- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
MX84 - Isolate Client Device
Interested in how the MX84 (or similar) device actually isolates a device it recognizes as having malware. Does it turn off the switch port (if so how does it do this) or is there some other mechanism it uses to isolate the device and protect other connect devices on the LAN.
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It does not do anything to protect other devices on the LAN.
If you use Systems Manager, you can have it check the antivirus/antivirus on the machine and if that reports the machine is infected you can have a group policy applied.
If it is plugged into a Meraki switch or connected via Meraki WiFi it could be isolated at that point in time.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It does not do anything to protect other devices on the LAN.
If you use Systems Manager, you can have it check the antivirus/antivirus on the machine and if that reports the machine is infected you can have a group policy applied.
If it is plugged into a Meraki switch or connected via Meraki WiFi it could be isolated at that point in time.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
So coupled with a Meraki Switch it can instruct the Switch to turn off the port?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No. You you can have it apply a firewall rule blocking all the traffic.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I guess my point is the blocking of the device is only out through the firewall so whether the switches are Meraki switches or other Cisco switches (or other Managed switches) the blocking function is still the same and the LAN is still exposed other than manual intervention?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have looked into this further. L3 and L7 firewall rules for group policy can only be applied to MX and MR, and not MS. So it can not be done at the switch port level.
You should be able to do this using 802.1x and Cisco ISE, but that is a very complex setup.
You should be able to do this using 802.1x and Microsoft NPS using a health policy, but that is a fairly complex setup.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I assume you are referring to the Advanced Malware Protection (AMP)? If so, "When enabled, all HTTP traffic will be analyzed for malware. Files determined to be malicious will automatically be blocked before they reach the client. For a description of file types that will be evaluated, visit our Security Filtering Documentation Page"
So basically it just protects/stops the malware. It doesn't isolate or, in any way, contain the entire clients traffic. Only the malware identified traffic that the client is trying to participate in.
If this was helpful click the Kudo button below
If my reply solved your issue, please mark it as a solution.
