This isn't really certification-specific so I thought I'd drop it in here. I have been put into an interesting position at work. We were supposed to deploy ISE last year but that got held up when he hit a bug code in the XE IOS that caused some issues with dACLs that would eventually freeze the switches and make us hard reload them daily. Since the bug fix wasn't out, we ended up rolling back ISE for the rest of the year except on wireless.
It's a little less than a year later and the architect that was in charge of ISE is gone. I've been now tasked with designing ISE to fit the needs of my enterprise, creating a project plan for implementation, and implementing it in a phased approach using our corporate office as the pilot site (starting slowly) and then rolling it out to out branch offices throughout the US.
It's been really interesting studying and working with ISE. As I research it, I'm finding that despite the growing demand for ISE, there is a general lack of training and experts on it in the field. I think 90% of networking people have no idea what ISE is so I figured I'd jump on here and explain some things, provide some solid training resources, and give some ideas for labbing for anyone who is interested. Maybe if there is interest, I'll also update this thread on general things I'm experiencing as I'm deploying it and some tips on implementation
.
What is ISE?
Well... if you read the Cisco definition, it's "a security policy management and control platform" which is pretty damn generic sounding. In truth, its does lot. From profiling, posturing, AAA services, etc.It's fairly new technology that was first introduced in 2010 I believe and it was sort of the child of a similar but less robust Cisco product. It allows you to enforce policies and dynamically adjust access on wireless, wired, and VPN based on many different policies. For example, you can push out certificates via GPO and create a policy in ISE where if someone plugs into a wired connection and their computer does not have the certificate, they will be given internet-only access or you can deny them access altogether. You can also use it for your ACS functions. Unfortunately with ISE, Cisco used RADIUS instead of TACACS because they went for standardization. The licensing in ISE functions more as user licenses instead of device licensing so you can manage 10000 switches using RADIUS and the only licenses you use is when an admin logs into the switch. Since the licenses are reused, the license is re-added once the admin logs out of the switch. You can also have ISE posture clients based on system requirements and security. You can have ISE dynamically switch the VLAN of a port depending on the kind of device plugged in. For example, ISE can identify that you just plugged a Telepresence unit into port Fa1/0/1 and based on the policies you defined, it will dynamically switch the VLAN to the Telepresence VLAN. You can also define different security policies per site.
I'm sort of glossing over concepts but you get the general idea. There are plenty of regulated industries that will have a use for ISE such as financial, medical, etc. If you want to read more into the features of ISE, check out Cisco's page:
Cisco Identity Services Engine (ISE) - Cisco Systems
Are there any ISE-specific certifications?
Not that I've seen but if someone finds something, please correct me. I know that it's been added to the CCIE Security track so if you're heading that route, it might be good to jump onboard with studying for ISE.
What are some good training resources for ISE?
Last year when I first was introduced to ISE, there wasn't much besides the Cisco manual for the product which wasn't that exciting of a read. Thankfully, a bit has changed since them. I would highly recommend the following book by James Heary:
Cisco ISE for BYOD and Secure Unified Access: Jamey Heary, Aaron Woland: 9781587143250: Amazon.com: Books
I've been reading through it and it's great. Not only does it provide technical details but it gives you a good overview of the business case for ISE and planning and deployment ideas.
Lab Minutes has some amazing free videos on ISE. I highly recommend them. Not only does the trainer seem to have a solid understanding of ISE but he really goes into it in his videos. Here's the link:
Video: Security - ISE | Lab Minutes
There is an INE ISE Primer but in my opinion, it was bad. The trainer really kept getting stuck on technical parts of ISE and he didn't really seem like he knew what he was doing. It's only about 5 hours long but it definitely wasn't as good as Lab Minutes which is free.
There is also a Cisco Partner ISE training. I'm heading to that at the end of the month so I'll write a review on it if anyone is interested or works at a company that will pay for it. If you do consider Cisco training, I recommend going to the 1.2 SISE class. The 1.1 version is still around but 1.2 is probably more applicable anyways for new deployments and just general training.
How do I try out ISE or lab it?
That's the fun part. You have to get your hands on an ISE iso. I downloaded easily enough with my CCO but I don't know if everyone has access to it or not. I would reach out to your Cisco rep if your company has one and explain that your company is interested in ISE and would like an ISO to lab it. Usually they're more than willing to help you out if you're considering purchasing a product.
ISE is pretty resource intensive so you need to have a pretty powerful machine to run it on. It needs at least a dual-core x64 processor, 4GBs of RAM, and 100GB of HD space. It also should run on VMWare. I've tried it in Virtual box or with less than the recommended specs and it refused to install. To get a really good lab going, you need to run two ISE VMs (One for the Admin/Monitoring node and one for the Policy Services node). You also need an NTP server available at the time of installation - there will be lots of issues if ISE cannot reach an NTP server and to fix those issues, you might need to completely reinstall ISE. You can work a little magic with regedit to modify Server 2008 for NTP or you can just aim ISE to a switch that's attached to the computer. I would also recommend installing a Windows 7 VM and Window Server 2008 Active Directory/DNS/CA VM.
So with four VMs going for a good sized lab, you'll need about 24GB RAM to give your computer a little buffer and about 400GB HD space. Right now I have all the VMs running on my computer and it's clocking along at 16GB RAM utilization at any given time but the PC is still running great.
I recommend connecting a physical switch that is ISE compatible to the computer. I have a 3750 running 15.X code connected to the NIC on my PC. That way I can start enforcing polices using the switch.
After everything was installed, I bridged my Win 7 VM with my WiFi card in the PC, installed log me in on both the VM and my PC, configured my PC to never turn off, and WALLAH! I now have a Cisco ISE sandbox that I can access remotely.
Anyways, I hope this was useful for some of you. If any of you are interested in ISE, I'll keep this thread going with my tales of woe and triumph as I roll this thing out to an international enterprise in the next couple of months. Maybe I'll even open up my sandbox to some people who are interested or share some times. Let me know.