<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4133063#M562235</link>
    <description>&lt;P&gt;It's probably a matter of opinon and experience on which is more complex to configure. Posture assessment is more secure, it is usually configured to compliment 802.1x. Without 802.1x you authenticate the user to the network, combine that with posture assessment you determine whether the user is authenticating to the network using a laptop that complies with the organisation's security policy (i.e. is AV, AM or FW installed and running).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to the Posture configuration guide for more information.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_self"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client provisioning is used to deploy the agent to the connecting devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Mon, 10 Aug 2020 13:28:15 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-08-10T13:28:15Z</dc:date>
    <item>
      <title>ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4132495#M562216</link>
      <description>&lt;P&gt;Hi gentlemen,&lt;/P&gt;&lt;P&gt;What do these terms do?&amp;nbsp; &amp;nbsp;1. dot1x&amp;nbsp; &amp;nbsp; 2. Posture Assessment&lt;/P&gt;&lt;P&gt;Can FirePower do what ISE does?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 08 Aug 2020 14:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4132495#M562216</guid>
      <dc:creator>miracle_david@yahoo.com</dc:creator>
      <dc:date>2020-08-08T14:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4132514#M562217</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;802.1X is used to authenticate devices/users to a wired or wireless network.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/IEEE_802.1X" target="_self"&gt;https://en.wikipedia.org/wiki/IEEE_802.1X&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Posture assessment is used in ISE to determine the state of a device, for example whether it is running Anti-Virus, Anti-Malware or Personal firewall before permitted access to the network.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_self"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No Firepower is a Firewall, this is a separate solution to ISE, it does not perform 802.1x authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 08 Aug 2020 15:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4132514#M562217</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-08T15:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4133050#M562234</link>
      <description>Thanks for your great reply. Is there any similarity between "Posture Assessment" &amp;amp; "dot1x"? Which one is more complex to deploy? Which one has more stricter features for security?&lt;BR /&gt;What does Client Provisioning do?</description>
      <pubDate>Mon, 10 Aug 2020 13:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4133050#M562234</guid>
      <dc:creator>miracle_david@yahoo.com</dc:creator>
      <dc:date>2020-08-10T13:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4133063#M562235</link>
      <description>&lt;P&gt;It's probably a matter of opinon and experience on which is more complex to configure. Posture assessment is more secure, it is usually configured to compliment 802.1x. Without 802.1x you authenticate the user to the network, combine that with posture assessment you determine whether the user is authenticating to the network using a laptop that complies with the organisation's security policy (i.e. is AV, AM or FW installed and running).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to the Posture configuration guide for more information.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_self"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client provisioning is used to deploy the agent to the connecting devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 13:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4133063#M562235</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-10T13:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4133329#M562248</link>
      <description>&lt;P&gt;Since you are new to ISE and access control, I would recommend watching some of our past &lt;A href="http://cs.co/ise-webinars" target="_self"&gt;ISE Webinars&lt;/A&gt; that cover these topics:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="title style-scope ytd-video-primary-info-renderer"&gt;&amp;nbsp;&lt;A href="https://youtu.be/nXHK1fKfLBM?list=PLvBZXH_IO6nCu9p49Tl1LE4kY6mpyz1eN" target="_self"&gt;ISE Secure Wired Access Webinar&lt;/A&gt;&amp;nbsp; (&lt;A href="https://youtu.be/nXHK1fKfLBM?list=PLvBZXH_IO6nCu9p49Tl1LE4kY6mpyz1eN&amp;amp;t=1020" target="_self"&gt;802.1X is at 17:00&lt;/A&gt;)&lt;/LI&gt;
&lt;LI class="title style-scope ytd-video-primary-info-renderer"&gt;&lt;A href="https://www.youtube.com/watch?v=LnhHk4jKBZo&amp;amp;list=PLvBZXH_IO6nCu9p49Tl1LE4kY6mpyz1eN" target="_self"&gt;Posture and Compliance Webinar&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 20:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4133329#M562248</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-08-10T20:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/4133554#M562257</link>
      <description>Hi sir, I'm very gratitude &amp;amp; grateful for sharing webinars &amp;amp; considering my query. If you have other webinars regarding security like FirePower or other ISE features I'd be glad to watch them.&lt;BR /&gt;God bless you!</description>
      <pubDate>Tue, 11 Aug 2020 06:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/4133554#M562257</guid>
      <dc:creator>miracle_david@yahoo.com</dc:creator>
      <dc:date>2020-08-11T06:47:26Z</dc:date>
    </item>
  </channel>
</rss>

