A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and. Supported Network Access Devices Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior (similar to Cisco IOS 12.x) for standards-based authentication. For a list of supported authentication methods, see the “Manage Authentication Policies” chapter of the. Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality, and are therefore not supported with non-Cisco devices. In addition, certain other advanced functions like central web authentication (CWA), Change of Authorization (CoA), Security Group Access (SGA), and downloadable access control lists (ACLs), are only supported on Cisco devices. For a full list of supported Cisco devices, see the following tables. For information on enabling specific functions of Cisco ISE on network switches, see the “Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions” chapter in. For information about third-party NAD profiles, see the. For Wireless LAN Controllers, note the following: • MAB supports MAC filtering with RADIUS lookup. • Support for session ID and COA with MAC filtering provides MAB-like functionality. ![]() • DNS based ACL feature will be supported in WLC 8.0. Not all Access Points support DNS based ACL. Refer to Cisco Access Points Release Notes for more details. The following tables list the support for the devices as follows: • √ — Fully supported • X — Not supported •! — Limited support, some functionalities are not supported The following are the functionalities supported by each feature. Cisco Wireless LAN Controllers Refer to the for a complete list of supported operating systems. WLC 2100 AireOS 7.0.252.0! X X X X AireOS 7.0.116.0 (minimum)! X X X X WLC 4400 AireOS 7.0.252.0! X X X X AireOS 7.0.116.0 (minimum)! X X X X WLC 2500 AireOS 8.0.140.0 √ √ √ √ X √ √ X AireOS 8.2.121.0 √ √ √ √ X √ √ √ AireOS 8.3.102.0 √ √ √ √ X √ √ √ AireOS 8.4.100.0 √ √ √ √ √ √ √ √ AireOS 7.2.103.0 (minimum)! √ √ √ X √ √ X WLC 5508 AireOS 8.0.140.0 √ √ √ √ X √ √ X AireOS 8.2.121.0 √ √ √ √ X √ √ √ AireOS 8.3.102.0 √ √ √ √ X √ √ √ AireOS 8.4.100.0 √ √ √ √ √ √ √ √ AireOS 7.0.116.0 (minimum)! X X X √ WLC 5520 AireOS 8.0.140.0 √ √ √ √ X √ √ X AireOS 8.2.121.0 √ √ √ √ X √ √ √ AireOS 8.3.102.0 √ √ √ √ X √ √ √ AireOS 8.4.100.0 √ √ √ √ √ √ √ √ AireOS 8.1.122.0 (minimum) √ √ √ √ X √ √ √ WLC 7500 AireOS 8.0.140.0 √ √ √ √ X √ √ X AireOS 8.2.121.0 √ √ √ √ X √ √ √ AireOS 8.3.102.0 √ √ √ √ X √ √ √ AireOS 8.4.100.0 √ √ √ √ √ √ √ √ AireOS 7.2.103.0 (minimum)! √ X X X X X X WLC 8510 AireOS 8.0.135.0 √ √ √ √ X √ √ X AireOS 7.4.121.0 (minimum) √ √ X X X X √ X WLC 8540 AireOS 8.1.131.0 √ √ √ √ X √ √ X AireOS 8.1.122.0 (minimum) √ √ √ √ X √ √ X vWLC AireOS 8.0.135.0 √ √ √ √ X √ √ X AireOS 7.4.121.0 (minimum) √ √ √ √ X √ √ X WiSM1 6500 AireOS 7.0.252.0! X X X X AireOS 7.0.116.0 (minimum)! X X X X WiSM2 6500 AireOS 8.0.135.0 √ √ √ √ X √ √ √ AireOS 7.2.103.0 (minimum)! √ √ √ X √ √ √ WLC 5760 IOS XE 3.6.4 √ √ √ √ √ √ √ √ IOS XE 3.3 (minimum) √ √ √ √ X √ √ √ WLC for ISR (ISR2 ISM, SRE700, and SRE900) AireOS 7.0.116.0! X X X X AireOS 7.0.116.0 (minimum)! Download Ecdsa Public Key Patch Free DownloadX X X X Meraki MR Platforms Public Beta √ √ √ √ X √ √ X Latest Version (minimum) √! 10.Cisco Wireless LAN Controllers (WLCs) and Wireless Service Modules (WiSMs) do not support downloadable ACLs (dACLs), but support named ACLs. Autonomous AP deployments do not support endpoint posturing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2018
Categories |