Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about how to deploy and configure Cisco Identity Services Engine (ISE) Version 1.2 and to understand the features and enhanced troubleshooting options available in this version, with Cisco expert Craig Hyps.
October 27, 2014 through November 7, 2014.
The Cisco Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and secure the evolving network across the entire attack continuum. Cisco ISE is a security policy management platform that identifies users and devices using RADIUS, 802.1X, MAB, and Web Authentication methods and automates secure access controls such as ACLs, VLAN assignment, and Security Group Tags (SGTs) to enforce role-based access to networks and network resources. Cisco ISE delivers superior user and device visibility through profiling, posture and mobile device management (MDM) compliance validation, and it shares vital contextual data with integrated ecosystem partner solutions using Cisco Platform Exchange Grid (pxGrid) technology to accelerate the identification, mitigation, and remediation of threats.
Craig Hyps is a senior Technical Marketing Engineer for Cisco's Security Business Group with over 25 years networking and security experience. Craig is defining Cisco's next generation Identity Services Engine, ISE, and concurrently serves as the Product Owner for ISE Performance and Scale focused on the requirements of the largest ISE deployments.
Previously Craig has held senior positions as a customer Consulting Engineer, Systems Engineer and product trainer. He joined Cisco in 1997 and has extensive experience with Cisco's security portfolio. Craig holds a Bachelor's degree from Dartmouth College and certifications that include CISSP, CCSP, and CCSI.
Remember to use the rating system to let Craig know if you have received an adequate response.
Because of the volume expected during this event, Ali might not be able to answer each question. Remember that you can continue the conversation on the Security community, sub-community shortly after the event. This event lasts through November 7, 2014. Visit this forum often to view responses to your questions and the questions of other community members.
Hi All, I have a question during my project for ASA High AvailabilityHere's the topology : The Failover already working, but one point was not working .So if we remove cable from ISP 1 (orange cable / A), the traffic didn't go through ISP 2.&nbs...
I am keen to watch some of the ISE Webinar Recordings but I can't seem to access them. I am registered and logged in, but I cannot figure out whether I am locked out, or whether these sessions were not recorded - it's contradictory.
Hi I'm thinking a ise deployment and I want use a "2-node deployment (redundant)" with a "node A" and "node B", and use a "node C" as standalone node for syslog or loggin. Can use this deployment? Regards.
Duplicate header name; X-Agari-Policy-Matched: Compromised_SendersX-Agari-Policy-Matched: Untrusted MessagesX-Agari-Trust-Score: 1.0 I have a content filter that writes the header to the log; Condition: No conditionAction: log-entry("C...