Cisco Cisco Identity Services Engine 1.3 릴리즈 노트

다운로드
페이지 80
 
15
Release Notes for Cisco Identity Services Engine, Release 1.3
 
  New Features in Cisco ISE, Release 1.3
Specify a number to limit the number of times a guest can simultaneously login into the network. In 
1.2, it was either 1 or unlimited.
Specify the maximum number of times guests can fail to log in successfully and the amount of time 
after which guests can try to log in once again after their last failed attempt. In 1.2, if guests 
exceeded the maximum number of failed login attempts, their accounts were suspended and had to 
be reinstated by the sponsor. 
Specify where guests must be redirected after they successfully log in, either to the original URL or 
a landing page (a static URL).
Assign locations for guest types that automatically maps time zones.
Optional BYOD Bypass for employees who want to use guest access instead.
Sponsor Portals 
Sponsors can: 
Provide guests logging into their company network with its SSID information
Use sponsor group tags to set up optional grouping for searching and reporting 
Non-Guest Portals 
Per portal “Simplified URL” or Fully Qualified Domain Names (FQDNs) can be specified for 
Sponsor and My Devices portals.
Multiple My Devices portals with different default endpoint identity groups can be set up, so that 
registered devices can be assigned to different endpoint identity groups. 
In the My Devices portals, users can enter the MAC address for Device IDs in the formats shown in 
the following examples:
00-11-22-33-44-55
0011.2233.4455
00:11:22:33:44:55
001122-334455
001122334455
Any Connect 4.0 that works with ISE 1.3 has a posture subsystem
Internal Certificate Authority
The ISE Internal Certificate Authority (CA) simplifies certificate provisioning and deployment for 
BYOD and MDM endpoints. The Internal CA capability eliminates the previous complexity required to 
integrate with an external PKI certificate authority infrastructure.
ISE can be deployed as a self-contained CA or can be integrated into an existing enterprise certificate 
authority environment if still required. 
Cisco ISE provides an OCSP responder to check for the validity of the certificates. 
You can navigate to Administration > Certificates to view the details.