) You can make sure that a device is always removed from the Certified Devices List when a network scanning user logs off by enabling the option Require users to be certified at every web login in the General Setup > Web Login tab (see Client Login Overview.)

For Agent users, devices always go through Agent Requirements at each login, even if the device is already on the Certified Devices List. In addition, the Certified Devices List only records the first user that logged in with the device. This helps to identify the authenticating user who accepted the User Agreement Page (for web login users) or the Network Policy Page (for Agent users) if either page was configured for the role. See Table 1-2 "Web Login—General Setup Configuration Options" and Table 1-3 "Web Login User Page Summary" for details on these pages.

A certified device remains on the Certified Devices List until:

The list is automatically cleared using a Certified Devices Timer.

The administrator manually clears the entire list.

The administrator manually drops the client from the list.

The user logs out or is removed from the network, and the Require users to be certified at every web login option is checked for the role from the General Setup > Web Login page.

Devices automatically added to the Certified Devices List can be cleared manually or cleared automatically at specified intervals. Because the administrator must manually add exempt devices to the list, the administrator must also manually remove them. This means that an exempt device on the Certified Devices List is protected from being automatically removed when the global Certified Devices Timer form is used to clear the list at regularly scheduled intervals.

Clearing devices from the Certified Devices List (whether manually or automatically) performs the following actions:

Removes IB clients from the In-Band Online Users list and logs them off the network.

Removes OOB clients from the Out-of-Band Online Users list and bounces their port
(unless port bouncing is disabled for OOB VGW; see Add Port Profile for details).

Forces client devices to repeat posture assessment at the next login.

Once off the Certified Devices List, the client must pass network scanning and meet Agent Requirements again to be readmitted to the network. You can add floating devices that are certified only for the duration of a user session. You can also exempt network scanning devices from Nessus Scanning altogether by manually adding them to the Certified Devices List.

If using a Certified Device timer, you can configure whether or not a user is removed when the list is cleared by enabling/disabling the Keep Online Users option for the timer. See Configure Certified Device Timer for further details.

Note that logging an IB user off the network from Monitoring > Online Users > View Online Users does not remove the client from the Certified Devices List. This allows the user to log in again without forcing the client machine to go through posture assessment again. Note that for Agent users, devices always go through Agent Requirements at each login, even if the device is already on the Certified Devices List.


Note Because the Certified Devices List displays users authenticated and certified based on known L2 MAC address, the Certified Devices List does not display information for remote VPN/multihop L3 users tracked by IP address only. To view these authenticated remote VPN/multihop L3 users, see the In-Band Online Users list. The User MAC field for these user entries appears as "00:00:00:00:00:00."


For further details on terminating active user sessions, see Interpreting Active Users and Out-of-Band Users.

If a certified device is moved from one CAS to another, it must go through Nessus Scanning again for the new CAS unless it has been manually added as an exempt device at the global level for all Clean Access Servers. This allows for the case where one Clean Access Server has more restrictive posture assessment requirements than another.

Though devices can only be certified and added to the list per Clean Access Server, you can remove certified devices globally from all Clean Access Servers or locally from a particular CAS only (see the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3) for additional details.) For additional information, see also Out-of-Band Users.

Add Exempt Device

Designating a device as Exempt excludes the device from Network Scanning (Nessus scans) and no network scanning report is generated for the client. Exempting a device manually adds it the to Certified Devices List and allows it to bypass network scanning as long as its MAC address remains on the list.


Note Adding a device as Exempt does not exempt the client machine from Agent posture assessment.



Note For details on how to allow users/devices to bypass authentication, see Global Device and Subnet Filtering.


To add an exempt device:


Step 1 Go to Device Management > Clean Access > Certified Devices > Add Exempt Device.

Figure 11-9 Add Exempt Device

.

Step 2 Type the MAC address in the Exempt Device MAC Address field. To add several addresses at once, use line breaks to separate the addresses.

Step 3 Click Add Exempt.

Step 4 The Certified Devices List page appears, highlighting the exempt devices (Figure 11-10).


Note Exempt devices added with these forms are exempt for all Clean Access Servers. To designate an exempt device for only a particular Clean Access Server, see the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3).


Figure 11-10 Clean Access Certified Devices List


Clear Certified or Exempt Devices Manually

To clear device MAC addresses, go to Device Management > Clean Access > Certified Devices > Certified Devices List and click:

Clear Exempt to remove only the MAC addresses that were added manually with the Add Exempt button.

Clear Certified to remove only the MAC addresses that were added automatically by the Clean Access Server.

Clear All to remove MAC addresses of both exempt and certified devices.

Remove individual addresses individually by clicking Delete next to the MAC address.

View Reports for Certified Devices

You can view the results of previous Agent scans for certified devices under Device Management > Clean Access > Clean Access Agent > Reports. Click the View icon to see which requirements, rules, and checks succeeded or failed for an individual client. See View Scan Reports for details.

You can view the results of previous network scans for certified devices at any time from Device Management > Clean Access > Network Scanner > Reports. Click the Report icon to see an individual scan report. See View Scan Reports for details.

