SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
Identity Services Engine
Abhi Gupta, SE
30 September 2014
Overview & Update
Cisco Public 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Identity Services Engine (ISE)
All-in-One Enterprise Policy Control
Who What Where When How
VM client, IP device, guest, employee, remote user
Wired Wireless VPN
Business-Relevant
Policies
Replaces AAA & RADIUS, NAC, guest mgmt & device identity servers
Security Policy Attributes
Identity
Context
Cisco Public 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Identity Services Engine (ISE)
How
What
Who
Where
When
Network
Partner
Context Data
Consistent Secure
Access Policy
ISE
Cisco ISE is the Market Leader
Cisco Public 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ISE Provides Visibility, Context, and Control Across the Entire Continuum
BEFORE
Control
Enforce
Harden
DURING AFTER
Detect
Block
Defend
Scope
Contain
Remediate
Attack Continuum
Firewall
NGFW
NAC + Identity Services
VPN
UTM
NGIPS
Web + Email Security
Advanced Malware Protection
Network Behavior Analysis
pxGrid + ISE Ecosystem
Role of Cisco ISE in the Attack Continuum
Cisco Public 6© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Guest Access Management
Easily provide guests limited-time, limited-resource Internet access
BYOD and Enterprise Mobility
Seamlessly & securely onboard devices with the right levels of access
Secure Access across the Entire Network
Simplify & unify enterprise network access policy across wired, wireless, & VPN
With Cisco TrustSec®
Identity-aware Network Segmentation and Access Policy Enforcement
Customer use cases for ISE
Cisco Public 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Guest Access Flow
Redirection of the guest web session to Cisco®
ISE guest portal for authentication
ISE
Switches
WLC
AP
Imran
********
Sponsor
Local Radius
Workstations Mobile (iPhone)
Guest
Cisco Public 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Life Cycle Management
Provision Manage Notify Report
Create guest
accounts in the
sponsor portal
Create sponsor
policy
Manage sponsor
groups
Customize portals
Notify guest using
different method
Print
Email
SMS
Report on all
aspects of guest
accounts
Cisco Public 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Branding with Themes!
Themes give you complete
control over the look and feel of
your sponsor Portal.
Mobile Sponsors
You are free to move about the cabin!
Create a guest account on the fly from your
smartphone / tablet away from your desk.
Streamlined Guest Creation
Set up your sponsor portal to
show only the fields you need for
your business.
Create Accounts Create Accounts
Print Email
SMS
Sponsoring Guests
Cisco Public 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Guest Receipts with Your Brand
Whether you’re delivering guest credentials
on the printed page, over email or SMS, ISE
makes it easy to deliver your complete
branded experience.
SMS Notifications
Send credentials directly to a guests mobile phone.
Email Notifications
Do you have Guests visiting? Send
them login credentials before they
even arrive!
Your credentials
username: trex42
password: littlearms
Branded Guest Notifications
Cisco Public 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.
A Guest Button
With our new navigation, getting
to the Guest admin has never
been easier.
Prepackaged Flows
Ships with the default flows used
by 90% of our customers:
Hotspot, Self-Service (with or
without approval), & Sponsored.
One Stop Setup
Once you’re there, all the pieces
you need are accessed in one
place.
New Guest Portal Admin
Cisco Public 13© 2013-2014 Cisco and/or its affiliates. All rights reserved.
End User Visibility
ISE makes the end user
experience crystal clear as it
updates the guest flow
diagram in real time with
each settings change.
Admin Friendly
Through extensive user
research we’re made guest
settings so easy to find that
setting up a guest flow can
be done in just a few clicks.
Guest Portal building made easy
Cisco Public 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Themes!
Themes give you complete
control over the look and feel of
your guest pages. Use our out-
