Cisco Identity Services Engine - go to solution for network security
Use Cases and Deployment Scope
Cisco Identity Services Engine is an integral part of securing wireless and wired networks. I use Cisco Identity Services Engine primarily as a partner/consultant to secure K12 and SLED customers. These customers almost always have a universal need to tighten security for their corporate devices to verify that no one unauthorized can connect. The guest redirection feature is really useful and easy to setup, especially if the wireless environement is already a 9800 or meraki WLC. The beauty of Cisco Identity Services Engine is it really is a Swiss Army knife. Depending on the business need, you select the use case and work center and follow the flow of configuration. It may seem intimidating at first but there is really good documentation and community resources for all types of scenarios and networks. Cisco Identity Services Engine can be rolled out in phases depending on the comfort level of the implementation team, making it a lot more flexible than something like a firewall that requires tearing out the old and putting a new device in. Overall, I think Cisco Identity Services Engine is a flagship NAC solution and is a no brainer as the next step in securing any wireless and wired network.
Pros
- Wired and wireless 802.1x
- Guest portals and easy redirection mechanism
- Flexible ways to build matching policies for all different types of traffic
Cons
- Trustsec needs more documentation and configuration best practice examples
- The licensing model can be difficult to explain and understand for customers
- Difficult to get an accurate benchmark to know exactly how many Cisco Identity Services Engine nodes and the size of the deployment should be
Return on Investment
- Secured access for student and staff devices
- Provided a reliable means of guest redirection
- Way to implement least privilege with authorization policies that are appropriate for the user accessing the resource




