Asserting Cisco ISE 3.3 – Cisco Blogs


For those who have been at Cisco Reside in Las Vegas earlier this week you certainly noticed that Cisco had numerous new merchandise to announce. One among these new merchandise was the replace to Cisco Id Providers Engine (ISE 3.3).

Each community admin or safety operator has the identical difficulty: you’re making an attempt to reinforce your community’s safety, whereas including visibility and boosting effectivity, all with out sacrificing flexibility. In different phrases, you need extra options with out the issues. Cisco ISE 3.3 has that.

Break up Improve and Multi-Issue Classification provides flexibility

In relation to flexibility, Cisco ISE 3.3’s Break up Improve function will change the way in which you take a look at ISE upgrades. Prospects could be hesitant to replace to the most recent model of Cisco ISE, as a result of it will probably take a very long time for ISE nodes with giant databases to finish the improve. Break up Upgrades is a brand new course of that’s much less complicated, as recordsdata are downloaded earlier than upgrades and prechecks are executed. Break up Improve provides you higher management on which ISE nodes to improve at any given time, with none downtime.

One other function in Cisco ISE 3.3 gives a solution to simply establish clusters of unidentified endpoints discovered on the community. These endpoints are unidentified as a result of oftentimes quite a lot of endpoints hook up with the community that aren’t instantly provisioned by IT. This function makes use of AI/ML Profiling and multi-factor classification (MFC) to shortly establish clusters of similar unknown endpoints by way of a cloud-based ML engine. From there, the units could be reviewed by proposed profiling insurance policies by way of the ML engine and have the units labeled as both MFC {Hardware} Producer, MFC {Hardware} Mannequin, MFC Working System and MFC Endpoint Sort.

By inserting the unidentified gadget into one in every of these 4 buckets, Cisco ISE has taken an enormous chunk of guessing what goes the place out of the equation. From there it’s simpler for the client to find out what the endpoints are and what insurance policies ought to govern them when on the community.

Distinctive to Cisco: Wi-Fi Edge Analytics

A Cisco-only function known as Wi-Fi Edge Analytics will permit community admins to mine information from Apple, Intel and Samsung units to higher enhance profiling. Cisco Catalyst 9800 wi-fi controllers will cross alongside endpoint-specific attributes, equivalent to mannequin, OS model, firmware, amongst others, to ISE by way of RADIUS. From there this info might be used to profile frequent endpoints discovered on the community. Community Admins will now have extra information permitting them to create extra outlined profiles. The extra info that’s on the fingertips of the admin, the extra exact the profile.

Even Extra Flexibility with Managed Utility Restart

To extend effectivity, predictability and scale back downtime, Cisco ISE 3.3 provides Managed Utility Restart. It advantages clients by saving them time and eliminating numerous the complications that include managing ISE admin certificates. Prospects at the moment are given the power to regulate the alternative of the ISE administrative certificates permitting them the power to plan for upkeep as soon as their present certificates expires. Previous to this new function, a certification alternative required an entire reboot of all of the PSNs within the deployment with out the power to know or management the order to the reboot, which might trigger some admins to permit the certification to lapse.

Modifications to certificates require a restart because it impacts systemwide configuration and can’t be executed throughout operational hours because it requires vital downtime. Nonetheless, Cisco ISE 3.3 now gives flexibility for these certifications to be scheduled the restart on the community admins’ comfort; through the nighttime or on weekend when community utilization is low. This eliminates the necessity for that downtime and helps to clean safety updates with out disruption.

Managed Utility Restart is a response to an trade development the place clients are shifting to a short-term certificates as a consequence of added safety. This new function is helpful as the upkeep wanted to replace the certification—which might take upwards of half-hour per certificates—could be scheduled for the nighttime, when community use is low, saving each time and sources.

Improved Insights with pxGrid Direct Visibility

pxGrid Direct Visibility has improved visibility from the final iteration of Cisco ISE (ISE 3.2) and now clients get improved endpoint attributes by way of exterior databases equivalent to Service Now. These attributes can now be proven in Context Visibility. Whether or not the information comes from endpoints, customers, units or which apps are working over the community and its totally different attributes, it gives numerous info such because the gadget sort, gadget proprietor and different issues like whether or not the gadget is operational.

Getting this endpoint information in an simply accessible style permits you to make higher community choices primarily based on info. This information can then be spun to run the community in a extra environment friendly method permitting for a safer community and fewer time spent on translating info.

More durable Safety with the TPM Chip

The brand new TPM Chip (for supported {hardware}) is a response to the necessity for elevated safety. Discovered on the brand new SNS-3700 fashions and in some digital environments (in a type of Digital TPM), the TPM chip is a devoted chip the place delicate info could be saved. Beforehand if Cisco ISE used a password to connect with a database, it was saved within the file system, which is much less safe. However now with the data housed on the bodily TPM Chip, and with the power to create true random numbers for key technology, it has confirmed to be harder to entry thus offering a safer place for info to be saved.

With the variety of new options and performance that involves you with the most recent Cisco ISE 3.3 replace, your community’s safety be enhanced, and you’ll discover a rise in effectivity and visibility.

Watch the Cisco ISE site for extra particulars on availability: site/us/en/merchandise/safety/identity-services-engine/index.html