of-the-box themes or create
your own using ThemeRoller for
jQuery Mobile or standard CSS.
Live Preview
See your pages as the guests
will see them as you customize.
Full Page Control
Use our defaults or customize
every field in multiple languages.
Customize with Themes
Cisco Public 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.
BYOD Spectrum
Managed User
Managed Device
Managed User + Unmanaged
Device + Secure +
Compliance
Managed User
Unmanaged Device +
Secure
Managed User
Unmanaged Device
Environment requires
tight controls
Basic services and
easy access for
everyone
Register, configure
connectivity
Company’s native
applications, new
services, and full control
Cisco Public 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What Does Cisco ISE offer?
Multiple Device
Support
Certificate
Provisioning
Multiple
Network
Topologies
Blacklisting and
Reinstating
of Devices
Self-Registration
Cisco Public 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.
 User connects to open SSID
 Redirected to WebAuth portal
 User enters employee or guest credentials
 Guest signs AUP and
gets guest access
 Employee registers device
 Downloads certificate
 Downloads supplicant configuration
 Employee reconnects using EAP-TLS
BYOD Flow
Use Case: Single SSID
BYOD-Secure
Access Point
ISE
Wireless
LAN Controller
AD/LDAP
Personal Asset
Cisco Public 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Managing certificates for BYOD adds significant
complexity and expense when using Microsoft
Public Key Infrastructure.
The ISE Certificate Authority is designed to
work in concert as a self contained solution or
with your existing Enterprise PKI to simplify
BYOD deployments.
 Single Management Console – Manage endpoints and
their certs. Delete an endpoint ISE deletes the cert.
 Simplified deployment – Supports stand alone and
subordinate deployments. Removes corporate PKI team
from every BYOD interaction.
Native Certificate Authority
Designed for BYOD use-cases only, not a general purpose CA
Optional
Enterprise
Root
Self-Contained
or Optional
Subordinate
Cisco ISE
Certificate
Authority
Cisco Public 20© 2013-2014 Cisco and/or its affiliates. All rights reserved.
 PAN is Root CA for the ISE Cube
 All PSNs are Subordinate CA’s to
the PAN
 PSNs are SCEP Registration
Authorities (RA’s)
 ISE PAN may be Subordinate to an
existing Root CA or may be Stand-
Alone Root.
 Promotion of Standby PAN:
 Will not have any effect on operation
of the subordinate CA’s
 For Standby to become Root CA >
must manually install the
Private/Public keys from the Primary
PAN
PKI Hierarchy and Roles
PSN PSNPSNPSN
Primary
ISE CA
Enterprise
Root
(optional)
PAN
Standby PAN
Subordinate CA
SCEP RA
Subordinate CA
SCEP RA
Subordinate CA
SCEP RA
Subordinate CA
SCEP RA
Cisco Public 21© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Certificate Template(s)
• Define Internal or External CA
• Set the Key Sizes
• SAN Field Options
• UUID
• DNS Name
• MAC Address
• Serial #
• No Free-Form Adds..
• Set length of validity
Cisco Public 22© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• ISE can Query MDM server using APIs
• Compliance based on:
̶ General Compliant or ! Compliant Status
OR
̶ Disk encryption enabled
̶ PIN lock enabled
̶ Jail-broken status
• MDM attributes available for policy conditions
• “Passive Reassessment”: Bulk recheck against the MDM server
using a configurable timer
̶ If the result of a periodic recheck shows that a connected
device is no longer compliant, Cisco® ISE sends a CoA to
terminate the session.
MDM Integration
Macro level
Micro level
Survivability Attribute
Cisco Public 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public 24© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Secure Access
Role-Based, Dynamic Provisioning
Context-
Aware
Classification
Context-
Aware Policy
Enforcement
1
2
3
ISE
Who? What? When? Where? How?
Cisco Public 25© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco ISE Authentication Policy
Who = 802.1X Managed Users Who? How
Examples: Employees and staff, faculty and students, or extended access to partners and contractors
Primary authentication methods: 802.1X or agent-based
