Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi Team,We are working on an opportunity of NAC solution and have queries unanswered as below:Control on endpoint by posture scan for USB connected devices e.g. printer or scanners or NAS box. The use case for example is that the customer has a limit...
Hi Team,We are working on an opportunity wherein the customer is using Cisco firewall and switches for endpoint connectivity. But they have a cloud based controller from Aruba with 200 Access points. The customer now is looking for a NAC solution and...
Hi Team,We are working on an opportunity of ISE with PoC currently in progress have some queries for which need clarity: Is there any mechanism we can provide real time alert on connection of unauthorized device on wired / wireless network?The custom...
Hi Team,One of existing customers with ACS 5.7.0.15 has come up with queries as below:Query 1. We use HTTPS for accessing Cisco ACS in our infrastructure which is running on version 5.7.0.15. The certificate which is being used, whether it is self-si...
Hi Team,We have received query from customer who are getting merged into other organizations and wants to implement NAC in the environment as below:Environment: As it is all merger case, not acquisition hence every A, B, C company will use it's produ...
Hi Craig,For the 802.1x authentication customer is expecting for the automation through some script. Although have mentioned that it is not we include as a part of PoC and deployment scope.
Hi Krishnan,Regarding the above query is secure hash also used for the authentication query between networking devices (Router / Switch) and ACS.Awaiting your inputs.Thanks & Regards,Yogesh Madhekar
Thanks Krishnan for the revert. One more query as below: We need to understand that whether the authentication query between networking devices (Router / Switch) and ACS, is also encrypted or not.Yes, the customer has already procured ISE and will b...
Hi Krishnan,Thanks for the reply.Kindly advise on the below:· Although I don’t have a expertise on Trustsec but as I understand the ability to use SGT for identifying and enforcing policies for the employees for different organizations is dep...