Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
This is my first time posting to the community at-large.. please be gentle.I've been working with ISE 2.3 for about two weeks so my apologies in advance if this is a dumb question. We're performing a bake-off with multiple NAC solutions and one of th...
Thanks Jason, that appears to be the general consensus in most of my other research. With out some endpoint assessment / enforcement agent, there doesn't appear to be a method for detecting NAT'd virtual systems.
Thanks Ahmed,The muti-auth option seems to work well for daisy-chained scenarios (switch->ip phone->pc) and bridged VMs. I think the concern here is the use of unauthorized virtual machines NAT'd behind an authenticated endpoint; using VMware worksta...