Cisco Public 26© 2013-2014 Cisco and/or its affiliates. All rights reserved.
 Support for up to 50 concurrent Active
Directory multi-join points.
 No need for 2-way trust relationship
between domains
 Advanced algorithms for dealing with
identical usernames.
ISE 1.3 is designed for growing businesses. With
support for multiple Active Directory domains, ISE
1.3 enables authentication and attribute collection
across the largest enterprises.
example-1.com
example-2.com
example-n.com
ISE
Multi-Forest Active Directory Support
Cisco Public 27© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ScopeA
acs.com
Company-B.com
Company-C.com
Company-D.com
Company-E.com
acs.com
acs.com
oceania.acs.com
australia.oceania.acs.com
canberra.australia.oceania.acs.com
amer.acs.com
brazil.south.amer.acs.com
1.3 AD Instance == 1.2 AD
Scope defines selected instances.
Here we have 3 AD instances for
Scope A out of 5 AD instances
configured on the ISE
Terminology
Cisco Public 28© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Authentication Policy
Individual AD
Instance can be
selected
Scopes can be selected
(All_AD_Instances, is a
synthetic scope created
automatically to select all
configured AD instances)
Cisco Public 29© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Authorization Policy
Sample Policy
Permissions = Authorizations
• Employee_iPAD Set VLAN = 30 (Corporate Access)
• Contractor_iPAD Set VLAN = 40 (Internet Only)
Who?
Who?
Cisco Public 30© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What is Profiling ?
Collection Classification
Classifies based on Device fingerprint
• Process of collecting data to be used
for identifying devices
• Uses Probes for collecting device attributes
NMAP
SNMPHTTP
Radius DHCP
LLDP
NetFlow
Cisco Public 31© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ISE Authorization
Smartphones and Corporate Policy
Permissions = Authorizations
• Employee Phone Set VLAN = 601 (Internet Only)
• Employee PC Set VLAN = 603 (Full Access)
Who = EmployeeWhat=?
Who? What?
Cisco Public 32© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What is Posture ?
Posture is the state of compliance with the company’s security policy.
• Is the system running the current Windows patches?
• Do you have anti-virus software installed? Is it up to date?
• Do you have anti-spyware software installed? Is it up to date?
Cisco Public 33© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco ISE Posture
Policy Example
Corporate Policy:
• Must have Kaspersky AV installed
• Automatic remediation enforced
Guest Policy:
• Must have AV installed but can be ANY vendor
Cisco Public 34© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco ISE Posture Agents
Cisco NAC Agent Cisco AnyConnect 4.0
Cisco Public 35© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public 36© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Tree View
AuthC
Protocols
Identity
Store
Cisco Public 37© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Filters in Live Log & Live Sessions
Cisco Public 38© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Off-Line Examination of Configuration
• Exportable Policy
Quick Link to
Export Page
Cisco Public 39© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Exports as XML
Cisco Public 40© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Consistent
Secure Access
A Solid Foundation
Today & Tomorrow
Simplified, Unified
Policy Management
for Access
Innovation & Market
Leadership in NAC, at
the core of Cisco
Security & Solutions
Unparalleled
Visibility & Context
Get a Clearer Picture
of Who and What Is
On Your Network
Detect Threats from
Compromised
Devices via Health
Checks & SIEM/TD
Advanced Threat
Containment
Only Cisco ISE delivers …
Abhi Gupta, SE
abhigup@cisco.com
Rob Bleeker, CSE
robleeke@cisco.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
차세대 데이터센터 네트워크 전략
차세대 데이터센터 네트워크 전략차세대 데이터센터 네트워크 전략
차세대 데이터센터 네트워크 전략
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Single Sign On - The Basics
Single Sign On - The BasicsSingle Sign On - The Basics
Single Sign On - The Basics
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
CyberArk
CyberArkCyberArk
CyberArk
 

