Check Point Identity Collector integration with Cisco ISE 2.4 PxGrid
I have a distributed ISE deployment with 2 PAN (PxGrid enabled) nodes, 2 MNT and 5 PSNs. I have integrated Check Point Identity Collector with ISE PxGrid Node. While integrating I exported Internal CA certificate from 'Primary PxGrid Node' which was used along with Root Certificate (domain) to generate 'Server certificate' in .jks format.
My concern is, what if the 'Primary PxGrd Node' breaks ? Will the Identity Collector still be ale to communicate with 'Secondary PxGrid Node'? Note that I used internal CA cert of Primary PxGrid Node to generate Server Certificate which was used while integrating Check Point Identity Collector.
On July 16 2020, the U.K. National Cyber Security Centre and Canada’s Communication Security Establishment, in cooperation with the U.S. National Security Agency and Cybersecurity and Infrastructure Security agency, issued an advisory [...
User Experience Enhancements
As part of the Cisco Common User Experience program, we are working towards a more uniform user experience and terminology alignment across all Cisco security products.
Cognitive Alert Fusion Early A...
If you or your customers have experience with segmentation policy functions and decisions, we would be very grateful if you could respond to this survey. Your feedback will help us to improve segmentation policy products for you and your customers.Fo...
For now FMC has generate report option available on UI which provides report in PDF format. CSV report is still a limitation.
Anupam and I have created a script which let you for export the enabled intrusion SIDs fr...
The AdvisoryThe HuntThe QueriesThe Links
Configuring 3rd Party Modules for SecureX Integrations
This steps explains some easy steps to configure, upload and integrate 3rd Party enrichment modules. There are just some simple steps to do. ...