<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Same certificate for all devices vs PSK or IPSK ? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3876561#M472217</link>
    <description>&lt;P&gt;Thats the way to go I suppose.&amp;nbsp; Thanks a lot for help my friend &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jun 2019 08:01:57 GMT</pubDate>
    <dc:creator>piotrPaszk</dc:creator>
    <dc:date>2019-06-20T08:01:57Z</dc:date>
    <item>
      <title>Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874169#M472209</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have a customer who uses Lightspeed as an MDM for ipads with PSK. The lighspeed can not be intergrated with ISE and does not have option to generate certificates. The customer wants to use certificates instead for PSK as it is consider more secure.&lt;/P&gt;&lt;P&gt;So the question is: What would be the best and most secure option to autheticate the devices in this case ? I have to generate indentity certificate n ISE, upload it to MDM and push it to alle devices then I was thinking to maybe utilize rules on ISE for authorization with EAP-TLS and in addition to that get them registered via byod portal ( link bellow) and then use an extra check " device registered yes".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can download all mac addresses from MDM and use it as extra protection in rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What security experts would recomend ?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 11:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874169#M472209</guid>
      <dc:creator>piotrPaszk</dc:creator>
      <dc:date>2019-06-17T11:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874210#M472210</link>
      <description>A couple holes here, provided I have all the information? You didn’t say the type of devices and why you’re talking only about PSK?&lt;BR /&gt;&lt;BR /&gt;If the MDM doesn’t integrate with or distribute certificates then it has no relevance to be able to integrate or provide any useful authentication&lt;BR /&gt;&lt;BR /&gt;A list of Mac addresses is not secure&lt;BR /&gt;&lt;BR /&gt;If these are windows android Apple devices then the recommendation is to use BYOD flow with certificates. This is EAP-TLS&lt;BR /&gt;&lt;BR /&gt;Otherwise there is no solution for PSK and certificate based authentication with Ise as PSK doesn’t really setup any secure authentication with AAA besides MAB And a key exchange for the controller to use&lt;BR /&gt;&lt;BR /&gt;Did you see this article?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-amp-wlc-wpa2-psk-wlan-per-device-passphrase-ipsk/ta-p/3644425" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-amp-wlc-wpa2-psk-wlan-per-device-passphrase-ipsk/ta-p/3644425&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 12:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874210#M472210</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-17T12:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874262#M472211</link>
      <description>&lt;P&gt;Thanks Jason for the answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To use BYOD flow with certificates in this case would be very cumbersome as there are 5000 apple ipads.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure about that but when a device is under managment of MDM so you will not be allowed to go through BYOD ?&lt;/P&gt;&lt;P&gt;If thats a case&amp;nbsp; so the only option I see is to use IPSK until they get a proper MDM ?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 13:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874262#M472211</guid>
      <dc:creator>piotrPaszk</dc:creator>
      <dc:date>2019-06-17T13:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874322#M472212</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To use BYOD flow with certificates in this case would be very cumbersome as there are 5000 apple ipads.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;JAK &amp;gt; BYOD flow is for each user to do their own onboard, please check out the prescriptive guide at &lt;A href="http://cs.co/ise-byod" target="_blank"&gt;http://cs.co/ise-byod&lt;/A&gt;. Even with an MDM the user has to onboard the device with the app&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure about that but when a device is under managment of MDM so you will not be allowed to go through BYOD ?&lt;/P&gt;
&lt;P&gt;JAK&amp;gt; your MDM has no way to manage certificates for EAP-TLS or integrate with ISE , therefore is has no relevance to this flow or discussion&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If thats a case&amp;nbsp; so the only option I see is to use IPSK until they get a proper MDM ?&lt;/P&gt;
&lt;P&gt;JAK&amp;gt; IPSK&amp;nbsp; might be an option depending on what you want to do. It is more secure than MAB but per the guide i shared you there is some setup and management of the devices and wont be secure like EAP-TLS.&amp;nbsp; the user will need to copy paste the key you send to them. you can integrate BYOD without native supplicant and certificate provisioning like you stated&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 14:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3874322#M472212</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-17T14:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3875025#M472213</link>
      <description>&lt;P&gt;Thank for all the tips &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; You open my eyes for many aspects&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To use BYOD flow with certificates in this case would be very cumbersome as there are 5000 apple ipads.&amp;nbsp;&lt;/P&gt;&lt;P&gt;JAK &amp;gt; BYOD flow is for each user to do their own onboard, please check out the prescriptive guide at &lt;A href="http://cs.co/ise-byod" target="_blank" rel="nofollow noopener noreferrer"&gt;http://cs.co/ise-byod&lt;/A&gt;. Even with an MDM the user has to onboard the device with the app&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## Those devices were provisioned for MDM by dedicated teachers as It maybe difficult for 7 years old kid to do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure about that but when a device is under managment of MDM so you will not be allowed to go through BYOD ?&lt;/P&gt;&lt;P&gt;JAK&amp;gt; your MDM has no way to manage certificates for EAP-TLS or integrate with ISE , therefore is has no relevance to this flow or discussion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;##True &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If thats a case&amp;nbsp; so the only option I see is to use IPSK until they get a proper MDM ?&lt;/P&gt;&lt;P&gt;JAK&amp;gt; IPSK&amp;nbsp; might be an option depending on what you want to do. It is more secure than MAB but per the guide i shared you there is some setup and management of the devices and wont be secure like EAP-TLS.&amp;nbsp; the user will need to copy paste the key you send to them. you can integrate BYOD without native supplicant and certificate provisioning like you stated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;##This would not be most optimal solution in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do think about just simply using PEAP with profiling or identity groups ?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 11:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3875025#M472213</guid>
      <dc:creator>piotrPaszk</dc:creator>
      <dc:date>2019-06-18T11:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3875074#M472214</link>
      <description>Sounds like PEAP will have to do then.&lt;BR /&gt;Teachers will need to enter the credentials. Maybe special credentials just for iPad access?&lt;BR /&gt;&lt;BR /&gt;You can manually put them into special endpoint groups for access controls or dynamically do this with profiling and device sensor if you know only iPads used by this group of people&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3875074#M472214</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-18T13:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: Same certificate for all devices vs PSK or IPSK ?</title>
      <link>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3876561#M472217</link>
      <description>&lt;P&gt;Thats the way to go I suppose.&amp;nbsp; Thanks a lot for help my friend &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 08:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/same-certificate-for-all-devices-vs-psk-or-ipsk/m-p/3876561#M472217</guid>
      <dc:creator>piotrPaszk</dc:creator>
      <dc:date>2019-06-20T08:01:57Z</dc:date>
    </item>
  </channel>
</rss>