View Switch/WLC Information for Out-of-Band Certified Devices

For Out-of-Band users only, the Certified Devices List (Figure 11-10) populates the Location column with a the IP address and specific port on the Out-of-Band switch, or (in the case of a Wireless LAN controller) the IP address and SSID for the specific Out-of-Band WLC.

For further details on OOB clients, see:

Chapter 3 "Switch Management: Configuring Out-of-Band Deployment" and Out-of-Band Users

Chapter 4 "Wireless LAN Controller Management: Configuring Wireless Out-of-Band Deployment"

Configure Certified Device Timer

You can configure Certified Device Timers to automatically clear the Certified Device list at specified intervals. The Certified Devices List no longer needs to be cleared in its entirety each time the timer is applied. Administrators can now:

Clear the Certified Devices List per Clean Access Server, User Role, or Authentication Provider, or a combination of all three.

Clear certified devices without removing users from the network with the "Keep Online Users" option. When the "Keep Online Users" option is checked, user sessions are not immediately ended when clearing the list, but at user logout time (or at linkdown for OOB). Devices can re-enter the list after user authentication and device remediation.

Clear the Certified Devices List all at once or in batches (to manage user re-login and certification during peak times). You can clear devices according to how long they have been on the list and/or in fixed time interval batches. This facilitates CAM database management when clearing large numbers of devices.

Configure multiple independent timers. Administrators can create and save multiple instances of Certified Device Timers (similar to a Scheduled Job/Task). Each Timer is independent of the others and can be maintained separately. For example, if managing 6 CAS pairs, the administrator can create a different Timer for each pair of HA-CASs.


Step 1 Go to Device Management > Clean Access > Certified Devices > Timer. The List page appears by default.

Figure 11-11 Certified Devices Timer—List

Step 2 Click the New sublink to bring up the New Timer configuration form.

Figure 11-12 New Certified Devices Timer

Step 3 Type a Timer Name for the timer.

Step 4 Type an optional Description of the timer.

Step 5 Click the checkbox for Enable this timer to apply the timer right away after configuration.

Step 6 Click the checkbox for Keep Online Users if you only want to remove client devices from the Certified Devices List without removing the users from the network.

Step 7 Type the Start Date and Time for the timer, using format: YYYY-MM-DD hh:mm:ss. The Start Date and Time sets the initial date and time for this timer to clear the Certified Devices List.

Step 8 Type a Recurrence in days to set the repeat interval for this timer. For example, a Recurrence of 7 will clear the Certified Devices List 7 days after the initial clearing and at the same Start Time specified. Typing 0 will clear the Certified Devices List only once.

Step 9 Choose from any of the dropdown menus to apply this timer by the following Criteria:

a. Clean Access Server: Apply this timer to Any CCA Server (default) or to a specific CAS by IP address.

b. User Role: Apply this timer to Any User Role (default) or to a specific system user role

c. Provider: Apply this timer to Any Provider (default) or to a specific system Auth Provider (Local DB or any other)

Step 10 Type a Minimum Age in days to only clear devices that have been on the Certified Devices List for the number of days specified. Typing 0 clears all devices regardless of how long they have been on the Certified Devices List.

Step 11 Choose a clearing Method for how much of the Certified Devices List (sorted by Criteria) this timer should clear at one time. Options are:

a. Clear all matching certified devices.

b. Clear the oldest [] matching certified devices only. (for example, "10" clears the ten oldest certified devices in the sort list)

c. Clear the oldest [] certified devices every [] minutes until all matching certified devices are cleared.

Step 12 When done, click Update. This saves the Timer in the Certified Devices Timer List.


Note For additional information on terminating user sessions, see also Configure User Session and Heartbeat Timeouts.



Add Floating Devices

A floating device is certified only for the duration of a user session. Once the user logs out, the next user of the device needs to be certified again. Floating devices are useful for managing shared equipment, such as kiosk computers or wireless cards loaned out by a library.

In addition to session-length certification, you can configure devices that are never certified. This is useful for multi-user devices, such as dial-up routers that channel multi-user traffic from the untrusted side of the network. In this case, the Clean Access Server will see only that device's MAC address as the source and destination of the network traffic. If the device is allowed to be certified, after the first user is certified, additional users would be exempt from certification. By configuring the router's MAC address as a floating device that is never certified, you can ensure that each user accessing the network through the device is individually assessed for vulnerabilities/requirements met.

In this case, the users are distinguished by IP address. Users must have different IP addresses. If the router performs NATing services, the users are indistinguishable to the Clean Access Manager and only the first user will be certified.

Figure 11-13 shows the Floating Devices tab.

Figure 11-13 Floating Devices


Note For VPN concentrator/multihop L3 deployment, administrators must add the MAC address of the router/VPN concentrator to the Floating Device list (example entry: 00:16:21:11:4D:67 1 vpn_concentrator). See "Integrating with Cisco VPN Concentrators" in the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3).


To configure a floating device:

1. Go to Device Management > Clean Access > Certified Devices > Add Floating Device.

2. In the Floating Device MAC Address field, enter the MAC address. Type the entry in the form:

<MAC> <type> <description>
 
   

Where:

<MAC> is the MAC address of the device.

<type> is either:

0 for session-scope certification, or

1 if the device should never be considered certified

<description> is an optional description of the device.

