I am trying to setup profiling for Apple devices, specifically iPad devices and am seeing where ISE will identitfy an iPad 1 device fine, but will not identity an iPad 2 nor an iPad 3, both list as unknown. It also shows an iPhone as Apple-Device and thats has far as it gets.
The Profiling Policies are all set to Create Matching identity Group and I havent messed with any of the Profiling rules. As anyone seen this before?
If you are not setting up spanning from the vpn users vlan then you will have to redirect the vpn client to the ISE portal in order to have the ISE system get the user agent string of the ipad, once profiling information is update, then a COA request will be initiated to the inline posture node, and then the client will hit the approprate policy.
With ISE Release 1.2*, Cisco is delivering, a unique feed service that provides new and updated profiles for various IP enabled devices when vendors release new devices. So ISE customers will be able to recognize new devices, in addition to a multitude of other network attached devices such as printers, video cameras, and specialized mobile computing devices.
Cisco works with various vendors, partners, customers, etc. to profile the multitude of IP enabled devices that are expected to be deployed in various customer environments and create profiles for these. These profiles are made available through the Cisco Feed Service. An ISE server* that is configured to connect to the Feed Service establishes a secure connection with cloud based Feed Service. The various profiles on the Feed Service are then automatically downloaded to the ISE server, thus providing ISE customers the ability to stay abreast and detect various IP enabled devices that connect to their network. The Feed Service will be available with the release of ISE 1.2* software release and is part of the Advanced License.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :