<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Welcome and best wishes on in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734169#M57224</link>
    <description>&lt;P&gt;Welcome and best wishes on your learning.&lt;/P&gt;&lt;P&gt;ASA vs. ISE ... there's only about 5% overlap in those products.&lt;/P&gt;&lt;P&gt;The ASA does control network access for endpoints if they are, say, remote access VPN clients. It can do a little bit of posture checking to make sure the host is compliant with policy. It does a whole lot of other things - stateful firewalling, network address translation, site-site VPN, protocol inspection, etc.&lt;/P&gt;&lt;P&gt;ISE gives you context-based network access control via classic AAA features (Authentication Authorization and Accounting) combined with rich features such as endpoint profiling, posture assessment, extremely rich rule set creation and processing etc. Ise integrates with many external identity stores such as AD, LDAP, RADIUS etc. and can itself act as a RADIUS server. In fact, a lot of what it does in the context of 802.1x network access control is via Change of Authorization (CoA) using RADIUS Attribute-Value (A-V) pairs. CoA can do things like dynamically change the end user's VLAN assignment, push down a port-specific dynamic access-list, assign a Security Group Tag (SGT), redirect to a web portal for authentication, remediation, device registration etc.&lt;/P&gt;&lt;P&gt;That's just a quick compare and contrast. You can literally spend years learning both and still not know all of either one.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2015 01:58:59 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-10-08T01:58:59Z</dc:date>
    <item>
      <title>ASA vs ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734168#M57223</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a noob when it comes to ASA and almost no experience with ISE other than what I can find online. &amp;nbsp;It seems like they both do the same sort of things for us. &amp;nbsp;Security for VPNs. &amp;nbsp;What other differences or similarities are there between these products? &amp;nbsp;Even the most basic differences would be helpful since I'm just starting with ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734168#M57223</guid>
      <dc:creator>douglaswhitwill</dc:creator>
      <dc:date>2019-03-11T06:08:14Z</dc:date>
    </item>
    <item>
      <title>Welcome and best wishes on</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734169#M57224</link>
      <description>&lt;P&gt;Welcome and best wishes on your learning.&lt;/P&gt;&lt;P&gt;ASA vs. ISE ... there's only about 5% overlap in those products.&lt;/P&gt;&lt;P&gt;The ASA does control network access for endpoints if they are, say, remote access VPN clients. It can do a little bit of posture checking to make sure the host is compliant with policy. It does a whole lot of other things - stateful firewalling, network address translation, site-site VPN, protocol inspection, etc.&lt;/P&gt;&lt;P&gt;ISE gives you context-based network access control via classic AAA features (Authentication Authorization and Accounting) combined with rich features such as endpoint profiling, posture assessment, extremely rich rule set creation and processing etc. Ise integrates with many external identity stores such as AD, LDAP, RADIUS etc. and can itself act as a RADIUS server. In fact, a lot of what it does in the context of 802.1x network access control is via Change of Authorization (CoA) using RADIUS Attribute-Value (A-V) pairs. CoA can do things like dynamically change the end user's VLAN assignment, push down a port-specific dynamic access-list, assign a Security Group Tag (SGT), redirect to a web portal for authentication, remediation, device registration etc.&lt;/P&gt;&lt;P&gt;That's just a quick compare and contrast. You can literally spend years learning both and still not know all of either one.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 01:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734169#M57224</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-10-08T01:58:59Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin for the</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734170#M57226</link>
      <description>&lt;P&gt;Thanks Marvin for the explanation!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2015 03:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vs-ise/m-p/2734170#M57226</guid>
      <dc:creator>douglaswhitwill</dc:creator>
      <dc:date>2015-10-09T03:17:57Z</dc:date>
    </item>
  </channel>
</rss>