Include spaces between each element and use line breaks to separate multiple entries. For example:

 00:16:21:23:4D:67 0 LibCard1 
 00:16:34:21:4C:68 0 LibCard2 
 00:16:11:12:4A:71 1 Router1 
 
   

3. Click Add Device to save the setting.

To remove a floating device, click the Delete icon for the MAC address.

Report Settings

The Monitoring > Reporting tab can be used to enable/disable the reporting and user activity logging, view the current system information, and view the preset reports.

Settings

Use the Monitoring > Reporting > Settings tab to enable the reports.

Figure 11-14

Enable Report Settings

Check the Enable Reporting option to enable the reporting feature.

Check the Enable User Activity Logging checkbox to save the user information in the UAL files. See User Activity Log Files for more details on UAL files.

Click Update to enable the checked options.


Note If the Enable Reporting option is not checked, then the Current Status and Canned Reports tabs are not available. Cisco recommends disabling this option for lower-end appliances to improve the system performance.


Current Status

The current system information of the CAM and CAS can be viewed from Monitoring > Reporting > Current Status tab.

Figure 11-15 Current System Information

The following parameters are displayed:

The IP Address, License information, CPU and Memory utilization of the CAM being used.

The IP Addresses, number of users, and Memory utilization of all the CASs being used.

The Type, Provider Name, and Properties of the Authentication Server.

The IP Address, Port Profile, and Description of the Out-of-band Switch.

The following key events of the last 24 hours are displayed under Non-compliant information:

Top 10 Non-compliant Users — The graph displays number of non-compliant users and the corresponding MAC Addresses.

Top 10 Non-compliant Requirements — The graph displays number of non-compliant users and the corresponding non-compliant requirement names.

Top 10 Non-compliant Locations — The graph displays number of non-compliant locations and the corresponding IP Addresses of the CAM or the CAS.

Under Top 20 Temporary User Information, the Username, IP Address, MAC Address, Login Time, and Time spent in Temporary Role of the top 20 quarantined users are displayed .


Note The Current Status tab displays the "last refreshed" date and time at the top-right corner of the page. The current system information is automatically refreshed every 10 minutes. You can also refresh the page manually by clicking the Current Status tab.



Note When the Out-of-band devices list is large, the reporting page takes a longer time to display the reports. If this situation occurs, try deleting some of the devices to view the reports.


Canned Reports

The preset reports can be generated and future reports can be scheduled from the Monitoring > Dashboard > Canned Reports tab.

Figure 11-16

Preset Reports

Generate Canned Report Now

You can select the Report Type and the Format required to generate the current status report.

Report Type—Select the type of report from the drop-down list. The options available are:

Compliant machines

Compare Compliant/Non-Compliant Machines

Missing AV/AS Requirement

Non-compliant machines

Non-compliant requirements

Non-compliant users

O/S Information

A/V and A/S Information

Format—Select the format of the output report file. The options available are: HTML and PDF.

Click Run Now to generate the report.

Schedule Future Report Generation

You can schedule to generate a report in future by setting up the date and time.

Report Type—Select the type of report from the drop-down list. The options available are:

Compliant machines

Compare Compliant/Non-Compliant Machines

Missing AV/AS Requirement

Non-compliant machines

Non-compliant requirements

Non-compliant users

O/S Information

A/V and A/S Information

Format—Select the format of the output report file. The options available are: HTML and PDF.

Start Date—Enter the date on which the report generation has to start.

Time—Enter the time at which the report generation has to start.

Frequency—Select the frequency of the report generation from the drop-down list. The options available are: One Time, Hourly, Daily, Weekly, and Monthly.

Once you select the above parameters, click the Schedule button and the following are displayed:

Report Type

Format

Frequency

Next scheduled run

The previously generated reports are displayed at the bottom of the page. A maximum of 500 reports are displayed under the ""Reports Previously Generated" section.


Note The Reporting feature can be disabled by using the Settings tab. See Settings. The periodical report generation is stopped once the setting is disabled. If Reporting is enabled again, then the report schedule is activated simultaneously and the reports are generated as per the schedule.


User Activity Log Files

User Activity Log (UAL) Files are the log files that record user activities. This is an XML file stored in the location: /perfigo/control/data/ual/.

The user information is stored in this file only when the Enable User Activity Logging checkbox is enabled in the Monitoring > Dashboard > Current Status tab. The data is logged in according to the period of interval set in the Current Status tab. See Current Status.

The UAL files are updated with the user information every day and the historical data for the past 90 days are available in the file.

The following details are stored in the UAL files:

Username

Activity Time—login time, logout time, or role change time

Activity Reason—Reason for logout. The reasons may be "Logout", "Timeout", or "Admin Action"

User Location—VPN, switch, port, VLAN, etc. (whatever is applicable)

User Reports—Applicable for login and role change, not on logout

Activity Result— The result is reported as success or failure. If activity fails, it means the login has failed. Activity Reason is supplied with the appropriate agent, authentication server, or switch management error

MAC address

Hostname

IP address

Role

OS

VLAN

Session Length—For role change and logout only (applicable for only In-Band deployments). Session Length is a pre-configured value for the temporary role configured under User Management > User Roles> Schedule.


Note Session Length will not be displayed in the Logout activity when the client is logged out from a Temporary Role after failing to satisfy a requirement.