Andere mochten auch

802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
Dan Miller
 
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
CERTyou Formation
 
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
CERTyou Formation
 
802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
Sithideth Banavong
 

Andere mochten auch (20)

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
 
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
 
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ Implementation
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
802.1x
802.1x802.1x
802.1x
 
802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
 
Cisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guideCisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guide
 
Configuring android for_work
Configuring android for_workConfiguring android for_work
Configuring android for_work
 
802.1x authentication
802.1x authentication802.1x authentication
802.1x authentication
 
802.1x
802.1x802.1x
802.1x
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2
 

Ähnlich wie Identity Services Engine Overview and Update

20140416 cisco
20140416 cisco20140416 cisco
20140416 cisco
wecst
 

Ähnlich wie Identity Services Engine Overview and Update (20)

Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
20140416 cisco
20140416 cisco20140416 cisco
20140416 cisco
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
 
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Realise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesRealise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyes
 
Cisco datacenter ucs-best-practices_ddebussc_2015d
Cisco datacenter ucs-best-practices_ddebussc_2015dCisco datacenter ucs-best-practices_ddebussc_2015d
Cisco datacenter ucs-best-practices_ddebussc_2015d
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?
 

Mehr von Cisco Canada

Mehr von Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Identity Services Engine Overview and Update

  • 1.
  • 2. Identity Services Engine Abhi Gupta, SE 30 September 2014 Overview & Update
  • 3. Cisco Public 3© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Identity Services Engine (ISE) All-in-One Enterprise Policy Control Who What Where When How VM client, IP device, guest, employee, remote user Wired Wireless VPN Business-Relevant Policies Replaces AAA & RADIUS, NAC, guest mgmt & device identity servers Security Policy Attributes Identity Context
  • 4. Cisco Public 4© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Identity Services Engine (ISE) How What Who Where When Network Partner Context Data Consistent Secure Access Policy ISE Cisco ISE is the Market Leader
  • 5. Cisco Public 5© 2013-2014 Cisco and/or its affiliates. All rights reserved. ISE Provides Visibility, Context, and Control Across the Entire Continuum BEFORE Control Enforce Harden DURING AFTER Detect Block Defend Scope Contain Remediate Attack Continuum Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web + Email Security Advanced Malware Protection Network Behavior Analysis pxGrid + ISE Ecosystem Role of Cisco ISE in the Attack Continuum
  • 6. Cisco Public 6© 2013-2014 Cisco and/or its affiliates. All rights reserved. Guest Access Management Easily provide guests limited-time, limited-resource Internet access BYOD and Enterprise Mobility Seamlessly & securely onboard devices with the right levels of access Secure Access across the Entire Network Simplify & unify enterprise network access policy across wired, wireless, & VPN With Cisco TrustSec® Identity-aware Network Segmentation and Access Policy Enforcement Customer use cases for ISE
  • 7. Cisco Public 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.
  • 8. Cisco Public 8© 2013-2014 Cisco and/or its affiliates. All rights reserved. Guest Access Flow Redirection of the guest web session to Cisco® ISE guest portal for authentication ISE Switches WLC AP Imran ******** Sponsor Local Radius Workstations Mobile (iPhone) Guest
  • 9. Cisco Public 9© 2013-2014 Cisco and/or its affiliates. All rights reserved. Life Cycle Management Provision Manage Notify Report Create guest accounts in the sponsor portal Create sponsor policy Manage sponsor groups Customize portals Notify guest using different method Print Email SMS Report on all aspects of guest accounts
  • 10. Cisco Public 10© 2013-2014 Cisco and/or its affiliates. All rights reserved. Branding with Themes! Themes give you complete control over the look and feel of your sponsor Portal. Mobile Sponsors You are free to move about the cabin! Create a guest account on the fly from your smartphone / tablet away from your desk. Streamlined Guest Creation Set up your sponsor portal to show only the fields you need for your business. Create Accounts Create Accounts Print Email SMS Sponsoring Guests
