<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pushing Configuration Changes with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680505#M495641</link>
    <description>No, that's not possible from ISE.  I think the closest you could get is a port config status report from Context Visibility &amp;gt; Network Devices &amp;gt; Port Config Status &amp;gt; Run on All/Selected.  This uses SNMP to poll the switch but only provides back minimal port related config but no way to act on it. &lt;BR /&gt;&lt;BR /&gt;When I think about unused ports and the security risk they present to an enterprise, I think ISE can be leveraged in a more efficient way than shutting down ports.  Eventually the goal is to get your switches to a closed mode state, where if an endpoint plugs in and is not allowed to be on the network, then you have restricted them via the access policy.  You can couple this with TrustSec to further secure known endpoints with scalable group tags, and limit host to host communication at your preference based on their authentication results.  Might not work for all environments but is a nice approach.</description>
    <pubDate>Fri, 03 Aug 2018 02:43:42 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2018-08-03T02:43:42Z</dc:date>
    <item>
      <title>Pushing Configuration Changes with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680481#M495638</link>
      <description>&lt;P&gt;Is there a way to push configuration changes to ISE like what Cisco Works is able to do&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 01:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680481#M495638</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2018-08-03T01:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing Configuration Changes with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680483#M495639</link>
      <description>Yes, but in an extremely limited way.  Not at all like Prime, APIC-EM, DNA, or Works.  You can have port vlans and dacls pushed during a user authentication flow for example.  &lt;BR /&gt;&lt;BR /&gt;You cannot configure things that I would normally considered infrastructure commands, radius servers, qos, stp, routing, static acls, etc. Basically anything outside of the realm of authenticating and securing a user.  ISE is the policy server, not a replacement for the others listed above.  I do however wish ISE could audit NAD config in a useful way.</description>
      <pubDate>Fri, 03 Aug 2018 01:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680483#M495639</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-08-03T01:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing Configuration Changes with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680495#M495640</link>
      <description>&lt;P&gt;Thank you Damien for your quick response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How about finding unused ports and shutting those down?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 01:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680495#M495640</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2018-08-03T01:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing Configuration Changes with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680505#M495641</link>
      <description>No, that's not possible from ISE.  I think the closest you could get is a port config status report from Context Visibility &amp;gt; Network Devices &amp;gt; Port Config Status &amp;gt; Run on All/Selected.  This uses SNMP to poll the switch but only provides back minimal port related config but no way to act on it. &lt;BR /&gt;&lt;BR /&gt;When I think about unused ports and the security risk they present to an enterprise, I think ISE can be leveraged in a more efficient way than shutting down ports.  Eventually the goal is to get your switches to a closed mode state, where if an endpoint plugs in and is not allowed to be on the network, then you have restricted them via the access policy.  You can couple this with TrustSec to further secure known endpoints with scalable group tags, and limit host to host communication at your preference based on their authentication results.  Might not work for all environments but is a nice approach.</description>
      <pubDate>Fri, 03 Aug 2018 02:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pushing-configuration-changes-with-ise/m-p/3680505#M495641</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-08-03T02:43:42Z</dc:date>
    </item>
  </channel>
</rss>

