Introduction
Cisco ISE has introduced almost 4 years ago. However, most organizations not utilizing their features completely.
What is Cisco ISE:
Basically, Cisco ISE is an NAC(network access control)solution where this has the visibility of the devices connected to the network also can work as an AAA server. However, I can't say all of its features in a single word. Let's dive into all the features one by one
Wired Authentication MAB(MAC Authentication Bypass)
- MAB acts at Layer 2, basically, when a device is connected to an access port this will check whether this device mac is permitted or not also it will dynamically authorize for a specific VLAN or assigned a unique access list
- MAB helps to map Device IP, MAC address, Switch and switch port this can be used for audits, network forensics, network use statistics, and troubleshooting.
- Mab is very helpful when there are a mix of devices which support 802.1X and some not.in that case you can use it as fallback otherwise if you have all device which is not supported MAB.
- MAB can be used only for device authentication this won't provide any user-based authentication and the main drawback of MAB is always we need to keep the database of the mac address
Posturing:
Posturing is a method where you can check certain conditions are met while connecting devices to your network in the below ways
- Wired
- Wireless
- VPN
- AM Installation
- Application Inventory
- USB Check
- AV Installation
- AV version / date
- Application / File Check
- Service packs / Hotfixes
- Process / Registry Check
- Patch Management
- Disk Encryption
- Service Condition
- Registry Condition
- Machine Domain check
Bring Your Own Device (BYOD)
Bring your own device is a concept where the users are allowed to connect their personal devices to connect a managed network. inside the organization, they may have employee users, contractors, and guest users.so it depends upon requirement according to your organization
Profiling
Cisco ISE has great visibility to network devices connected to your network.that means it can give a clear picture about endpoints connected to your network
- Who is connected
- Device type: (Laptop/mobile devices etc)
- access time
- access location
- access type (wired/wireless/VPN)
- what access provided (permitted network access/ACL)
Connect Us