The need for robust access control that scales has never been greater. Rich visibility into who and what are on your network along with the ability to segment end-to-end using a software-defined approach are critical requirements of customers who are seeing an explosion of connected devices as well as a perpetual deluge of network breaches across every industry. Which is why the latest version of Cisco ISE doubles-down on outcomes that realize a secure digital network. It does this through enabling automation, administrative simplification, and net new capabilities.
ISE 2.3 offers DNA Center integration, new policy UI, enhanced posture, guest network login using Facebook credentials, read-only access, many ACS parity features, an Upgrade Readiness Tool and more! For additional details, see the ISE 2.3 Release Notes.
Enabling the Cisco Software-Defined Access architecture
Now you can manage and automate your network - including policy and access - from a single dashboard with Cisco DNA Center. DNA Center is a holistic, end-to-end network management platform for the Network. Intuitive. Integrating ISE allows the DNA Center to define and enact policy to control access across the network, all from a unified interface. Cisco ISE 2.3 is a required integration component for the DNA Center, along with APIC-EM and the Network Data Platform, which all make up the Software-Defined Access solution
Simpler policy creation and management
It is now easier to create and manage policies with the new policy interface. These simplified policy sets are more readable and include all of the authentication and authorization rules, and allow you to easily create and reuse conditions. After upgrading your policies will work as before, though additional policy sets have been created. See the video below for more information. The new policy UI now includes a hit counter for each policy set.
ISE with AnyConnect now provides additional endpoint visibility, including BIOS-level details such as the computer’s serial number, USB attachments, and resource utilization, including disk and memory usage. ISE is now able to perform posture assessment on Windows and Mac OS endpoints without a persistent agent. This new approach replaces the existing web agent and makes use of a temporal agent, which has similar posture checks as the full AnyConnect secure mobility client but without required endpoint administrative privileges or reliance on browser plugins. Cisco continues to offer a wide range of posture agents to assist with different deployments. This includes the option for a stealth agent to display flexible notifications via OS messaging frameworks.
Social login for guest services
Guests will have the choice to log into the network using their Facebook credentials. This can be an option in addition to creating a local ISE account. Social login for guests provides seamless a guest experience that's an easy and fast way to allow guest access to the network.
Read-only admin support
Read-only access allows network administrators to grant others access to review existing configurations, generate reports, and plan accordingly, without the right to make changes.
Final phase of ACS parity
ISE 2.3 includes the final suite of capabilities designed to reach feature parity with Cisco Secure Access Control System (ACS), allowing all existing ACS customers to migrate their deployment to ISE. New features include TACACS+-based device administration for IPv6, import and export capabilities for TACACS+-based command sets, policy export scheduling, IP range support in all octets, and more. See the ACS vs ISE Comparison for feature comparisons with every release of ISE.
Upgrade Readiness Tool (URT)
The Upgrade Readiness Tool (URT) should be run prior to an ISE software upgrade in order to detect and fix any data upgrade issues. Most of the upgrade failures occur because of data upgrade issues and the URT is designed to validate the data before the actual upgrade. The URT will report and try to fix the issues, wherever possible. The URT is a separate download in the Cisco Software Center.
In order to use Citrix, I followed the instruction in the URL: https://answers.uillinois.edu/illinois.engineering/page.php?id=81722. I selected '3_Tunnel All' when connecting the VPN. However, the connection failed, and I can no longer acce...
I recently purchased a Cisco ASA-SSM-AIP-20-K9 AIP Security Advanced Services Module from eBay and installed it into my Cisco ASA5540 firewall. It is shown properly, using the "show inv" command. I just need help in figuring out how to install...
Hi,We have a schedule ASA (HA) 5585-X up-gradation scheduled for next week end. Current ASA version is 9.1(6)10, & we are planing to upgrade to 9.8(4) 10 version.Please let me know, if i can directly upgrade to 9.8(4)10 version from current 9.1(6)10, ...
Hi, I have a problem deploying firepower 2140. I can't deploy FTD via firesight management center and show me an error "Deployment failed due to communication failure with device". when I checked in Device Manager panel, everything seems good. then I anal...