SlideShare a Scribd company logo
From cisco ACS To ISE
Comparison of two technologies
M.Zahedi
2015
In The Name Of God2
Contents
ACS Introduction
Policy terminology
Access Service /Examples
Why ISE
New features Of ISE
Cisco secure Access Control
 Network security officers and administrators need solutions that support flexible
authentication and authorization policies that are tied not only to a user’s identity
but also to context such as the network access type, time of day the access is
requested, and the security of the machine used to access the network.
 Cisco Secure ACS, a core component of the Cisco TrustSec® solution, is a highly
sophisticated policy platform providing RADIUS and TACACS+ services.
 Cisco Secure ACS provides central management of access policies for device
administration and for wireless, wired IEEE 802.1x, and remote (VPN) network access
scenarios.
3
Features
 Unique, flexible, and detailed device administration in IPv4 and IPv6 networks, with full
auditing and rules-based policy model that flexibly addresses complex policy needs
 A lightweight, web-based GUI with intuitive navigation and workflow accessible from
both IPv4 and IPv6 clients
 Integrated advanced monitoring, reporting, and troubleshooting capabilities for
excellent control and visibility
 Integration with external identity and policy databases, including Microsoft Active
Directory and Lightweight Directory Access Protocol (LDAP)-accessible databases,
simplifying policy configuration and maintenance
 A distributed deployment model that enables large-scale deployments and provides a
highly available solution
4
Main Features and Benefits of Cisco Secure
ACS 5.8
Features Benefit
Complete access control and
confidentiality solution
It can be deployed with other Cisco TrustSec components, including
policy components, infrastructure enforcement components, endpoint
components, and professional services.
Authentication, authorization, and
accounting (AAA) protocols
supporting two distinct AAA protocols: RADIUS and TACACS+
Database options
integration with existing external identity repositories such as Microsoft
AD servers, LDAP servers, and RSA token servers.
Authentication
protocols
PAP, MS-CHAP, Extensible Authentication Protocol (EAP)-MD5,
Protected EAP (PEAP), EAP-Flexible Authentication through Secure
Tunneling (FAST), EAP-Transport Layer Security (TLS), and PEAP-TLS. It
also supports TACACS+ authentication with CHAP/MSCHAP protocols
and PAP-based password change when using TACACS+ and EAP-GTC
with LDAP servers.
5
Cont. Main Features and Benefits of Cisco
Secure ACS 5.8
Features Benefit
Access policies
a rules-based, attribute-guided policy model that provides greatly increased power
and flexibility for access control policies, which can include authentication protocol
requirements, device restrictions, time-of- day restrictions, and other access
requirements. Cisco Secure ACS can apply downloadable access control lists
(dACLs), VLAN assignments, and other authorization parameters. Furthermore, it
allows comparison between the values of any two attributes that are available to
Cisco Secure ACS to be used in identity, group-mapping, and authorization policy
rules.
Centralized
management
Cisco Secure ACS 5.8 supports a completely redesigned lightweight, web-based
GUI that is easy to use. An efficient, incremental replication scheme quickly
propagates changes from primary to secondary systems, providing centralized
control over distributed deployments. Software upgrades are also managed
through the GUI and can be distributed by the primary system to secondary
instances.
Support for high
availability in larger
Cisco Secure ACS
deployments
Cisco Secure ACS 5.8 supports up to 22 instances in a single Cisco ACS cluster: 1
primary and 21 secondary. One of these instances can function as a hot (active)
standby system, which can be manually promoted to the primary system in the
event that the original primary system fails.
If <identity-condition, restriction-condition> then <authorization-profile>
6
Cont. Main Features and Benefits of Cisco
Secure ACS 5.8
Feature Benefit
Programmatic
interface
cisco Secure ACS 5.8 supports a programmatic interface for create, read,
update, and delete operations on users and identity groups, network devices,
and hosts (endpoints) within the internal database. It also adds the capability
to export the list of Cisco Secure ACS administrators and their roles through
the same web services API.
Monitoring, reporting,
and troubleshooting
Cisco Secure ACS 5.8 includes an integrated monitoring, reporting, and
troubleshooting component that is accessible through the web-based GUI.
This tool provides excellent visibility into configured policies and
authentication and authorization activities across the network.
7
Policy terminology
 Access service : A sequential set of policies used to process access request
 Policy element : Global, shared object that defines policy conditions and
permission
 Shell profile: permissions container for TACACS+ based device administration
policy
 Authorize profile: permissions container for RADIUS based network
 Command set: contains the set of permitted commands
 Policy: A set of rules that are used to reach a specific policy decision
 Identity policy: policy for choosing how to authenticate and acquire identity
attributes for a given request.
8
Access Services
 Access services are fundamental constructs in ACS 5.x that allow you to configure access policies for
users and devices that connect to the network and for network administrators who administer
network devices
 In ACS 5.x, authentication and authorization requests are processed by access services.
 An access service consists of the following elements:
 Identity Policy—Specifies how the user should be authenticated and includes the allowed
authentication protocols and the user repository to use for password validation.
 Group Mapping Policy—Specifies if the user's ACS identity group should be dynamically
established based on user attributes or group membership in external identity stores. The user's
identity group can be used as part of their authorization.
