11-12-2018 01:24 PM
I have been reviewing the pro's and con's of each type of implementation of ISE, whether it is monitoring, low-impact, or a closed enforcement mode. So outside of the usual "It depends on your requirements", one consideration that management usually asks is "What are other organizations in our industry doing?" This is one piece of the puzzle that I can't find much information about, even just anecdotal.
So my question for those of you who have experience implementing ISE in multiple customer engagements, is how would you say the landscape looks in the last couple years? Once monitoring mode is up and running, how many organizations actually go low-impact or closed mode? How many implement posturing as well? I know each industry has their own threat models and compliance requirements but I would like to be able to at least ballpark estimate for example that say 10% of customers are in full closed mode with posturing, 50% low impact, and the rest stayed in monitoring phase.
Solved! Go to Solution.
01-09-2019 03:12 AM
Hey @packetplumber9 - good questinon - have a look at a similar Forum question posted today.
01-15-2019 05:23 AM
We have been deploying ISE since 1.0 and we don't every use Low Impact mode (preauth ACLs) on the interfaces. We don't like dealing with ACL removal in the event ISE down. We talk to customers about:
#1 has sort of become a moot point if you use CPL with simultaneous MAB and Dot1x. There is no longer a 20-30 second delay as MAB happens at the same time as Dot1x. I know Cisco is now saying this is not supported, but their original CPL documents still on CCO list this as a major benefit and we have many customers doing this.
It used to be we always went to closed mode, but in the past couple years I have had more customers accept the 20-30 seconds of open network access (with legacy template) and stay in open mode with no preauth ACL. This would be a similar model to ForeScout where their main method is to detect then restrict.
01-09-2019 03:12 AM
Hey @packetplumber9 - good questinon - have a look at a similar Forum question posted today.
01-11-2019 04:00 PM
@Arne Bier nice i have asked our PMs @yshchory @hariholla to take a look as well
01-09-2019 12:50 PM
i have asked our SMEs if they have anything like this. Maybe a gartner report.
01-14-2019 10:52 AM
01-15-2019 05:23 AM
We have been deploying ISE since 1.0 and we don't every use Low Impact mode (preauth ACLs) on the interfaces. We don't like dealing with ACL removal in the event ISE down. We talk to customers about:
#1 has sort of become a moot point if you use CPL with simultaneous MAB and Dot1x. There is no longer a 20-30 second delay as MAB happens at the same time as Dot1x. I know Cisco is now saying this is not supported, but their original CPL documents still on CCO list this as a major benefit and we have many customers doing this.
It used to be we always went to closed mode, but in the past couple years I have had more customers accept the 20-30 seconds of open network access (with legacy template) and stay in open mode with no preauth ACL. This would be a similar model to ForeScout where their main method is to detect then restrict.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide