In this video, we’ll be going over how appliance administration is different in Stealthwatch 7.0 and the new apps feature in Stealthwatch.
Installing Stealthwatch 7.0
ISE 2.6 Policy Sets & Using Network Device Groups
Tetration - Forensics and Alerts
Tetration - Policy Analysis
Tetration - Dynamic Policies and Vulnerability Detection
Tetration - More Application Mapping and Policy Creation
We previously went into application mapping in this blog post and we will delve into it further in this post to explain how that application mapping is used to create whitelists that can be used for micro-segmentation.
Vendor Specific RADIUS Dictionaries for ISE
I took some time to import and update quite a bit of RADIUS vendor dictionaries for 3rd party vendors into ISE. I grabbed this information from various community and open source sites but I obviously can't test it against every vendor out there since I don't have a selection of 140+ 3rd party NADs sitting in my lab. After I imported them to ISE, I exported them and have uploaded them here.
Tetration - Host Profile
Tetration - Application Mapping
Introduction to Tetration
Before I begin, I’d just like to thank my friend JP Cedeno for giving me a crash course into Tetration and allowing me to use what he taught me to make the next few blog posts. I’d also like to dedicate this blog post to Matt White who asked for it some months ago. In this blog post, we’re going to go over the fundamentals of Tetration.
The Cost of my CCIE Security - Time & Money in Review
ISE WLC ACL Configs Through the CLI
ISE C3PL Switch Configuration
In this blog post, I'm going to go over a different way to configure your switch for ISE called Cisco Common Classification Policy Language (C3PL). I have known about this configuration for awhile but I will admit that I didn't really try to learn it until recent. If you read the IBNS 2.0 deployment guide here, it's pretty intimidating guide at a whopping 65 pages long and reads like a typical manual. I ended up reading Jamey Heary and Aaron Woland's Cisco ISE for BYOD Second Edition and they broke it down beautifully in 4 pages which made me go "Team C3PL."
ISE Design - Going Above The Configuration
ISE 2.3 - What's New?
ISE 2.3 - New Policy Sets
In this blog post, I'm going to go over the new policy sets in ISE 2.3. A lot of people have come to me and said they were worried about having to learn the new policy sets. Well, I have good news for you: While there are some enhancements, it's not really as initimating or new as you think. Are there enhancements? Sure! But it doesn't mean you have to re-learn the whole thing if you don't want to.
ISE 2.3 - Passive ID & EasyConnect Enhancements
In this post, I'm going to review the PassiveID features of ISE that are new as of ISE 2.2 and 2.3. In this particular post, I'll be doing it all from ISE 2.3 but bear in mind that you can do all this from ISE 2.3 as well. In ISE 2.0, there was a feature added called EasyConnect which utilized WMI logs from the Active Directory Domain Controller to check for login events. Based on those login events, ISE would make a decision to grant access. This allowed ISE to grant network access beyond the typical 802.1x and profiling methods. This functioned well but required a LOT of backend work to prepare Active Directory to share the WMI logs and if you read my earlier post here, you will see what I mean The creators of ISE decided to revamp this process and create a better way to do this in ISE 2.2 and later.
Khawar Butt's CCIE Training Review
It's been awhile since I've written on my blog and I wanted to update you all with a review of some of the training material I'm going through. A few months ago, I saw an ad for a trainer called Khawar Butt who was selling an "All Access Pass" for his CCIE training. This post is going to be about my decision to give it a try and my experience with his courses.