 Authorization Policy—Specifies the authorization rules for the user.
9
Cont. Access Services : A Sample
 Access Service List
 Service selection Policy
10
WHY Cisco identity services Engine?
 The Evolving Workplace Landscape
 Device proliferation
15 billion Devices by 2015
that Will Be
Connecting to Your
Network
40% of staff Are
Bringing Their
Devices to Work
On Average Every Person Has 3-
4 Devices On them that
Connects to the Network
Gartner:
until 2020  26 billion Devices in IOE
(Internet of Everything)
11
Key Functions
 Combines authentication, authorization, accounting (AAA), posture, and profiler into one
appliance
 Provides for comprehensive guest access management for Cisco ISE administrators
 Enforces endpoint compliance by providing comprehensive client provisioning measures and
assessing the device posture for all endpoints that access the network, including 802.1X
environments
 Provides support for discovery, profiling, policy-based placement, and monitoring of endpoint
devices on the network
 Employs advanced enforcement capabilities including Trustsec through the use of Security Group
Tags (SGTs) and Security Group Access Control Lists (SGACLs)
 Supports scalability to support a number of deployment scenarios from small office to large
enterprise environments
12
Features of ISE
Features Benefit
Highly secure
supplicant-
less network access
Provides organizations with the ability to swiftly roll out highly
secure network access without configuring endpoints for
authentication and authorization. Authentication and
authorization are derived from login information across
application layers and used to allow user access without
requiring a 802.1X supplicant to exist on the endpoint
Guest lifecycle
management
Time limits, account expirations, and SMS verification offer
additional security controls, and full guest
auditing can track access across your network for security and
compliance demands.
Source-Group
Tagging
Easier access controls
13
Cont. Features of ISE
Feature Benefit
AAA protocols RADIUS /TACACS+ protocols
Authentication
protocols
wide range of authentication protocols, including, but not
limited to, PAP, MS-CHAP, Extensible Authentication Protocol
(EAP)-MD5, Protected EAP (PEAP), EAP-Flexible Authentication
via Secure Tunneling (FAST), EAP-Transport Layer Security (TLS)
and EAP-Tunneled Transport Layer Security (TTLS).
Device profiling
Ships with predefined device templates for many types of
endpoints, such as IP phones, printers, IP cameras, smartphones,
and tablets. Administrators can also create their own device
templates. These templates can be used to automatically detect,
classify, and associate administration-defined identities when
endpoints connect to the network
14
Cont. Features of ISE15
Feature Benefit
Internal certificate
authority
Offers organizations an easy-to-deploy internal certificate
authority to simplify certificate management for personal
devices without adding the significant complexity of an
external certificate authority application.
Endpoint posture
Verifies endpoint posture assessment for PCs and mobile
devices connecting to the network.
Ecosystem with pxGrid
integrating through pxGrid with SIEM and threat defense
solutions, web security
solutions, and operational technology control
Monitoring and
troubleshooting
Includes a built-in web console for monitoring, reporting, and
troubleshooting.
Extensive multiforest
AD support
Provides comprehensive authentication and authorization
against multiforest Microsoft Active Directory domains.
Comprehensive Visibility Identity and
Context Awareness
Context
Identity
16
Identity Awareness
IEEE 802.1x Mac Auth Bypass web Authentication
Consistent identity feature supported on all Catalyst switch models
Authentication Features
17
Device identification/Device Profiling
 Automated Device Classification using Cisco Infrastructure
Cisco
Innovation
Profiling operations:
 Determining The Manufacture of
endpoint
Function of endpoint (IP phone, IP
camera, net printer)
Other network level assessments of
endpoint
18
Context Awareness: Posture Assessment
 ISE Posture Ensures Endpoint Health before network access
Posturing:
 Using NAC agent, Posturing will
ensure that endpoint is adhering to
security policies.
 If security policy is matched
additional network access can be
allowed via authorization policy.
 Depth of posturing ->3party software
such as MDMs
19
Context Awareness: Guest Management
 ISE Guest Service for Managing guests
20
SGT Exchange Protocol support
Cisco
Innovation
Flexible Enforcement mechanisms in your infrastructure
21
Cont. Security Group Tagging support
:Traditional ACL rules
22
Cont. S security Group Tagging support
 Enforcement is based on the Security Group Tag, can control communication in
same VLAN
23
Cont. Security Group Tagging support:
Example
Source/Des PCI HR
PCI
HR
 PCI User attempting to talk to HR user on same switch same VLAN is denied.
 HR User on Switch 1 is able to communicate with HR User on Switch 2.
 HR User is denied access to the PCI Server.
 PCI User is granted access to the PCI Server.
24
Platform Exchange Grid (pxGrid )
context sharing
 pxGrid is a robust context-sharing platform that takes the deep level of contextual
data collected by ISE and delivers it to external and internal ecosystem partner
solutions
 ISE can integrate through pxGrid with SIEM and threat defense solutions, web
security solutions, and operational technology control (including supervisory
control and data acquisition, or SCADA, operational and security policy
integration).
 The list of ecosystem partners who are taking advantage of this simple unified
framework continues to expand ( The Page: partner security ecosystem page)
25
Conclusion26
Features ACS ISE
AAA protocol
(TACACS+/RADUISE)
* *
External DB (AD,LDAP) * *
Auth protocols * * + TTLS
Auth features 802.1x 802.1x,MAB,webAuth
Endpoint posture *
Device profiling *
Guest management *
Access policies Vlan , ACL +SGT
Internal CA *
Complete access
control
With other TrustSec
solutions
With SIEM and security
solutions using pxGrid
Monitoring, reporting,
and troubleshooting
Using columns view Using real-time
dashboard metrics
Thank You

