

Each guide is this series comes with a subway-style You Are Here map to help you identify the stage the document addresses and pinpoint where you are in the TrustSec deployment process (Figure 2). You can use these documents to follow the prescribed path to deploy the entire system, or simply pick the single use-case that meets your specific need. The documents in the series build on one another and guide the reader through a successful implementation of the TrustSec system. Figure 1: TrustSec Architecture Overview Wireless user Ingress Enforcement RADIUS Guest Services Posture Profiler SXP Wired user MACsec Campus Network Security Group Tag Security Group Tag Ingress Enforcement Data Center About the TrustSec How-To Guides Egress Enforcement The TrustSec team is producing this series of How-To documents to describe best practices for TrustSec deployments. In addition to combining standards-based identity and enforcement models, such as IEEE 802.1X and VLAN control, the TrustSec system it also includes advanced identity and enforcement capabilities such as flexible authentication, Downloadable Access Control Lists (dacls), Security Group Tagging (SGT), device profiling, posture assessments, and more.

The solution and all the components within the solution are thoroughly vetted and rigorously tested as an integrated system. TrustSec builds on your existing identity-aware access layer infrastructure (switches, wireless controllers, and so on). TrustSec mitigates security risks by providing comprehensive visibility into who and what is connecting across the entire network infrastructure, and exceptional control over what and where they can go. 9 Configuring ISE Configuring ISE.10 Defining Authentication Policies and Authorization Profiles Authentication Policies Defining the Authentication Policies.14 Define the Authorization Profiles.16 Defining Authorization Condition Rules and Authorization Policies.19 Creating Authorization Policies.21 NAM Installation and Configuration NAM Installation and Configuration.23 Testing Procedure TESTING PROCEDURE.33 Detailed View of EAP Chaining Detailed View of EAP Chaining.38 Macintosh, iphone, Android, ipad Devices Frequently Asked Questions Appendix A: References Cisco TrustSec System: Device Configuration Guides: HowTo-80-EAPChaining_Deployment 2ģ Introduction What Is the Cisco TrustSec System? Cisco TrustSec, a core component of the Cisco SecureX Architecture, is an intelligent access control solution. 3 What does it mean to be TrustSec Certified?. 1 TrustSec How-To Guide: Deploying EAP Chaining with An圜onnect NAM and Cisco ISE For Comments, please Current Document Version: 3.0 August 27, 2012Ģ Table of Contents Table of Contents.
