Beruflich Dokumente
Kultur Dokumente
Product Overview
The Cisco Identity Services Engine is a next-generation identity and access control policy platform that enables
enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. Its unique
architecture allows enterprises to gather real-time contextual information from networks, users, and devices to
make proactive governance decisions by enforcing policy across the network infrastructure - wired, wireless and
remote. The Cisco Identity Services Engine is an integral component of the Cisco TrustSec solution and
SecureX architecture.
The Cisco Identity Services Engine provides a highly powerful and flexible policy-based access control solution
that combines multiple services, namely authentication, authorization, and accounting (AAA); posture; profiling;
and guest management on a common platform. This greatly reduces complexity and provides consistency across
the enterprise. Using the Cisco Identity Services Engine, administrators can centrally create and manage access
control policies for users and endpoints in a consistent fashion and gain end-to-end visibility into everything that is
connected to the network.
Features
The Cisco Identity Services Engine:
Allows enterprises to authenticate and authorize users and endpoints via wired, wireless, and VPN with
consistent policy throughout the enterprise
Provides complete guest lifecycle management by empowering sponsors to on-board guests, thus
reducing IT workload
Delivers customizable portals as well as ability to host web pages to ease on-boarding and overall enduser
experience inside business defined worksflows
Offers comprehensive visibility of the network by automatically discovering, classifying and controlling of
endpoints connecting the network to enable the appropriate services per endpoint
2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 5
Addresses vulnerabilities on user machines through periodic evaluation and remediation to help proactively
mitigate network threats such as viruses, worms, and spyware
Enforces security policies by blocking, isolating, and repairing noncompliant machines in a quarantine area
without requiring administrator attention
Offers a built-in monitoring, reporting, and troubleshooting console to assist help-desk operators and
administrators streamline operations
Allows you to get finer granularity while identifying devices on your network with Active Endpoint Scanning.
Augments network-based profiling by targeting specific endpoints (based on policy) for specific attribute
device scans, resulting in better accuracy and comprehensive visibility of what is on your network
Manages endpoint access to the network with Endpoint Protection Service. With EPS, an admin can
specify an endpoint and select an action such as move to a new VAN or return to the original VAN, or
isolate the endpoint from the network entirely - all in a simple interface
The Cisco Identity Services provides several additional key features, described in Table 1.
Table 1.
Feature
Details
AAA protocols
Utilizes standard RADIUS protocol for authentication, authorization, and accounting (AAA).
Authentication protocols
Supports a wide range of authentication protocols, including PAP, MS-CHAP, Extensible Authentication Protocol
(EAP)-MD5, Protected EAP (PEAP), EAP-Flexible Authentication via Secure Tunneling (FAST), and
EAP-Transport Layer Security (TLS).
Policy model
Offers a rules-based, attribute-driven policy model for creating flexible and business-relevant access control
policies. Provides the ability to create fine-grained policies by pulling attributes from predefined dictionaries that
include information about user and endpoint identity, posture validation, authentication protocols, profiling identity,
or other external attribute sources. Attributes can also be created dynamically and saved for later use.
Access control
Provides a wide range of access control mechanisms, including downloadable access control lists (dACLs),
VLAN assignments, URL redirect, and SGA tagging leveraging the advanced capabilities of Cisco network
devices.
Profiling
Ships with predefined device templates for a wide range of endpoints such as IP phones, printers, IP cameras,
smartphones, and tablets. Administrators can also create their own device templates. These templates can be
used to automatically detect, classify, and associate administrative-defined identities when endpoints connect to
the network. Administrators can also associate endpoint-specific authorization policies based on device type.
The Cisco Identity Services Engine collects endpoint attribute data via passive network telemetry, querying the
actual endpoints, or alternatively from the Cisco Infrastructure via Device Sensors on the catalyst switches.
The infrastructure-driven endpoint sensing technology on Cisco Catalyst switches are a subset of ISE sensing
technology. This allows the switch to quickly collect endpoint attribute information on the switch and then pass
this information using standard RADIUS to the Identity Services Engine for endpoint classification and
policy-based enforcement. This switch-based sensing technology allows for the efficient distribution of endpoint
information for increased scalability, deployability and time to classification.
Guest lifecycle management
Enables full guest lifecycle management whereby guest users can access the network for a limited time, either
through administrator sponsorship or by self-signing via a guest portal. Allows administrators to customize portals
and policies based on specific needs of the enterprise.
Posture
Verifies endpoint posture assessment for all types of users connecting to the network. Works via either a
persistent client-based agent or a temporal web agent to validate that an endpoint is conforming to the companys
posture policies. Provides the ability to create powerful policies that include checks for the latest OS patches,
antivirus/antispyware software packages with current definition file variables (version, date, etc.), registries (key,
value, etc), and applications. The Identity Services Engine also supports auto-remediation of the client as well as
periodic reassessment to make sure the endpoint is not in violation of company policies.
Allows administrators to quickly take corrective action (Quarantine, Un-Quarantine, or Shutdown) on riskcompromised endpoints within the network. This helps to reduce risk and increase security in the network.
Centralized management
Enables administrators to centrally configure and manage profiler, posture, guest, authentication, and
authorization services in a single web-based GUI console, greatly simplifying administration by providing
consistency in managing all these services.
Monitoring and
troubleshooting
Includes a built-in web console for monitoring, reporting, and troubleshooting to assist help-desk and network
operators to quickly identify and resolve issues. Offers comprehensive historical and real-time reporting for all
services, logging of all activities, and real-time dashboard metrics of all users and endpoints connecting to the
network.
2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 2 of 5
Feature
Details
Platform options
Available as a physical or virtual appliance. There are three physical appliance models as well as a VMware ESXor ESXi-based appliance.
Benefits
The Cisco Identity Services Engine:
Allows enterprises to roll out highly customized and sophisticated business access policies in a consistent
fashion
Reduces operational costs by providing full visibility into, historical reporting of, and enhanced
troubleshooting tools for network access
Reduces network outages and downtime by ensuring that only compliant users get full access to the
network and non-compliant users are isolated to limited areas of the network
Allows enterprises to be in compliance with regulatory mandates by ensuring that required controls can be
enforced and audited
Product Specifications
There are three hardware options for the Cisco Identity Services Engine (see Table 2).
Table 2.
Processor
Memory
4 GB
4 GB
4 GB
Hard disk
RAID
No
Yes (RAID 0)
Removable media
CD/DVD-ROM drive
CD/DVD-ROM drive
CD/DVD-ROM drive
Ethernet NICs
10/100/1000BASE-TX cable
support
None
Cavium CN1620-400-NHB-G
Cavium CN1620-400-NHB-G
Serial ports
Video ports
None
None
None
Form factor
Rack-mount 1 RU
Rack-mount 1 RU
Rack-mount 1 RU
Weight
Dimensions
Power supply
350W
Cooling fans
9; redundant
9; redundant
Network Connectivity
Interfaces
System Unit
2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 3 of 5
BTU rating
Compliance
FIPS
Cisco Identity Services Engine virtual appliances are supported on VMware ESX/ESXi 4.x and should be run on
hardware that equals or exceeds the characteristics of the physical appliances listed in Table 2. At minimum,
Cisco Identity Services Engines require the virtual target to have allocated at least 4 GB of memory and at least
200 GB of hard drive space. The virtual appliance is also FIPS 140-2 Level 1 compliant.
System Requirements
The set of system requirements for the Cisco NAC Agent, used for posture assessment, are shown in Table 3.
Table 3.
Feature
Minimum Requirement
Supported OS
Microsoft Windows Vista Business, Windows Vista Ultimate, Windows Vista Enterprise, Windows Vista
Home, Windows 7, Windows XP Professional, Windows XP Home, Windows XP Media Center Edition,
Windows XP Tablet PC, Windows 2000, Windows 98, Windows SE, and Windows ME; Mac OS X (v10.5.x,
v10.6.x)
Hardware
License Specifications
A Cisco Identity Services Engine deployment requires a license to activate different services. There are three
types of Identity Services Engine licenses:
ISE BASE License. Used to activate basic services, such as authentication, authorization, guest,
monitoring, and troubleshooting services.
ISE ADVANCED License. Used to activate advanced services, such as posture, profiling, SGA and EPS.
Please note that the BASE license is a prerequisite for installing the ADVANCED license.
ISE WIRELESS License. Activates all Identity Services Engine services, but only for wireless endpoints.
ADVANCED License
WIRELESS License
*
Guest services
*
*
*
Posture assessment
Profile
X*
SGA
*
*
2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 4 of 5
Printed in USA
2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
C78-656174-02
02/12
Page 5 of 5