  • 11. Cisco Public 11© 2013-2014 Cisco and/or its affiliates. All rights reserved. Guest Receipts with Your Brand Whether you’re delivering guest credentials on the printed page, over email or SMS, ISE makes it easy to deliver your complete branded experience. SMS Notifications Send credentials directly to a guests mobile phone. Email Notifications Do you have Guests visiting? Send them login credentials before they even arrive! Your credentials username: trex42 password: littlearms Branded Guest Notifications
  • 12. Cisco Public 12© 2013-2014 Cisco and/or its affiliates. All rights reserved. A Guest Button With our new navigation, getting to the Guest admin has never been easier. Prepackaged Flows Ships with the default flows used by 90% of our customers: Hotspot, Self-Service (with or without approval), & Sponsored. One Stop Setup Once you’re there, all the pieces you need are accessed in one place. New Guest Portal Admin
  • 13. Cisco Public 13© 2013-2014 Cisco and/or its affiliates. All rights reserved. End User Visibility ISE makes the end user experience crystal clear as it updates the guest flow diagram in real time with each settings change. Admin Friendly Through extensive user research we’re made guest settings so easy to find that setting up a guest flow can be done in just a few clicks. Guest Portal building made easy
  • 14. Cisco Public 14© 2013-2014 Cisco and/or its affiliates. All rights reserved. Themes! Themes give you complete control over the look and feel of your guest pages. Use our out- of-the-box themes or create your own using ThemeRoller for jQuery Mobile or standard CSS. Live Preview See your pages as the guests will see them as you customize. Full Page Control Use our defaults or customize every field in multiple languages. Customize with Themes
  • 15. Cisco Public 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.
  • 16. Cisco Public 16© 2013-2014 Cisco and/or its affiliates. All rights reserved. BYOD Spectrum Managed User Managed Device Managed User + Unmanaged Device + Secure + Compliance Managed User Unmanaged Device + Secure Managed User Unmanaged Device Environment requires tight controls Basic services and easy access for everyone Register, configure connectivity Company’s native applications, new services, and full control
  • 17. Cisco Public 17© 2013-2014 Cisco and/or its affiliates. All rights reserved. What Does Cisco ISE offer? Multiple Device Support Certificate Provisioning Multiple Network Topologies Blacklisting and Reinstating of Devices Self-Registration
  • 18. Cisco Public 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.  User connects to open SSID  Redirected to WebAuth portal  User enters employee or guest credentials  Guest signs AUP and gets guest access  Employee registers device  Downloads certificate  Downloads supplicant configuration  Employee reconnects using EAP-TLS BYOD Flow Use Case: Single SSID BYOD-Secure Access Point ISE Wireless LAN Controller AD/LDAP Personal Asset
  • 19. Cisco Public 19© 2013-2014 Cisco and/or its affiliates. All rights reserved. Managing certificates for BYOD adds significant complexity and expense when using Microsoft Public Key Infrastructure. The ISE Certificate Authority is designed to work in concert as a self contained solution or with your existing Enterprise PKI to simplify BYOD deployments.  Single Management Console – Manage endpoints and their certs. Delete an endpoint ISE deletes the cert.  Simplified deployment – Supports stand alone and subordinate deployments. Removes corporate PKI team from every BYOD interaction. Native Certificate Authority Designed for BYOD use-cases only, not a general purpose CA Optional Enterprise Root Self-Contained or Optional Subordinate Cisco ISE Certificate Authority
  • 20. Cisco Public 20© 2013-2014 Cisco and/or its affiliates. All rights reserved.  PAN is Root CA for the ISE Cube  All PSNs are Subordinate CA’s to the PAN  PSNs are SCEP Registration Authorities (RA’s)  ISE PAN may be Subordinate to an existing Root CA or may be Stand- Alone Root.  Promotion of Standby PAN:  Will not have any effect on operation of the subordinate CA’s  For Standby to become Root CA > must manually install the Private/Public keys from the Primary PAN PKI Hierarchy and Roles PSN PSNPSNPSN Primary ISE CA Enterprise Root (optional) PAN Standby PAN Subordinate CA SCEP RA Subordinate CA SCEP RA Subordinate CA SCEP RA Subordinate CA SCEP RA
  • 21. Cisco Public 21© 2013-2014 Cisco and/or its affiliates. All rights reserved. Certificate Template(s) • Define Internal or External CA • Set the Key Sizes • SAN Field Options • UUID • DNS Name • MAC Address • Serial # • No Free-Form Adds.. • Set length of validity
