Cisco Cisco Identity Services Engine 1.3 릴리즈 노트
15
Release Notes for Cisco Identity Services Engine, Release 1.3
New Features in Cisco ISE, Release 1.3
•
Specify a number to limit the number of times a guest can simultaneously login into the network. In
1.2, it was either 1 or unlimited.
1.2, it was either 1 or unlimited.
•
Specify the maximum number of times guests can fail to log in successfully and the amount of time
after which guests can try to log in once again after their last failed attempt. In 1.2, if guests
exceeded the maximum number of failed login attempts, their accounts were suspended and had to
be reinstated by the sponsor.
after which guests can try to log in once again after their last failed attempt. In 1.2, if guests
exceeded the maximum number of failed login attempts, their accounts were suspended and had to
be reinstated by the sponsor.
•
Specify where guests must be redirected after they successfully log in, either to the original URL or
a landing page (a static URL).
a landing page (a static URL).
•
Assign locations for guest types that automatically maps time zones.
•
Optional BYOD Bypass for employees who want to use guest access instead.
Sponsor Portals
•
Sponsors can:
•
Provide guests logging into their company network with its SSID information
•
Use sponsor group tags to set up optional grouping for searching and reporting
Non-Guest Portals
•
Per portal “Simplified URL” or Fully Qualified Domain Names (FQDNs) can be specified for
Sponsor and My Devices portals.
Sponsor and My Devices portals.
•
Multiple My Devices portals with different default endpoint identity groups can be set up, so that
registered devices can be assigned to different endpoint identity groups.
registered devices can be assigned to different endpoint identity groups.
•
In the My Devices portals, users can enter the MAC address for Device IDs in the formats shown in
the following examples:
the following examples:
–
00-11-22-33-44-55
–
0011.2233.4455
–
00:11:22:33:44:55
–
001122-334455
–
001122334455
•
Any Connect 4.0 that works with ISE 1.3 has a posture subsystem
Internal Certificate Authority
The ISE Internal Certificate Authority (CA) simplifies certificate provisioning and deployment for
BYOD and MDM endpoints. The Internal CA capability eliminates the previous complexity required to
integrate with an external PKI certificate authority infrastructure.
BYOD and MDM endpoints. The Internal CA capability eliminates the previous complexity required to
integrate with an external PKI certificate authority infrastructure.
ISE can be deployed as a self-contained CA or can be integrated into an existing enterprise certificate
authority environment if still required.
authority environment if still required.
Cisco ISE provides an OCSP responder to check for the validity of the certificates.
You can navigate to Administration > Certificates to view the details.