Note The UAL file is not updated when the Enable User Activity Logging checkbox is unchecked in the Monitoring > Dashboard > Current Status tab.


Known Issues

1. For HA-pairs, when the Reporting and User Activity Logging checkboxes are enabled, the values are stored in the memory as well as in the database of both the primary and secondary CAMs. However, when one of these checkboxes is modified through the web console of the primary CAM, then the changes are saved in the memory of the Primary CAM, but not in the memory of Secondary CAM. At the time of failover, when the Secondary CAM becomes active, the values of the checkboxes in the memory do not synchronize with the values in the database.

You can follow any one of the below instructions to resolve the above situation.

Enable both the checkboxes. Then uncheck both the checkboxes. This will synchronize the values in the memory and the database. You can then check / uncheck either of the checkboxes.

[Or]

Perform "service perfigo restart" on the CAM. This will synchronize the values in the memory with the values in the database.


Note Note: Cisco does not recommend using "service perfigo restart" as the system is shut down.


2. The scheduled reports will be generated only with the active CAM and not with the standby CAM even when both the CAMs have reports scheduled for generation. After failover, when the secondary CAM becomes active, the scheduled reports on the secondary CAM will be generated.

Online Users list

Two Online Users lists are viewed from the Monitoring > Online Users > View Online Users tab:

In-Band Online Users

Tracks In-Band authenticated users logged into the network. In-Band users with active sessions on the network are listed by characteristics such as IP address, MAC address (if available), authentication provider, and user role.

Removing a user from the In-Band Online Users list logs the user off of the In-Band network.

Out-of-Band Online Users

Tracks all authenticated Out-of-Band users that are on the Access VLAN (trusted network). Out-of-Band users can be listed by switch IP address, port, and assigned Access VLAN, in addition to client IP address, MAC address (if available), authentication provider, and user role.

Removing a user from the Out-of-Band Online Users list causes the VLAN of the port to be changed from the Access VLAN to the Authentication VLAN. You can additionally configure the Port profile to bounce the port (for a Real-IP gateway). See Out-of-Band Users and Out-of-Band Users for details.

Both Online Users lists are based on the IP address of users. Note that:

For Layer 2 deployments the User MAC address field is valid

For Layer 3 deployments the User MAC address field is not valid (for example, 00:00:00:00:00:00)

Only the Certified Devices List is based on client MAC addresses, and therefore the Certified Devices List never applies to users in Layer 3 deployments.

For Out-of-Band deployments, OOB user entries always appear first in the In-Band Online Users list, then in the Out-of-Band Online Users list. When user traffic is coming from a controlled port of a managed switch, the user shows up first in the In-Band Online Users list during the authentication process, then is moved to the Out-of-Band Online Users list after the user is authenticated and moved to the Access VLAN.

Finally, the Display Settings tab let you choose which user characteristics are displayed on each respective Online Users page.


Note When a user device is connecting to Cisco NAC Appliance from behind a VPN3000/ASA device, the MAC address of the first physical adapter that is available to the CAS/CAM is used to identify the user on the Online Users list. This may not necessarily be the adapter with which the user is connecting to the network. Users should disable the wireless interface of their machines when connecting to the network using the wired (Ethernet card) interface.


Interpreting Active Users

Once logged onto the Cisco NAC Appliance network, an active user session persists until one of the following events occurs:

The user logs out of the network through the browser logout page or Agent logout.

Once on the network, users can remain logged on after a computer shutdown/restart. A user can log out of the network using the web logout page or Agent logout.

The Agent user logs off Windows or shuts down Windows machine.

You can configure the CAM and Agent to log off In-Band users only from the Clean Access system when the user logs off from the Windows domain (i.e. Start > Shutdown > Log off current user) or shuts down the machine (Start > Shutdown > Shutdown machine).

An administrator manually drops the user from the network.

The Monitoring > Online Users > View Online Users page (IB or OOB) can be used to drop users from the network, without deleting their clients from the Certified Devices List.

The session times out using the Session Timer.

The Session Timer works the same way for multi-hop L3 (IB) deployments as for L2 (IB or OOB) deployments and is set in User Management > User Roles> Schedule > Session Timer. It is set per user role, and logs out any user in the selected role from the network after the configured time has elapsed. For details, see Configure Session Timer (per User Role).

The CAS determines that the user is no longer connected using the Heartbeat Timer and the CAM terminates the session.

The Heartbeat Timer applies to L2 IB deployments only and is set for all users regardless of role. It can be set globally for all Clean Access Servers using the form User Management > User Roles> Schedule > Heartbeat Timer, or for a specific Clean Access Server using the local form Device Management > CCA Servers > Manage [CAS_IP] > Misc > Heartbeat Timer. For details, see Configure Heartbeat Timer (User Inactivity Timeout).

The Heartbeat Timer will not function in L3 deployments, and does not apply to OOB users. However, note that the HeartBeat Timer will work if the CAS is the first hop behind the VPN concentrator. This is because the VPN concentrator responds to the ARP queries for the IP addresses of its current tunnel clients.

The Certified Device list is cleared (automatically or manually) and the user is removed from the network.

