<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229032#M593360</link>
    <description>&lt;P&gt;The NAD (network access device) can operate in one of two modes&lt;/P&gt;
&lt;P&gt;load balance (command load-balance least outstanding)&lt;/P&gt;
&lt;P&gt;Linear (the order you define in the switch)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can manually load balance across your network or manage primary/secondary for distributed setups.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE knows which network device sent the request but posturing is strictly client side (at the host computer). The posture “checklist” is sent to the host and the posture module on the device performs the checks. Once complete the node sends the results to ISE and a change of authorization is performed when required to apply the appropriate network access policy.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2024 14:13:31 GMT</pubDate>
    <dc:creator>stephan.l.martin1</dc:creator>
    <dc:date>2024-11-26T14:13:31Z</dc:date>
    <item>
      <title>Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228485#M593338</link>
      <description>&lt;P&gt;I am planning to deploy posture assessment in my environment. I have three clustered ISE nodes v3.1, all with PSN enabled, two admin and monitoring roles (primary and secondary). So, I need your expertise/advise in the best/ recommended deployment more especially in creation of the authorization policies for posture statuses (unknown, non-compliant and compliant). Is it required to have authorisation policy for each status? for example, assuming my nodes are as follows; ISE1, ISE2, ISE3. Im i required to create unknown authorisation policy for ISE1, ISE2, and ISE, non-compliant authrz for ISE1, ISE2, ISE3, and compliant policy for ISE1,ISE2,ISE3.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the Web redirection for unknown status profiles, is it required to state the static ip/host for each ISE nodes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2024 14:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228485#M593338</guid>
      <dc:creator>Tiroyaone72926925</dc:creator>
      <dc:date>2024-11-25T14:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228712#M593346</link>
      <description>&lt;P&gt;I will do my best to assist however your question is slightly confusing.&lt;/P&gt;
&lt;P&gt;1) An authorization policy is required for each policy element. That being said- you would not need to create them individually for each server in a cluster rather you would create a single Authz result for compliant (typically ACCESS_ACCEPT) Not-Compliant (ACCESS_ACCEPT with dynamic VLAN or dACL to restrict access) or Unknown which includes URL redirect. &lt;BR /&gt;Below is a link to an exceptionally well written guide that can help you to understand each aspect and how to integrate. Overall the policies and requirements must come from you or your organization to meet the intent of your posture requirements.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2024 22:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228712#M593346</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-25T22:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228987#M593359</link>
      <description>&lt;P&gt;Thank you for the helpful response. Based on your response, you seem to understand my question. But i still have questions; how does the PSN that is doing the asssessment know which node authenticated the endpoint. What if all the PSN fight or compete to do posture assessment, even the ones that did not authenticate the endpoint?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 12:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5228987#M593359</guid>
      <dc:creator>Tiroyaone72926925</dc:creator>
      <dc:date>2024-11-26T12:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229032#M593360</link>
      <description>&lt;P&gt;The NAD (network access device) can operate in one of two modes&lt;/P&gt;
&lt;P&gt;load balance (command load-balance least outstanding)&lt;/P&gt;
&lt;P&gt;Linear (the order you define in the switch)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can manually load balance across your network or manage primary/secondary for distributed setups.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE knows which network device sent the request but posturing is strictly client side (at the host computer). The posture “checklist” is sent to the host and the posture module on the device performs the checks. Once complete the node sends the results to ISE and a change of authorization is performed when required to apply the appropriate network access policy.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 14:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229032#M593360</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-26T14:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229126#M593364</link>
      <description>&lt;P&gt;Thanks Martin. much appreciated, Could you please point me to a cisco document that speaks to that?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 17:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229126#M593364</guid>
      <dc:creator>Tiroyaone72926925</dc:creator>
      <dc:date>2024-11-26T17:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Posture Assessment through Cisco ISE 3.1 in distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229158#M593365</link>
      <description>&lt;P&gt;There are a couple of guides that tap dance around the process. Below are two links which provide quite a bit of material. At the end of the day there are multiple methods that can be used to posture assess (agent v. agentless) all of which have use cases and separate scenarios. You will be required to understand your organizations posture policy (or develop one). &lt;BR /&gt;The last link is more from the design/framework side which is based around Zero-trust which is the core tenant of posturing to begin with. If you are unsure of how to get after developing a posture environment that meets the intent of your security requirements I would recommend reviewing the Zero-trust guide as it may give you some ideas on how to tackle this problem.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-frameworks.html" target="_blank"&gt;https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-frameworks.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please be sure to mark as helpful and accept as a solution if these answered your question!&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_compliance.html#ID873" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_compliance.html#ID873&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_pos_pol.html" target="_blank"&gt;https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_pos_pol.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 18:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posture-assessment-through-cisco-ise-3-1-in-distributed/m-p/5229158#M593365</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-26T18:26:22Z</dc:date>
    </item>
  </channel>
</rss>