More Related Content

What's hot

Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Bruno Teixeira
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조
Seung-Hoon Baek
 
Vpc notes
Vpc notesVpc notes
Vpc notes
Krunal Shah
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Bruno Teixeira
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
SONG INSEOB
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
Vepsun Technologies
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
Mostafa El Lathy
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
BradLai3
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
Cisco Canada
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
Vepsun Technologies
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
Scott Lowe
 
VXLAN and FRRouting
VXLAN and FRRoutingVXLAN and FRRouting
VXLAN and FRRouting
Faisal Reza
 
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptxPPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
FadhilMuhammad80
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
Mason Mei
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
Duncan Epping
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Ajeet Singh
 

What's hot (20)

ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조
 
Vpc notes
Vpc notesVpc notes
Vpc notes
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
 
VXLAN and FRRouting
VXLAN and FRRoutingVXLAN and FRRouting
VXLAN and FRRouting
 
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptxPPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
 

Viewers also liked

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
Cisco Canada
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
Robb Boyd
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
solarisyougood
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
solarisyougood
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
solarisyougood
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overviewali raza
 
Cisco identity services engine (ise) ordering steps &amp; guide
Cisco identity services engine (ise) ordering steps &amp; guideCisco identity services engine (ise) ordering steps &amp; guide
Cisco identity services engine (ise) ordering steps &amp; guide
IT Tech
 
VMware vSphere5.1 Training
VMware vSphere5.1 TrainingVMware vSphere5.1 Training
VMware vSphere5.1 Training
零壹科技股份有限公司
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
dkaya
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
valerian_ceaus
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication StandardDan Miller
 
Cisco UCS (Unified Computing System)
Cisco UCS (Unified Computing System)Cisco UCS (Unified Computing System)
Cisco UCS (Unified Computing System)
NetWize
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
ESXLab
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparisonWouter Hermans
 
Cisco UCS
Cisco UCSCisco UCS
Cisco UCS
Erik Bussink
 

Viewers also liked (18)

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
Cisco identity services engine (ise) ordering steps &amp; guide
Cisco identity services engine (ise) ordering steps &amp; guideCisco identity services engine (ise) ordering steps &amp; guide
Cisco identity services engine (ise) ordering steps &amp; guide
 
CSACSGuide-SAMPLE
CSACSGuide-SAMPLECSACSGuide-SAMPLE
CSACSGuide-SAMPLE
 
VMware vSphere5.1 Training
VMware vSphere5.1 TrainingVMware vSphere5.1 Training
VMware vSphere5.1 Training
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
 