The Certified Devices List applies to L2 (IB or OOB) deployments only and can be scheduled to be cleared automatically and periodically using the global Certified Devices timer form (Device Management > Clean Access > Certified Devices > Timer). You can manually clear the certified devices for a specific Clean Access Server from the Certified Devices List using the local form Device Management > CCA Servers > Manage [CAS_IP] > Filters > Clean Access > Certified Devices, or manually clear the Certified Device list across all Clean Access Servers using the global form Device Management > Clean Access > Certified Devices. For details, see Manage Certified Devices.

Keep in mind that the Certified Devices List will not display remote VPN/L3 clients (since these sessions are IP-based rather than MAC address-based).

SSO and Auto-Logout are configured for the VPN concentrator, and the user disconnects from the VPN.

With Auto Logout enabled, when the user disconnects from the VPN client, the user is automatically removed from the Online Users list (In-Band).

Note that when SSO is configured for multi-hop L3 VPN concentrator integration, if the user's session on the CAS times out but the user is still logged in on the VPN concentrator, the user will be able to log back into the CAS without providing a username/password.


Note Whether the CAS or another server is used for DHCP, if a user's DHCP lease expires, the user remains on the Online Users list (In-Band or Out-of-Band). When the lease expires, the client machine will try to renew the lease.


See also Configure User Session and Heartbeat Timeouts and Out-of-Band Users for additional details.

View Online Users

The View Online Users tab provides two links for the two online users lists: In-Band and Out-of-Band.

By default, View Online User pages display the login user name, IP and MAC address (if available), provider, and role of each user. For information on selecting the column information to display, such as OS version, or for Out-of-Band users: switch port, see Display Settings.

A green background for an entry indicates a user device accessing the Clean Access network in a temporary role: either a Quarantine role or the Agent Temporary role.

A blue background for an entry indicates a user device accessing the Clean Access network in a restricted network access role.

A device listed on the View Online Users page but not in the Clean Access Certified Devices List generally indicates the device is in the process of certification.

In-Band Users

Clicking the In-Band link brings up the View Online Users page for In-Band users (Figure 11-17). The In-Band Online Users list tracks the In-Band users logged into the Clean Access network.

The Clean Access Manager adds a client IP and MAC address (if available) to this list after a user logs into the network either through web login or the Agent.

Removing a user from the Online Users list logs the user off the In-Band network.

Figure 11-17 View Online Users Page—In-Band


Note For AD SSO users, the Provider field displays AD_SSO, and the User/User Name field lists both the username and domain of the user (for example, user1@domain.name.com.) on the Online Users and Certified Devices pages.


Out-of-Band Users

Clicking the Out-of-Band link brings up the View Online Users page for Out-of-Band users (Figure 11-18).

The Out-of-Band Online Users list tracks all Out-of-Band authenticated users that are on the Access VLAN (on the trusted network). The CAM adds a user IP address to the Out-of-Band Online Users list after a client is switched to the Access VLAN.


Note The "User IP" of Out-of-Band online users will be the IP address of the user on the Authentication VLAN. By definition CCA does not track users once they are on the Access VLAN; therefore OOB users are tracked by the Auth VLAN IP address they have while in the CCA network.


When a user is removed from the Out-of-Band Online Users list, the following typically occurs:

1. The CAM bounces the switch port (off and on).

2. The switch resends SNMP traps to the CAM.

3. The CAM changes the VLAN of the port based on the configured Port Profile associated with this controlled port.


Note Removing an OOB user from the Certified Devices List also removes the user from Out-of-Band Online Users list and changes the port from the Access VLAN to the Auth VLAN.



Note When the "Remove Out-of-Band online user without bouncing port" option is checked for the Port Profile, for OOB Virtual Gateways, the switch port will not be bounced when:

Users are removed from the Out-of-Band Online Users list, or

Devices are removed from the Certified Devices list

Instead, the port Access VLAN will be changed to the Authentication VLAN (see Add Port Profile for details).


Figure 11-18 View Online Users Page—Out-of-Band


Note For AD SSO users, the Provider field displays AD_SSO, and the User/User Name field lists both the username and domain of the user (for example, user1@domain.name.com.) on the Online Users and Certified Devices pages.


For more details, see Chapter 3 "Switch Management: Configuring Out-of-Band Deployment."

Table 11-2 describes the search criteria, information/navigation elements, and options for removing user.s from the online users pages. Note that clicking a column heading sorts entries on the page by the column.

Table 11-2 View Online Users Page Controls

Item
Description

User Name

The user name used for login is displayed.

Search Criteria:

CCA Server

Any Clean Access Server

<specific CAS IP address>

Provider

Any Provider

<specific authentication provider>

Role

Any Role

Unauthenticated Role

Temporary Role

Quarantine Role

<specific Role>

Location

Any Switch or Wireless LAN Controller

<specific switch/WLC IP address>

Select Field

User Name

IP Address

MAC Address

Operator

equals: Search text value must be an exact match for this operator
starts with:
ends with:
contains:

Search Text

Enter the value to be searched using the operator selected.

Controls:

View

After selecting the search criteria, click View to display the results. You can view users by CAS, provider, user role, user name, IP address, MAC address (if available), or switch (OOB only).

