Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about integrating Cisco ISE 1.2 for BYOD with experts Eric Yu and Todd Pula.
Cisco Bring Your Own Device (BYOD) is an end-to-end architecture that orchestrates the integration of Cisco's mobile and security architectures to various third-party components. The session takes a deep dive into the available tools and methodologies for troubleshooting the Cisco BYOD solution to identify root causes for problems that stem from mobile device manager integration, Microsoft Active Directory and certificate authority services, and Cisco Enterprise Mobility integration to the Cisco Identity Services Engine (ISE).
Todd and Eric recently delivered a technical workshop that helps network designers and network engineers understand integration of the various Cisco BYOD components by taking a deep dive to analyze best practice configurations and time-saving troubleshooting methodologies. The content consisted of common troubleshooting scenarios in which TAC engineers help customers address operational challenges as seen in real Cisco BYOD deployments.
Eric Yu is a technical leader at Cisco responsible for supporting our leading-edge borderless network solutions. He has 10 years of experience in the telecommunications industry designing data and voice networks. Previous to his current role, he worked as a network consulting engineer for Cisco Advance Services, responsible for designing and implementing Cisco Unified Communications for Fortune 500 enterprises. Before joining Cisco, he worked at Verizon Business as an integration engineer responsible for developing a managed services solution for Cisco Unified Communications. Eric holds CCIE certification in routing and switching no. 14590 and has two patents pending related to Cisco's medianet.
Todd Pula is a member of the TAC Security and NMS Technical Leadership team supporting the ISE and intrusion prevention system (IPS) product lines. Todd has 15 years of experience in the networking and information security industries, with 6 years of experience working in Cisco's TAC organization. Previous to his current role, Todd was a TAC team lead providing focused technical support on Cisco's wide array of VPN products. Before joining Cisco, he worked at Stanley Black & Decker as a network engineer responsible for the design, configuration, and support of an expansive global network infrastructure. Todd holds his CCIE in routing and switching no. 19383 and an MS degree in IT from Capella University.
Remember to use the rating system to let Eric and Todd know if you have received an adequate response.
Because of the volume expected during this event, Eric and Todd might not be able to answer every question. Remember that you can continue the conversation in the Security community, subcommunity AAA, Identity and NAC, shortly after the event. This event lasts through November 15, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.
Hello team,Could you advise if we support the following design Node 1: PAN+MNT+PSN, Node 2:PAN+MNT+PSN and Node 3: Health Check node for automatic failover?"Cisco ISE supports manual and automatic failover. With automatic failover, when the Primary PAN go...
Hi all. We're deploying StealthWatch system in our network especially EPC virtual appliance (7.1.1 2019.07.31.1620-0) but seems like it is not receiving flows from the AnyConnect Agent to the collector. Cisco offers some k...
Hi All, We have a HA Failover pair of Firewalls at different Data centers - A link is there in between where they are forming HA. Somehow we have lost management access to those firewalls now. Can someone please advice how we can brea...
Hi,I've read a lot of best practices regarding the upgrade method for ISE and I think the best option is to go with the backup/restore method in my case. We have an appliance environment of 10 ISE nodes in cluster on version 2.1 that we want to...
I have set up a new stack of Catalyst 9300 switches and when I login from the console (using USB port) the remote address seen by ISE in the TACACS logs is 192.168.1.5.Previously console logins show a Remote Access of "async".To be clear I am not talking ...