Cisco UCS (Unified Computing System)
Cisco UCS (Unified Computing System)Cisco UCS (Unified Computing System)
Cisco UCS (Unified Computing System)
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparison
 
Cisco UCS
Cisco UCSCisco UCS
Cisco UCS
 

Similar to From Cisco ACS to ISE

Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Hassan EL ALLOUSSI
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
Joel Oleson
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
Yaser330700
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
Cisco Canada
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
Teleport
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Ping Identity
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
rver21
 
Predix
PredixPredix
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
Matt McLarty
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
Shamun Mahmud
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
apidays
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
Amazon Web Services
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
CA Technologies
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 

Similar to From Cisco ACS to ISE (20)

Aruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_finalAruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_final
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Predix
PredixPredix
Predix
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

From Cisco ACS to ISE

  • 1. From cisco ACS To ISE Comparison of two technologies M.Zahedi 2015
  • 2. In The Name Of God2 Contents ACS Introduction Policy terminology Access Service /Examples Why ISE New features Of ISE
  • 3. Cisco secure Access Control  Network security officers and administrators need solutions that support flexible authentication and authorization policies that are tied not only to a user’s identity but also to context such as the network access type, time of day the access is requested, and the security of the machine used to access the network.  Cisco Secure ACS, a core component of the Cisco TrustSec® solution, is a highly sophisticated policy platform providing RADIUS and TACACS+ services.  Cisco Secure ACS provides central management of access policies for device administration and for wireless, wired IEEE 802.1x, and remote (VPN) network access scenarios. 3
  • 4. Features  Unique, flexible, and detailed device administration in IPv4 and IPv6 networks, with full auditing and rules-based policy model that flexibly addresses complex policy needs  A lightweight, web-based GUI with intuitive navigation and workflow accessible from both IPv4 and IPv6 clients  Integrated advanced monitoring, reporting, and troubleshooting capabilities for excellent control and visibility  Integration with external identity and policy databases, including Microsoft Active Directory and Lightweight Directory Access Protocol (LDAP)-accessible databases, simplifying policy configuration and maintenance  A distributed deployment model that enables large-scale deployments and provides a highly available solution 4
  • 5. Main Features and Benefits of Cisco Secure ACS 5.8 Features Benefit Complete access control and confidentiality solution It can be deployed with other Cisco TrustSec components, including policy components, infrastructure enforcement components, endpoint components, and professional services. Authentication, authorization, and accounting (AAA) protocols supporting two distinct AAA protocols: RADIUS and TACACS+ Database options integration with existing external identity repositories such as Microsoft AD servers, LDAP servers, and RSA token servers. Authentication protocols PAP, MS-CHAP, Extensible Authentication Protocol (EAP)-MD5, Protected EAP (PEAP), EAP-Flexible Authentication through Secure Tunneling (FAST), EAP-Transport Layer Security (TLS), and PEAP-TLS. It also supports TACACS+ authentication with CHAP/MSCHAP protocols and PAP-based password change when using TACACS+ and EAP-GTC with LDAP servers. 5
  • 6. Cont. Main Features and Benefits of Cisco Secure ACS 5.8 Features Benefit Access policies a rules-based, attribute-guided policy model that provides greatly increased power and flexibility for access control policies, which can include authentication protocol requirements, device restrictions, time-of- day restrictions, and other access requirements. Cisco Secure ACS can apply downloadable access control lists (dACLs), VLAN assignments, and other authorization parameters. Furthermore, it allows comparison between the values of any two attributes that are available to Cisco Secure ACS to be used in identity, group-mapping, and authorization policy rules. Centralized management Cisco Secure ACS 5.8 supports a completely redesigned lightweight, web-based GUI that is easy to use. An efficient, incremental replication scheme quickly propagates changes from primary to secondary systems, providing centralized control over distributed deployments. Software upgrades are also managed through the GUI and can be distributed by the primary system to secondary instances. Support for high availability in larger Cisco Secure ACS deployments Cisco Secure ACS 5.8 supports up to 22 instances in a single Cisco ACS cluster: 1 primary and 21 secondary. One of these instances can function as a hot (active) standby system, which can be manually promoted to the primary system in the event that the original primary system fails. If <identity-condition, restriction-condition> then <authorization-profile> 6
  • 7. Cont. Main Features and Benefits of Cisco Secure ACS 5.8 Feature Benefit Programmatic interface cisco Secure ACS 5.8 supports a programmatic interface for create, read, update, and delete operations on users and identity groups, network devices, and hosts (endpoints) within the internal database. It also adds the capability to export the list of Cisco Secure ACS administrators and their roles through the same web services API. Monitoring, reporting, and troubleshooting Cisco Secure ACS 5.8 includes an integrated monitoring, reporting, and troubleshooting component that is accessible through the web-based GUI. This tool provides excellent visibility into configured policies and authentication and authorization activities across the network. 7
  • 8. Policy terminology  Access service : A sequential set of policies used to process access request  Policy element : Global, shared object that defines policy conditions and permission  Shell profile: permissions container for TACACS+ based device administration policy  Authorize profile: permissions container for RADIUS based network  Command set: contains the set of permitted commands  Policy: A set of rules that are used to reach a specific policy decision  Identity policy: policy for choosing how to authenticate and acquire identity attributes for a given request. 8