Reset View

Resets to the default view (with search criteria reset to "Any")

Kick Users

Clicking Kick Users terminates all user sessions filtered through the search criteria across the number of applicable pages. Users can be selectively dropped from the network by any of the search criteria used to View users. The "filtered users indicator" shown in Figure 11-18 displays the total number of filtered users that will be terminated when Kick Users is clicked.

Reset Max Users

Resets the maximum number of users to the actual number of users displayed in the "Active users:" status field (Figure 11-18)

Delete Checked Entries

You can remove as many users as are shown on the page by selecting the checkbox next to each user and clicking the Delete Checked Entries Icon.

Navigation:

First/Previous/Next/Last

These navigation links allow you to page through the list of online users. A maximum of 25 entries is displayed per page.


View Users by Clean Access Server, Authentication Provider, or Role

1. From the View Online Users page, select a specific Clean Access Server, or leave the first field as Any CCA Server.

2. Select a specific authentication provider, or leave as Any Provider.

3. Select a specific user role, or leave as Any Role.

4. Click View to display users by Clean Access Server, provider, role or any combination of the three.

Search by User Name, IP, or MAC Address

1. In the Select Field dropdown menu next to Search For:, select User Name or IP Address or MAC Address.

2. Select one of the four operators: starts with, ends with, contains, exact match.

3. Enter the text to be searched in the Search For: text field. If using the exact match operator, only the exact match for the search text entered is returned.

4. Click View to display results.

Log Users Off the Network

Clicking Kick Users terminates all user sessions filtered through the search criteria across the number of applicable pages. (Note that a maximum of 25 entries is displayed per page.) You can selectively remove users from the network by any of the search criteria used to View users. The "filtered users indicator" shown in Figure 11-17 displays the total number of filtered user sessions that will be terminated when you click the Kick Users button.

1. Go to Monitoring > Online Users > View Online Users.

2. To terminate user sessions either:

Drop all users (filtered through search criteria) from the network by clicking Kick Users

Drop individual users by selecting the checkbox next to each user and clicking the Delete Checked Entries Icon.

Note that removing a user from the online users list (and the network) does not remove the user from the Certified Devices List. However, dropping a user from the Certified Devices List also logs the user off the network. See Clear Certified or Exempt Devices Manually for further details.


Note When there is a large number Out-of-Band Online Users, then the Kick User option takes a longer time to remove the online users. This happens when switches and CASs are not available to the CAM, resulting in a timeout for each communication failure. The Kick User is slow due to this timeout.


Display Settings

Figure 11-19 shows the Display Settings page for In-Band users.

Figure 11-19 Display Settings—In-Band


Note Role—the role assigned to the user upon login.



Figure 11-20 shows the Display Settings page for Out-of-Band users.

Figure 11-20 Display Settings—Out-of-Band

To choose what information is displayed on the View Online Users page:


Step 1 Click the Display Settings tab.

Step 2 Select the check box next to an item to display it in the list.

Step 3 Click Update.

Step 4 Click the View Online Users tab to see the desired settings displayed.


Agent Troubleshooting

This section contains the following:

Debug Logging for Cisco NAC Appliance Agents

Client Cannot Connect/Login

No Agent Pop-Up/Login Disabled

Client Cannot Connect (Traffic Policy Related)

AV/AS Rule Troubleshooting

Cisco NAC Web Agent Status Codes

Known Issue for Windows Script 5.6

Known Issue for MS Update Scanning Tool (KB873333)

Debug Logging for Cisco NAC Appliance Agents

This section describes how to view and/or enable debug logging for Cisco NAC Appliance Agents. Refer to the following sections for steps for each Agent type:

Generate Cisco NAC Agent Debug Logs

Cisco NAC Web Agent Logs

Generate Mac OS X Agent Debug Log

Copy these event logs to include them in a customer support case.

Generate Cisco NAC Agent Debug Logs

To generate Cisco NAC Agent logs using the Cisco Log Packager utility, refer to Create Agent Log Files Using the Cisco Log Packager.

Cisco NAC Web Agent Logs

The Cisco NAC Web Agent version 4.1.3.9 and later can generate logs when downloaded and executed. By default, the Cisco NAC Web Agent writes the log file upon startup with debugging turned on. The Cisco NAC Web Agent generates the following log files for troubleshooting purposes: webagent.log and webagentsetup.log. These files should be included in any TAC support case for the Web Agent. Typically, these files are located in the user's temp directory, in the form:

C:\Document and Settings\<user>\Local Settings\Temp\webagent.log

C:\Document and Settings\<user>\Local Settings\Temp\webagentsetup.log

If these files are not visible, check the TEMP environment variable setting. From a command-prompt, type "echo %TEMP%" or "cd %TEMP%".

When the client uses Microsoft Internet Explorer, the Cisco NAC Web Agent is downloaded to the C:\Documents and Settings\<user>\Local Settings\Temporary internet files directory.

Generate Mac OS X Agent Debug Log

For Mac OS X Agents, the Agent event.log file and preference.plist user preferences file are available under <username> > Library > Application Support > Cisco Systems > CCAAgent.app. To change or specify the LogLevel setting, however, you must access the global setting.plist file (which is different from the user-level preference.plist file).

