<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE PIC in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516655#M557628</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jinesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A single PSN running PassiveID would be able to handle those controllers.&amp;nbsp; The scale limit is 100 in total using either the agent or WMI.&amp;nbsp; The current scaling guidelines for ISE outlines the maximum number of subscribers but you are will under that with only 3.&amp;nbsp; PassiveID looks for logon events regardless of security groups the user is a member of.&amp;nbsp; However, we do have the ability to configure mapping filters but that is only on a per user basis today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Apr 2018 14:15:06 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2018-04-03T14:15:06Z</dc:date>
    <item>
      <title>ISE PIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516653#M557595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: black;"&gt;Customer would like to use ISE passive identity to control access to Data Center resources in conjunction with Firepower Threat Defense.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: black;"&gt;ISE passive identity (full ISE being used not PIC) would need to monitor 83 domain controllers and push, via pxGrid, identity mappings to 3 FMCs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: black;"&gt;There are approximately 160,000 AD users.&amp;nbsp; We don’t have any information on peak logins per second.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: black;"&gt;We are looking for design guidance as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Would a single PSN be able to handle the AD monitoring and pxGrid distribution requirements?&amp;nbsp; If not, any guidance on how many PSNs would be recommended?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Do we have any more detailed scaling guidelines other than the data sheet?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Is there any way to configure WMI events for specific user groups?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516653#M557595</guid>
      <dc:creator>jineshrd</dc:creator>
      <dc:date>2020-02-21T18:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516654#M557612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Moved to pic community&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2018 12:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516654#M557612</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-04-03T12:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516655#M557628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jinesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A single PSN running PassiveID would be able to handle those controllers.&amp;nbsp; The scale limit is 100 in total using either the agent or WMI.&amp;nbsp; The current scaling guidelines for ISE outlines the maximum number of subscribers but you are will under that with only 3.&amp;nbsp; PassiveID looks for logon events regardless of security groups the user is a member of.&amp;nbsp; However, we do have the ability to configure mapping filters but that is only on a per user basis today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pic/m-p/3516655#M557628</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-04-03T14:15:06Z</dc:date>
    </item>
  </channel>
</rss>

