<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does ISE get visibility of OT devices etc vs Forescout in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5246322#M594141</link>
    <description>&lt;P&gt;The main question here will be if Cisco ISE support multi-vendor infrastructure to get information from.&lt;/P&gt;
&lt;P&gt;In Forescout you can collect information and apply actions (virtaul firewall, disconnections, blocks) over any vendor device s (switches, routers, firewalls, AP/WLCs), but it seems to me like Cisco ISE does only make this with Cisco network devices, or am I wrong?&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jan 2025 09:14:58 GMT</pubDate>
    <dc:creator>JPavonM</dc:creator>
    <dc:date>2025-01-13T09:14:58Z</dc:date>
    <item>
      <title>How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245069#M594097</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;We currently use Forescout for our NAC solution and visibility of OT assets, the data is collected via mac, arp, span, network and nmap scans.&lt;/P&gt;&lt;P&gt;What would an equivalent ISE solution look like, what would we need? does it use the same things to profile the devices?&lt;/P&gt;&lt;P&gt;Has anyone moved from Forescout to ISE and the reasons why?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 08:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245069#M594097</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-01-09T08:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245094#M594101</link>
      <description>&lt;P&gt;Similar but ISE has DHCP, netflow,snmp, and other probes besides what you mention...&lt;/P&gt;
&lt;P&gt;all of them are documented here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 09:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245094#M594101</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2025-01-09T09:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245118#M594102</link>
      <description>&lt;P&gt;Thank you for that info, so all these services can run one one server? how many devices can a single server cover normally?&lt;/P&gt;&lt;P&gt;Also, can you have a "post connect" mode, whereby you dont use 802.1x or MAB, you let the device connect first, but have it so it profiles the device and if not authorised, it simply moves the vlan etc?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 10:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245118#M594102</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2025-01-09T10:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245264#M594104</link>
      <description>&lt;P&gt;You need 802.1X or MAB to create a RADIUS session to control the endpoint on the network device.&lt;/P&gt;
&lt;P&gt;You may provide a default authorization to perform some initial profiling then perform a RADIUS Change of Authorization (COA) - assuming your network device supports this capability - to update the authorization to the appropriate device type's access.&amp;nbsp; See &lt;A href="https://cs.co/ise-profiliing" target="_blank"&gt;https://cs.co/ise-profiliing &lt;/A&gt;for the deployment guide and options.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 16:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245264#M594104</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2025-01-09T16:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245354#M594106</link>
      <description>&lt;P&gt;"Post connect" is MUCH less secure than the ISE or ClearPass methods of requiring 802.1X/MAB first.&amp;nbsp; FortiNAC takes a similar approach as ForeScout.&amp;nbsp; The scale of the "post connect" solutions are also much less than those based on RADIUS.&amp;nbsp; It takes a lot more resources to constantly run SNMP walks, CLI commands, listen for SNMP or syslogs than it does to respond to simple, small RADIUS requests.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 20:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5245354#M594106</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-01-09T20:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5246322#M594141</link>
      <description>&lt;P&gt;The main question here will be if Cisco ISE support multi-vendor infrastructure to get information from.&lt;/P&gt;
&lt;P&gt;In Forescout you can collect information and apply actions (virtaul firewall, disconnections, blocks) over any vendor device s (switches, routers, firewalls, AP/WLCs), but it seems to me like Cisco ISE does only make this with Cisco network devices, or am I wrong?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 09:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5246322#M594141</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2025-01-13T09:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: How does ISE get visibility of OT devices etc vs Forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5246368#M594149</link>
      <description>Incorrect, ISE uses various standards to accomplish this. &lt;A href="https://cs.co/ise-interop" target="_blank"&gt;https://cs.co/ise-interop&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Jan 2025 11:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-does-ise-get-visibility-of-ot-devices-etc-vs-forescout/m-p/5246368#M594149</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-01-13T11:21:27Z</dc:date>
    </item>
  </channel>
</rss>