Because Cisco does not recommend allowing individual users to change the LogLevel value on the client machine, you must be a superuser or root user to alter the global setting.plist system preferences file and specify a different Agent LogLevel.


Note For versions prior to 4.1.3.0, debug logging for the Mac OS X Agent is enabled under <local drive ID> > Library > Application Support > Cisco Systems | CCAAgent.app > Show Package Contents > setting.plist.


To view and/or change the Agent LogLevel:


Step 1 Open the navigator pane and navigate to <local drive ID> > Applications.

Step 2 Highlight and right-click the CCAAgent.app icon to bring up the selection menu.

Step 3 Choose Show Package Contents > Resources.

Step 4 Choose setting.plist.

Step 5 If you want to change the current LogLevel setting using Mac Property Editor (for Mac OS 10.4 and later) or any standard text editor (for Mac OS X releases earlier than 10.4), find the current LogLevel Key and replace the exiting value with one of the following:

Info—Include only informational messages in the event log

Warn—Include informational and warning messages in the event log

Error—Include informational, warning, and error messages in the event log

Debug—Include all Agent messages (including informational, warning, and error) in the event log


Note The Info and Warn entry types only feature a few messages pertaining to very specific Agent events. Therefore, you will probably only need either the Error or Debug Agent event log level when troubleshooting Agent connection issues.



Note Cisco NAC Appliance Release 4.8(3) does not support Mac OS X 10.4.



Note Because Apple, Inc. introduced a binary-format .plist implementation in Mac OS 10.4, the .plist file may not be editable by using a common text editor such as vi. If the .plist file is not editable (displayed as binary characters), you either need to use the Mac Property List Editor utility from the Mac OS X CD-ROM or acquire another similar tool to edit the setting.plist file.

Property List Editor is an application included in the Apple Developer Tools for editing .plist files. You can find it at <CD-ROM>/Developer/Applications/Utilities/Property List Editor.app.

If the setting.plist file is editable, you can use a standard text editor like vi to edit the LogLevel value in the file.

You must be the root user to edit the file.



Client Cannot Connect/Login

The following client errors at login can indicate CAM/CAS certificate related issues (i.e. the CAS does not trust the certificate of the CAM, or vice-versa):

Users attempting web login continue to see the login page after entering user credentials and are not redirected.

Users attempting Agent login see the following error: "Clean Access Server could not establish a secure connection to the Clean Access Manager at <IPaddress or domain>.

To resolve these issues, refer to Troubleshooting Certificate Issues.

No Agent Pop-Up/Login Disabled

For L2 or L3 deployments, the Agent will pop up on the client if "Popup Login Window" is enabled on the Agent and the Agent detects it is behind the Clean Access Server. If the Agent does not pop up, this indicates it cannot reach the CAS.

To Troubleshoot L2 Deployments:

1. Make sure the client machine can get a correct IP address. Open a command tool (Start > Run > cmd) and type ipfconfig or ipconfig /all to check the client IP address information.

2. If necessary, type ipconfig /release, then ipconfig /renew to reset the DHCP lease for the client.

To Troubleshoot L3 Deployments:

1. Check whether the Discovery Host field is set to the IP address of the CAM itself under Device Management > Clean Access > Clean Access Agent > Installation | Discovery Host. This field must be the address of a device on the trusted side and cannot be the address of the CAS.

2. Uninstall the Agent from the client machine.

3. Change the Discovery Host field to the IP address of the CAM and click Update.

4. Reboot the CAS.

5. Re-download and re-install the Agent on the client.


Note The Login option on the Agent is correctly disabled (greyed out) in the following cases:

For OOB deployments, the Agent user is already logged in through the CAS and the client port is on the Access VLAN.

For multi-hop L3 deployments, Single Sign-On (SSO) has been enabled and the user has already authenticated through the VPN concentrator (therefore is already automatically logged into Cisco NAC Appliance).

MAC address-based authentication is configured for the machine of this user and therefore no user login is required.


Client Cannot Connect (Traffic Policy Related)

The following errors can indicate DNS, proxy or network traffic policy related issues:

User can login via Agent, but cannot access web page/Internet after login.

User cannot access web login page without typing in https://<CAS_IP_address> as the URL.

To troubleshoot these issues:

Verify and/or change DNS Servers setting on the CAS (under Device Management > CCA Servers > Manage <CAS_IP> > Network > DNS)

If enabling the CAS as a DHCP server, verify and/or change the DNS Servers field for the Subnet List (under Device Management > CCA Servers > Manage <CAS_IP> > Network > DHCP > Subnet List > List | Edit).

If remediation sites cannot be reached after login, verify default host policies (Allowed Hosts) are enabled for the Temporary role (under User Management > User Roles > Traffic Control > Host).

If using a proxy server, make sure a traffic policy allowing HTTP traffic to the proxy server is enabled for the Temporary role. Verify the proxy is correctly set in the browser (from IE go to Tools > Internet Options > Connections > LAN Settings | Proxy server).

See Troubleshooting Host-Based Policies for additional details.

AV/AS Rule Troubleshooting

To view administrator reports for the Agent, go to Device Management > Clean Access > Clean Access Agent > Reports. To view information from the client, right-click the Agent taskbar icon and select Properties.

