That is a hard question to fully answer. Without DHCP, you miss a lot of profiling information, and moving to DHCP with static reservations for the devices you want to have on a fixed IP may be the best solution. Further it depends a bit on what those devices offer as services, as the more information they expose, the better your profiling, but in the end the accuracy and effectiveness may vary.
Alternatively, as you may have a record of MAC addresses for each device, you may enter them in the Endpoint repository, or query your CMDB if it has those devices listed, and assign them to the printer role/vlan through that path. Then limit access from that role such that if someone would spoof the MAC, there is really limited access that cannot hurt.
Your HPE Aruba partner can probably assist in making the optimal design.
------------------------------
Herman Robers
------------------------
If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check
https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.
In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
------------------------------
Original Message:
Sent: Mar 14, 2025 03:23 PM
From: nehabw
Subject: Device Profiling in Static IP Environment with Security Restrictions (SNMP vs. NMAP)
Hello,
I need some guidance on how to perform device profiling in an environment where all devices (desktops and non-802.1x capable devices like printers) are statically addressed. Due to security concerns, we are restricted from opening too many ports, especially for devices such as printers.
I'm considering two methods for profiling printers, but I'm unsure which one would be more secure and efficient in this scenario:
- SNMP-Based Queries – Would querying devices over SNMP be a secure and effective way to profile printers without opening too many additional ports?
- NMAP-Based Scans – Is it safe to use NMAP to scan specific ports (e.g., TCP 515 for LPD or TCP 631 for IPP) to gather profiling data for printers, or does this introduce any security concerns or risks?
I'd appreciate any advice or best practices on how to achieve device profiling effectively and securely within these constraints.
Thanks in advance!