  • 22. Cisco Public 22© 2013-2014 Cisco and/or its affiliates. All rights reserved. • ISE can Query MDM server using APIs • Compliance based on: ̶ General Compliant or ! Compliant Status OR ̶ Disk encryption enabled ̶ PIN lock enabled ̶ Jail-broken status • MDM attributes available for policy conditions • “Passive Reassessment”: Bulk recheck against the MDM server using a configurable timer ̶ If the result of a periodic recheck shows that a connected device is no longer compliant, Cisco® ISE sends a CoA to terminate the session. MDM Integration Macro level Micro level Survivability Attribute
  • 23. Cisco Public 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.
  • 24. Cisco Public 24© 2013-2014 Cisco and/or its affiliates. All rights reserved. Secure Access Role-Based, Dynamic Provisioning Context- Aware Classification Context- Aware Policy Enforcement 1 2 3 ISE Who? What? When? Where? How?
  • 25. Cisco Public 25© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco ISE Authentication Policy Who = 802.1X Managed Users Who? How Examples: Employees and staff, faculty and students, or extended access to partners and contractors Primary authentication methods: 802.1X or agent-based
  • 26. Cisco Public 26© 2013-2014 Cisco and/or its affiliates. All rights reserved.  Support for up to 50 concurrent Active Directory multi-join points.  No need for 2-way trust relationship between domains  Advanced algorithms for dealing with identical usernames. ISE 1.3 is designed for growing businesses. With support for multiple Active Directory domains, ISE 1.3 enables authentication and attribute collection across the largest enterprises. example-1.com example-2.com example-n.com ISE Multi-Forest Active Directory Support
  • 27. Cisco Public 27© 2013-2014 Cisco and/or its affiliates. All rights reserved. ScopeA acs.com Company-B.com Company-C.com Company-D.com Company-E.com acs.com acs.com oceania.acs.com australia.oceania.acs.com canberra.australia.oceania.acs.com amer.acs.com brazil.south.amer.acs.com 1.3 AD Instance == 1.2 AD Scope defines selected instances. Here we have 3 AD instances for Scope A out of 5 AD instances configured on the ISE Terminology
  • 28. Cisco Public 28© 2013-2014 Cisco and/or its affiliates. All rights reserved. Authentication Policy Individual AD Instance can be selected Scopes can be selected (All_AD_Instances, is a synthetic scope created automatically to select all configured AD instances)
  • 29. Cisco Public 29© 2013-2014 Cisco and/or its affiliates. All rights reserved. Authorization Policy Sample Policy Permissions = Authorizations • Employee_iPAD Set VLAN = 30 (Corporate Access) • Contractor_iPAD Set VLAN = 40 (Internet Only) Who? Who?
  • 30. Cisco Public 30© 2013-2014 Cisco and/or its affiliates. All rights reserved. What is Profiling ? Collection Classification Classifies based on Device fingerprint • Process of collecting data to be used for identifying devices • Uses Probes for collecting device attributes NMAP SNMPHTTP Radius DHCP LLDP NetFlow
  • 31. Cisco Public 31© 2013-2014 Cisco and/or its affiliates. All rights reserved. ISE Authorization Smartphones and Corporate Policy Permissions = Authorizations • Employee Phone Set VLAN = 601 (Internet Only) • Employee PC Set VLAN = 603 (Full Access) Who = EmployeeWhat=? Who? What?
  • 32. Cisco Public 32© 2013-2014 Cisco and/or its affiliates. All rights reserved. What is Posture ? Posture is the state of compliance with the company’s security policy. • Is the system running the current Windows patches? • Do you have anti-virus software installed? Is it up to date? • Do you have anti-spyware software installed? Is it up to date?
  • 33. Cisco Public 33© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco ISE Posture Policy Example Corporate Policy: • Must have Kaspersky AV installed • Automatic remediation enforced Guest Policy: • Must have AV installed but can be ANY vendor
  • 34. Cisco Public 34© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco ISE Posture Agents Cisco NAC Agent Cisco AnyConnect 4.0
  • 35. Cisco Public 35© 2013-2014 Cisco and/or its affiliates. All rights reserved.
  • 36. Cisco Public 36© 2013-2014 Cisco and/or its affiliates. All rights reserved. Tree View AuthC Protocols Identity Store
  • 37. Cisco Public 37© 2013-2014 Cisco and/or its affiliates. All rights reserved. Filters in Live Log & Live Sessions
  • 38. Cisco Public 38© 2013-2014 Cisco and/or its affiliates. All rights reserved. Off-Line Examination of Configuration • Exportable Policy Quick Link to Export Page
  • 39. Cisco Public 39© 2013-2014 Cisco and/or its affiliates. All rights reserved. Exports as XML
  • 40. Cisco Public 40© 2013-2014 Cisco and/or its affiliates. All rights reserved. Consistent Secure Access A Solid Foundation Today & Tomorrow Simplified, Unified Policy Management for Access Innovation & Market Leadership in NAC, at the core of Cisco Security & Solutions Unparalleled Visibility & Context Get a Clearer Picture of Who and What Is On Your Network Detect Threats from Compromised Devices via Health Checks & SIEM/TD Advanced Threat Containment Only Cisco ISE delivers …
  • 41. Abhi Gupta, SE abhigup@cisco.com Rob Bleeker, CSE robleeke@cisco.com