When troubleshooting AV/AS Rules, please provide the following information:

1. Version of CAS, CAM, and Agent.

2. Client OS version (e.g. Windows XP SP2)

3. Name and version of AV/AS vendor product.

4. What is failing—AV/AS installation check or AV/AS update checks? What is the error message?

5. What is the current value of the AV/AS def date/version on the failing client machine?

6. What is the corresponding value of the AV/AS def date/version being checked for on the CAM? (See Device Management > Clean Access > Clean Access Agent > Rules > AV/AS Support Info.)

Cisco NAC Web Agent Status Codes

Table 11-3 shows the status codes passed from the ActiveX or Java Applet downloader used to install the Cisco NAC Web Agent on the client machine.

Table 11-3 Java Server Page Status Codes from ActiveX Control or Java Downloader Applet

ActiveX/Java Applet Status Code
Value/Description

ACTIVEX_FAILURE

-1 "unable to launch active-x control"

DL_FAILURE

-2 "failed to download the web agent executable"

EXE_FAILURE

-3 "there was an error running the web agent"

ACTIVEX_START

0

STATUS_DL_START

1

DL_IN_PROGRESS

2

EXE_IN_PROGRES

3


Table 11-4 shows the status codes passed from the Cisco NAC Web Agent back to the Cisco NAC Appliance system during posture assessment and remediation.

Table 11-4 Cisco NAC Web Agent Status Codes

Cisco NAC Web Agent Status Code
Value

COMPLIANT/SUCCESS

32

NON_COMPLIANT

33

REJECTED_AUP

34

REMEDIATION TIMEOUT

35

GENERAL ERROR

36

TEMPORARY/RESTRICTED ACCESS

37

WEB AGENT ALREADY RUNNING

38


Known Issue for Windows Script 5.6

Windows Script 5.6 is required for proper functioning of the Agent. Most older operating systems come with Windows Script 5.1 components. Microsoft automatically installs the new 5.6 component on performing Windows updates. Windows installer components 2.0 and 3.0 also require Windows Script 5.6. However, PC machines with a fresh install of Windows 2000 that have never performed Windows updates will not have the Windows Script 5.6 component. Cisco NAC Appliance cannot redistribute this component as it is not provided by Microsoft as a merge module/redistributable.

In this case, administrators will have to access the MSDN website to get this component and upgrade to Windows Script 5.6. For convenience, links to the component from MSDN are listed below:

Filename: scripten.exe

URL: http://www.microsoft.com/downloads/en/details.aspx?FamilyId=01592C48-207D-4BE1-8A76-1C4099D7BBB9&displaylang=en

If these links change on MSDN, try a search for the file names provided above or search for the phrase "Windows Script 5.6."

Known Issue for MS Update Scanning Tool (KB873333)

Background

KB873333 is a critical update that is required for Windows XP Professional and Home for SP1 and SP2. It fixes an OS vulnerability that can allow remote code to run. However, Microsoft had a bug in this hotfix which caused problems on SP2 editions (home/pro). This bug required another fix (KB894391), because KB873333 on SP2 caused a problem with displaying Double Byte Character Sets (DBCS). However, KB894391 does not replace KB873333, it only fixes the DBCS display issue.

Ideally, KB894391 should not be installed or shown in updates unless the user machine has KB873333. However, the MS Update Scanning Tool tool shows it irrespective of whether or not KB873333 is installed. In addition, if due to ordering of the updates, KB894391 is installed, the MS Update Scanning Tool does not show KB873333 as being installed, thereby leaving the vulnerability open. This could happen if the user does not install KB873333 and only selects KB894391 to install from the updates list shown or manually installs KB894391 without installing KB873333 first. In this case, the next time updates are run, the user will not be shown KB873333 as a required update, because the MS Update Scanning Tool (including MS Baseline Analyzer) will assume KB873333 is installed if KB894391 is installed, even if this is not true and the machine is still vulnerable.

Workaround

Because of this potential vulnerability, Cisco does not intend to remove the update check for KB87333 from the Clean Access ruleset and users should manually download and install KB873333 to protect their machines. This can be done in one of two ways:

Option 1 (Cisco Recommended Option)

Create a new Link requirement in the CAM web console to check for KB873333, using the following steps:

1. Create a rule to check for the presence of KB873333. To create this rule, go to the Rules section of the web console and click New Rule. Give the rule a name (e.g. "KB873333_Rule"), and for the rule expression, copy/paste the exact name of the KB873333 check from the list of checks displayed on that page (the list of available checks appear below the new rule creation section). Save the rule by clicking "Add Rule."

2. Download the update executable for KB873333 from Microsoft's website and host it on an available web server.

3. Create a Link Requirement on Cisco NAC Appliance, and enter the URL from step 2.

4. Create Requirement-Rules for this requirement by selecting the rule you created in step 1.

5. Finally, go to the Role-Requirements section, and associate the Requirement you just created with the role to which you want this to be applied.


Note On the Requirements page, make sure that the KB873333 requirement is above the Windows Hotfixes requirement.


Option 2

Uninstall KB894391 from affected machines. After rebooting, go to the Windows Update page again. Windows Update should now display both the updates. Install KB873333 and KB894391 on the client machine. Note that this requires administrators to educate users or manually perform this task on the user machines.