  • 9. Access Services  Access services are fundamental constructs in ACS 5.x that allow you to configure access policies for users and devices that connect to the network and for network administrators who administer network devices  In ACS 5.x, authentication and authorization requests are processed by access services.  An access service consists of the following elements:  Identity Policy—Specifies how the user should be authenticated and includes the allowed authentication protocols and the user repository to use for password validation.  Group Mapping Policy—Specifies if the user's ACS identity group should be dynamically established based on user attributes or group membership in external identity stores. The user's identity group can be used as part of their authorization.  Authorization Policy—Specifies the authorization rules for the user. 9
  • 10. Cont. Access Services : A Sample  Access Service List  Service selection Policy 10
  • 11. WHY Cisco identity services Engine?  The Evolving Workplace Landscape  Device proliferation 15 billion Devices by 2015 that Will Be Connecting to Your Network 40% of staff Are Bringing Their Devices to Work On Average Every Person Has 3- 4 Devices On them that Connects to the Network Gartner: until 2020  26 billion Devices in IOE (Internet of Everything) 11
  • 12. Key Functions  Combines authentication, authorization, accounting (AAA), posture, and profiler into one appliance  Provides for comprehensive guest access management for Cisco ISE administrators  Enforces endpoint compliance by providing comprehensive client provisioning measures and assessing the device posture for all endpoints that access the network, including 802.1X environments  Provides support for discovery, profiling, policy-based placement, and monitoring of endpoint devices on the network  Employs advanced enforcement capabilities including Trustsec through the use of Security Group Tags (SGTs) and Security Group Access Control Lists (SGACLs)  Supports scalability to support a number of deployment scenarios from small office to large enterprise environments 12
  • 13. Features of ISE Features Benefit Highly secure supplicant- less network access Provides organizations with the ability to swiftly roll out highly secure network access without configuring endpoints for authentication and authorization. Authentication and authorization are derived from login information across application layers and used to allow user access without requiring a 802.1X supplicant to exist on the endpoint Guest lifecycle management Time limits, account expirations, and SMS verification offer additional security controls, and full guest auditing can track access across your network for security and compliance demands. Source-Group Tagging Easier access controls 13
  • 14. Cont. Features of ISE Feature Benefit AAA protocols RADIUS /TACACS+ protocols Authentication protocols wide range of authentication protocols, including, but not limited to, PAP, MS-CHAP, Extensible Authentication Protocol (EAP)-MD5, Protected EAP (PEAP), EAP-Flexible Authentication via Secure Tunneling (FAST), EAP-Transport Layer Security (TLS) and EAP-Tunneled Transport Layer Security (TTLS). Device profiling Ships with predefined device templates for many types of endpoints, such as IP phones, printers, IP cameras, smartphones, and tablets. Administrators can also create their own device templates. These templates can be used to automatically detect, classify, and associate administration-defined identities when endpoints connect to the network 14
  • 15. Cont. Features of ISE15 Feature Benefit Internal certificate authority Offers organizations an easy-to-deploy internal certificate authority to simplify certificate management for personal devices without adding the significant complexity of an external certificate authority application. Endpoint posture Verifies endpoint posture assessment for PCs and mobile devices connecting to the network. Ecosystem with pxGrid integrating through pxGrid with SIEM and threat defense solutions, web security solutions, and operational technology control Monitoring and troubleshooting Includes a built-in web console for monitoring, reporting, and troubleshooting. Extensive multiforest AD support Provides comprehensive authentication and authorization against multiforest Microsoft Active Directory domains.
  • 16. Comprehensive Visibility Identity and Context Awareness Context Identity 16
  • 17. Identity Awareness IEEE 802.1x Mac Auth Bypass web Authentication Consistent identity feature supported on all Catalyst switch models Authentication Features 17
  • 18. Device identification/Device Profiling  Automated Device Classification using Cisco Infrastructure Cisco Innovation Profiling operations:  Determining The Manufacture of endpoint Function of endpoint (IP phone, IP camera, net printer) Other network level assessments of endpoint 18
  • 19. Context Awareness: Posture Assessment  ISE Posture Ensures Endpoint Health before network access Posturing:  Using NAC agent, Posturing will ensure that endpoint is adhering to security policies.  If security policy is matched additional network access can be allowed via authorization policy.  Depth of posturing ->3party software such as MDMs 19
  • 20. Context Awareness: Guest Management  ISE Guest Service for Managing guests 20
  • 21. SGT Exchange Protocol support Cisco Innovation Flexible Enforcement mechanisms in your infrastructure 21
  • 22. Cont. Security Group Tagging support :Traditional ACL rules 22
  • 23. Cont. S security Group Tagging support  Enforcement is based on the Security Group Tag, can control communication in same VLAN 23
  • 24. Cont. Security Group Tagging support: Example Source/Des PCI HR PCI HR  PCI User attempting to talk to HR user on same switch same VLAN is denied.  HR User on Switch 1 is able to communicate with HR User on Switch 2.  HR User is denied access to the PCI Server.  PCI User is granted access to the PCI Server. 24
  • 25. Platform Exchange Grid (pxGrid ) context sharing  pxGrid is a robust context-sharing platform that takes the deep level of contextual data collected by ISE and delivers it to external and internal ecosystem partner solutions  ISE can integrate through pxGrid with SIEM and threat defense solutions, web security solutions, and operational technology control (including supervisory control and data acquisition, or SCADA, operational and security policy integration).  The list of ecosystem partners who are taking advantage of this simple unified framework continues to expand ( The Page: partner security ecosystem page) 25
  • 26. Conclusion26 Features ACS ISE AAA protocol (TACACS+/RADUISE) * * External DB (AD,LDAP) * * Auth protocols * * + TTLS Auth features 802.1x 802.1x,MAB,webAuth Endpoint posture * Device profiling * Guest management * Access policies Vlan , ACL +SGT Internal CA * Complete access control With other TrustSec solutions With SIEM and security solutions using pxGrid Monitoring, reporting, and troubleshooting Using columns view Using real-time dashboard metrics

