01-08-2019 06:20 PM
Hey everyone, now that ACS is End-of-Sale and soon to be End-of-Support, we are one of the organizations that stuck to our trusty ACS deployment until the very end. Now that we are being forced, we have finally decided to make the move to ISE. I have been working on this for last couple of months and finally have a working, in-production, ISE deployment. When I say "in-production", I have RADIUS configured and setup to authenticate Remote Access users for all our Anyconnect termination points (ASAs), some Wireless 802.1x has also been moved over and TACACS+ soon to be migrated over to ISE. One thing we have never played with is 802.1x for wired ethernet networks. We have a large number of branch offices spread throughout North America and a lot of these branches do not have an IT staff present onsite. Because of this, a lot of users, culturally, aren't very aware OR simply don't care about IT security. We regularly have users bringing in small desktop switches and sharing their network connections with personal devices. REALLY hoping to put an end to this with ISE. Now, back to my original question. How widely is 802.1X for Wired networks deployed in other organizations? I don't want to be Town Crier touting the roll out of 802.1X for ethernet only to find out down the road that it's got more issues than it solves. I understand the in's and out's of 802.1x when it comes to Wireless, I just have never deployed it on physical switch ports.
Solved! Go to Solution.
01-08-2019 09:12 PM
06-24-2019 11:22 PM
Nothing about ISE is light. That's been the case with every release from 1.0 though the current 2.6.
Robust? Well defects are fewer than they used to be so that's a good thing.
Like most software, new releases come with warnings and caveats. Cisco typically doesn't recommend going into production with a release that's not "gold star" status unless you are forewarned and accept the risk of service-affecting bugs. Usually one only does that because a new feature addresses a critical business requirement and the deployment plan is to test thoroughly before go-live.
01-08-2019 08:00 PM
01-08-2019 09:12 PM
01-09-2019 01:05 AM
01-09-2019 02:51 AM
Great topic of discussion @Ricky Sandhu . I work mainly in wireless space and I am surprised at how many customers I come across who still hang onto their PSK WLANs because the thought of 802.1X fills them with dread. Most networking kit can handle the tech, but the organisations/people are not ready for it. Therefore I think there is still a lot of good work to be done out in the field to educate customers about wireless and wired 802.1X - I believe the wired variant is a bit special compared to wireless and this is the one that trips up most folks.
@Damien Miller it would be nice to have a separate thread to hear your perspectives on getting customers ready for the TrustSec journey. How do you approach it, and how do you plan for it.
In my world that is still the ultimate unknown for many customers and I don't claim to fully understand it myself - but I am slowly getting there. In fact I think I had a Eureka moment today after watching a bunch of Labminutes videos on trustSec from way back. I find his stuff so well done and more digestable than any book or white paper. Or at least, I find it's a fantastic ice breaker for this scary topic. I think TrustSec has great potential but in my experience as soon as someone mentions the T-word, the room goes uncomfortably silent. People need to "see to believe" :)
01-09-2019 03:07 AM
Good Topic. I have to appropriate and put my input though. It much easier to implement 802.1X on wireless compare to wired. as you have to push the config on each single switch which is a time consuming and as said ealier in above post with different IOS version/s. in contract to wireless it more easire as all the setting are in one place in the controller.
in regards to Trust-Sec yes its scary in a way. Engineer do not have the exposure of this technology yet. we are still living in old school ACLs and most of us a happy and not ready to adopt the new technology as we have to go to read and lab again. just to your attention of cisco DNA where a trustsec rule can be deploy with a single click of touch.
would be great to hear how you guy are implementing in what phase of tsec. technology is keep reinvent very fast. having said in this domain we have to still on top of skill of encounter these technologies.
01-09-2019 03:20 AM - edited 01-09-2019 03:22 AM
Yes there is a danger of getting "left behind" while the world is moving on with Cisco SDA/DNA-C etc. When you have to explain what LISP and VXLAN is to customers, you can see the momentary blink in their eyes as they try to regain their composure. "Ah yeah, sure, right, yes I see ... ermm"
I am also trying to get my head around Cisco DNA-C and Cisco SDA and it's pretty on Powerpoint. I think if one manages to deploy it and all works well, then it's a win for the customer. But when stuff breaks, who is left to debug this stuff? It will be a handful of wizards somewhere, while the rest of us contemplate "reboot/rebuilt/reset" strategies. LOL. Ok. Maybe not - but it would be some knee jerk reaction UNLESS you knew what was going on under the hood.
Speaking of under the hood - people make the analogy of cars and the complexity in modern cars - no average person knows how to fix a car anymore. If something breaks then we see a mechanic - most of the time they don't know either - and they just rip and replace until it works.
01-09-2019 06:20 AM
Thanks Arne. I agree with all your points on TrustSec. "There's a storm coming!!" (What movie?)
I was recently in a Cisco course and when we came across the topic of TrustSec, the instructor paused for a second, turned away from the whiteboard, and said, "Folks, if you REALLY want to make good money in future, TrustSec is the way to go. Master TrustSec today and you will be ahead of the majority."
I think TrustSec is an excellent technology, if implemented correctly. All the small pieces have to work perfectly in unison. This could get a major nightmare for larger deployments. A tiny mis-configuration somewhere could cause massive headaches elsewhere. Phased approach in this case would be your saviour.
01-09-2019 12:06 PM
01-09-2019 12:10 PM
Thanks for unleashing the hidden truths of trustsec.
06-24-2019 10:51 PM
Ive only worked with ISE for 802.1x for a short time. Its such a heavy, fickle, ponderous beast! At its back end, its a full Oracle database server. Ive worked with up to version 2.4. Are the later versions lighter and more robust?
06-24-2019 11:22 PM
Nothing about ISE is light. That's been the case with every release from 1.0 though the current 2.6.
Robust? Well defects are fewer than they used to be so that's a good thing.
Like most software, new releases come with warnings and caveats. Cisco typically doesn't recommend going into production with a release that's not "gold star" status unless you are forewarned and accept the risk of service-affecting bugs. Usually one only does that because a new feature addresses a critical business requirement and the deployment plan is to test thoroughly before go-live.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide