Cisco Identity Services Engine (ISE)
Cisco Systems, Inc. | 3.4.0Linux/Unix, Red Hat Enterprise Linux 8 - 64-bit Amazon Machine Image (AMI)
Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Great Out Of The Box
What do you like best about the product?
The product worked as expected without any issues. The systems integrated with minimal impact to our users. Cisco Support was superb and always willing to help with any roadblocks that were found with the product itself. The logging is very clear. Whenever users say they can't authenticate, the reason is immediatly listed in the logging dashboard. The policy configuration can also be done in any way you like. It's easy to structure and has quite a lot of predefined objects/actions.
What do you dislike about the product?
Requires 3rd party implementation initially and also updates tend to introduce other bugs and aren't always as useful as they would seem. Automatic profiling could be improved more. Licensing model--too granular and greedy. MDM integration is a separate cost per user, etc., and is unreasonably expensive.
What problems is the product solving and how is that benefiting you?
Create and manage policies in order to provide network access control on both your wireless and wired network. There are multiple ways to authenticate users, whether you just want MAB-authentication, authentication by username or authentication by certificate. It's very flexible, has predefined elements and there are also valuable guides to be found.
Recommendations to others considering the product:
Make sure you have a good understanding of the amount of users you're willing to authenticate. Perhaps look into cheaper solutions, but it may be hard to find an out of the box experience similar to Cisco ISE.
- Leave a Comment |
- Mark review as helpful
My experience with ISE
What do you like best about the product?
This product is excellent for TACACS and RADIUS authentication as well as profiling various devices on our network.
What do you dislike about the product?
At times the interface can be a bit clunky and resource intensive.
What problems is the product solving and how is that benefiting you?
We currently use ISE for TACACS and RADIUS authentication and authorization. We also use dACL's to enhance our network security.
showing 51 - 52