SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
In conjunction with the existing Cisco Wireless LAN
Controller solutions, the Cisco ISE was configured to support
differentiated wireless services for the various types of users.
These included:
• Automated certificate-based 802.1X wireless for internal
users provisioned via user/password security and then
switching to certificate based security. This was deployed
using both single and dual SSID options
• Guest wireless managed via a central portal allowing
authorised sponsors to create guest accounts. Guests would
then be presented with a simple web login to gain access to
the network
• Partner wireless, managed via a central portal, allowing
authorised sponsors to create partner accounts. Partners
would login using 802.1X and a user/password combination
• Conference wireless, managed via a central portal, allowing
authorised sponsors to create conference accounts.
Conference users would connect using a username and
password combination and then be redirected to a
self-provisioning portal to create their own account
The Results
The ISE technology proved reliable and fully functional
allowing the ISE solution to work out identities, device
profiles and posture, such as who are you, where are you and
how are you trying to connect.
Cisco ISE is ensuring increased levels of security, allowing all
devices to connect to the network and also ensuring end users
are properly authenticated. ISE means the network is future
proof and Italik ensured they have a safe mobile device policy.
MLR Networks were delighted with the work and see Italik as
a trusted partner with whom they can build a long-term
relationship.
Benefits
• Extensive profiling capabilities to accurately identify
and assess all users and devices connecting to the
network
• Future-proofing their network
• Rigorous identity verifications
• Flexible authentication options to allow for future
requirements
• Extensible into the wired network when needed
• Significant BYOD/CYOD management cost savings
Italik provides reliable and flexible
differentiated wireless connectivity to a
council in the North West, working in
partnership with MLR Networks.
The Client wanted to take advantage of the growing trend for
personal device use in the workplace and needed a way of
provisioning mobile devices that access the network, which
would allow them to differentiate external users, internal
users, conference users and guests.
The solution had to complement the existing infrastructure
making good use of any existing technologies – The council
were specifically not seeking to replace any of its existing
Cisco Wi-Fi technologies.
The Challenge
MLR Networks recently won a contract to provide enhanced
authentication and user profiling options for the council’s
existing Cisco Wi-Fi provision and provide additional
capabilities and security options; in addition, there was a
business need to provide a “conference guest” model of
wireless services at various council buildings and other
conference facilities, some 19 locations in all. The solution
needed to be none device specific and be available for all
common devices such as Windows Laptop, Tablet, iMac, iPad,
iPhone, Android, Windows Mobile etc.
MLR Networks successfully proposed the deployment of Cisco
Identity Services Engine (ISE) technology. Cisco ISE is a
security policy management and control platform. It
automates and simplifies access control and security
compliance for wired, wireless, and VPN connectivity. It is
primarily used to provide secure access and guest access,
support BYOD initiatives, and enforce usage policies in
conjunction with Cisco TrustSec. Because Cisco ISE is a
complex solution, it requires a high level of expertise,
knowledge and Cisco Accreditations to be deployed correctly.
Italik are an Advanced Technology Partner for the Cisco ISE.
MRL Networks didn’t have the necessary ISE experience and
approached Italik to work with them and provide the expertise
and support required.
The Solution
Due to the complex nature of the project scope, over a week
was spent on site designing, configuring and implementing
the solution. We worked with the experts in the council as ISE
touches different systems which can’t work in isolation.
Laying Foundations for Council’s Vision
Case Study
Cisco ISE
Project
0845 226 1955

Weitere ähnliche Inhalte

Was ist angesagt?

IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 

Was ist angesagt? (20)

IntellectLink
IntellectLinkIntellectLink
IntellectLink
 
jini technology
 jini technology jini technology
jini technology
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
Connecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & ProductsConnecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & Products
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of ThingsFIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
 
Securing Internet of Things
Securing Internet of Things Securing Internet of Things
Securing Internet of Things
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 

Andere mochten auch

border security using gsm
border security using gsmborder security using gsm
border security using gsm
bharath naidu
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
PRADEEP Cheekatla
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
Santosh Kumar
 

Andere mochten auch (19)

Site Survey Decisions (What Would MacGyver Do?) Aruba Atmosphere 2015
Site Survey Decisions (What Would MacGyver Do?)  Aruba Atmosphere 2015Site Survey Decisions (What Would MacGyver Do?)  Aruba Atmosphere 2015
Site Survey Decisions (What Would MacGyver Do?) Aruba Atmosphere 2015
 
New Cisco Small Business Products
New Cisco Small Business ProductsNew Cisco Small Business Products
New Cisco Small Business Products
 
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf ItalyWireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
 
New Cisco Access Points
New Cisco Access PointsNew Cisco Access Points
New Cisco Access Points
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Meraki cloud managed products
Meraki cloud managed productsMeraki cloud managed products
Meraki cloud managed products
 
WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORS
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Aruba 802.11ac networks: Validated Reference Designs
Aruba 802.11ac networks: Validated Reference DesignsAruba 802.11ac networks: Validated Reference Designs
Aruba 802.11ac networks: Validated Reference Designs
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
Gsm based home(ppt)
Gsm based home(ppt)Gsm based home(ppt)
Gsm based home(ppt)
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 

Ähnlich wie case-study-cisco-ise-project copy

Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
wbrewin
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
Billy jones Monarquia
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
NAISales2
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 

Ähnlich wie case-study-cisco-ise-project copy (20)

UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Kela
Kela Kela
Kela
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Sample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-GlanceSample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-Glance
 
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
 
Skytron company profile
Skytron company profileSkytron company profile
Skytron company profile
 
Cisco unified access from vision to reality
Cisco unified access from vision to realityCisco unified access from vision to reality
Cisco unified access from vision to reality
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Vitra AG
Vitra AGVitra AG
Vitra AG
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
NNIT
NNITNNIT
NNIT
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Definitely, cisco mobility express solution eases your wi fi deployments solu...
Definitely, cisco mobility express solution eases your wi fi deployments solu...Definitely, cisco mobility express solution eases your wi fi deployments solu...
Definitely, cisco mobility express solution eases your wi fi deployments solu...
 
Definitely, cisco mobility express solution eases your wi fi deployments solu...
Definitely, cisco mobility express solution eases your wi fi deployments solu...Definitely, cisco mobility express solution eases your wi fi deployments solu...
Definitely, cisco mobility express solution eases your wi fi deployments solu...
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Cisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdfCisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdf
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Sut Overview
Sut OverviewSut Overview
Sut Overview
 

case-study-cisco-ise-project copy

  • 1. In conjunction with the existing Cisco Wireless LAN Controller solutions, the Cisco ISE was configured to support differentiated wireless services for the various types of users. These included: • Automated certificate-based 802.1X wireless for internal users provisioned via user/password security and then switching to certificate based security. This was deployed using both single and dual SSID options • Guest wireless managed via a central portal allowing authorised sponsors to create guest accounts. Guests would then be presented with a simple web login to gain access to the network • Partner wireless, managed via a central portal, allowing authorised sponsors to create partner accounts. Partners would login using 802.1X and a user/password combination • Conference wireless, managed via a central portal, allowing authorised sponsors to create conference accounts. Conference users would connect using a username and password combination and then be redirected to a self-provisioning portal to create their own account The Results The ISE technology proved reliable and fully functional allowing the ISE solution to work out identities, device profiles and posture, such as who are you, where are you and how are you trying to connect. Cisco ISE is ensuring increased levels of security, allowing all devices to connect to the network and also ensuring end users are properly authenticated. ISE means the network is future proof and Italik ensured they have a safe mobile device policy. MLR Networks were delighted with the work and see Italik as a trusted partner with whom they can build a long-term relationship. Benefits • Extensive profiling capabilities to accurately identify and assess all users and devices connecting to the network • Future-proofing their network • Rigorous identity verifications • Flexible authentication options to allow for future requirements • Extensible into the wired network when needed • Significant BYOD/CYOD management cost savings Italik provides reliable and flexible differentiated wireless connectivity to a council in the North West, working in partnership with MLR Networks. The Client wanted to take advantage of the growing trend for personal device use in the workplace and needed a way of provisioning mobile devices that access the network, which would allow them to differentiate external users, internal users, conference users and guests. The solution had to complement the existing infrastructure making good use of any existing technologies – The council were specifically not seeking to replace any of its existing Cisco Wi-Fi technologies. The Challenge MLR Networks recently won a contract to provide enhanced authentication and user profiling options for the council’s existing Cisco Wi-Fi provision and provide additional capabilities and security options; in addition, there was a business need to provide a “conference guest” model of wireless services at various council buildings and other conference facilities, some 19 locations in all. The solution needed to be none device specific and be available for all common devices such as Windows Laptop, Tablet, iMac, iPad, iPhone, Android, Windows Mobile etc. MLR Networks successfully proposed the deployment of Cisco Identity Services Engine (ISE) technology. Cisco ISE is a security policy management and control platform. It automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. It is primarily used to provide secure access and guest access, support BYOD initiatives, and enforce usage policies in conjunction with Cisco TrustSec. Because Cisco ISE is a complex solution, it requires a high level of expertise, knowledge and Cisco Accreditations to be deployed correctly. Italik are an Advanced Technology Partner for the Cisco ISE. MRL Networks didn’t have the necessary ISE experience and approached Italik to work with them and provide the expertise and support required. The Solution Due to the complex nature of the project scope, over a week was spent on site designing, configuring and implementing the solution. We worked with the experts in the council as ISE touches different systems which can’t work in isolation. Laying Foundations for Council’s Vision Case Study Cisco ISE Project 0845 226 1955