Editor's Notes

  1. Cisco Secure ACS 5.6 includes an integrated monitoring, reporting, and troubleshooting component that is accessible through the web-based GUI. This tool provides excellent visibility into configured policies and authentication and authorization activities across the network. Logs are viewable and exportable for use in other systems as well. A new report generation mechanism in Cisco Secure ACS 5.6 provides significantly better performance and improved ease of use. However, it does not have report customization capabilities under the “Interactive Viewer” option for reports that were available in Cisco UCS ACS 5.5 and earlier releases. A subset of those options such as “Show/Hide columns” and “Sort columns” will be added in a subsequent Cisco Secure ACS release or patch.
  2. PAP=password authentication protocol _> no secure clear text password MSCHAP= Microsoft Challenge Handshake authentication protocol -> hash password no encryption and clear text username
  3. Assume that we have 2 groups: 1 has unlimited access to network and the other has limited. 1-we create two shell profile (Adminprofile :previlege15/NetProfile:privilege 1) Next in Command Sets : 2-We create two commandsets one : Name:AllowAllCommand the other Name : AlloowShowCommand 3-In identity groups Section : Name RWGroup , Name:ROGroup 4-In DefaultDeviceAdmin>Group Mapping : from AD-AD1 condition:any user in x domain Result: RWGroup from AD-AD1 any user in y domain result :Rogroup 5-Authorizatipn section: Rwpolicy (identitygroup,location,devicetype,time and date) result : AllowAllcommand , AdminshellProfile and the other Ropolicy too.
  4. The enterprise network no longer sits within four secure walls. It extends to wherever employees are and wherever data goes. Employees today want access to work resources from more devices and through more non-enterprise networks than ever before. Mobility and the Internet of Everything (IoE) are changing the way we live and work. As a result, enterprises must support a massive proliferation of new network-enabled devices. However, a myriad of security threats and highly publicized data breaches clearly demonstrate the importance of protecting this evolving enterprise network.