05-10-2019 10:33 AM
I recall NAC being binary in that endpoint passed HIP check and were allowed through or failed and placed on guest net. I've a situation where Company A has acquired company B and will be bleeding applications over to company A's Data centers over time and providing services to company B from company A locations.
Can NAC/ISE/TACAS be configured to recognize Company A endpoints plugging into a network drop at company B, configure the switch port to a secure VLAN for company A and switch company A traffic to the Company A WAN drop being installed at company B? And of course the opposite, recognizing company B endpoints, reconfigure the switch port for company B user VLAN and switching the traffic to company B WAN for servicing at company B data center?
Solved! Go to Solution.
05-13-2019 05:18 AM
There are two parts to this. First, is how to identify and differentiate company A & B machines. Second is to assign different VLAN that maps to different network in the back end.
The second part is trivial provided that the network has been re-engineered with matching VLANs that can be assigned on all the access switches on B locations.
Some options for the first part which requires configuring B switches with 802.1X/MAB.
For further information on how to achieve the above, I suggest going through following document: https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515
Also, instead of utilizing wired port, another option is to create a new WLAN in B location and dedicate it for access to A's network.
05-10-2019 04:33 PM
well, using posture you can make sure that the devices are compliant with the policies you need its not like HIP, its more of control that the endpoints connected to the network having the security programs that complies with policy of the organisation,
from the description i understand that you would like to do segmentation based on the endpoints that belongs to company A,b
remember we can do this easily by using dot1x, or easyconnect maybe if it will be hard to use dot1x on the new company B
now the policies would be like if the user is part from AD group X then give it authorization profile with DACL, VLAN, SGT maybe it will be great to use SGT as well in this kind of segmentation,
and vice versa if the user is part of AD group Y then give it ......
the options are wide, check if it will be suitable for you to use dot1x on the new acquired company, if not check the easyconnect if it will be suitable for you, i think its best for you to have access to the AD anyway to know the groups and separate the authz accordingly.
05-13-2019 05:18 AM
There are two parts to this. First, is how to identify and differentiate company A & B machines. Second is to assign different VLAN that maps to different network in the back end.
The second part is trivial provided that the network has been re-engineered with matching VLANs that can be assigned on all the access switches on B locations.
Some options for the first part which requires configuring B switches with 802.1X/MAB.
For further information on how to achieve the above, I suggest going through following document: https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515
Also, instead of utilizing wired port, another option is to create a new WLAN in B location and dedicate it for access to A's network.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide