Understanding Cisco ISE Personas

This article aligns with exam objective 1.1 Configure personas

In this article, I’m going to deep dive into Cisco ISE Personas. Cisco Identity Services Engine (ISE) is a security policy management platform that helps organizations enforce compliance, enhance infrastructure security, and streamline service operations. ISE achieves this by integrating a range of features into different roles, known as "personas". These personas allow ISE to have flexible and scalable deployment. Each persona can be enabled on a single physical or virtual server, or they can be distributed across multiple servers for scalability and redundancy.

Administration Persona (Policy Administration Node - PAN):

The Administration Persona, also known as the Policy Administration Node (PAN), in Cisco Identity Services Engine (ISE) is designed to provide a unified interface for managing the entire ISE deployment. This is where you will perform all configuration tasks and it provides a comprehensive view of the network's security posture and operational status.

  • Network Device Management: PAN is responsible for integrating and managing network devices such as switches, routers, and wireless controllers, facilitating their participation in the ISE framework for policy enforcement.

  • Policy Configuration: Enables administrators to create, manage, and deploy access control policies across the network. This includes setting conditions based on user identity, device type, location, and other context-sensitive information.

  • User Identity Management: Manages user accounts and identities, integrating with various identity sources like Active Directory or LDAP, to streamline the application of policies based on user or group membership

  • System Settings: Handles the overall system configurations, including settings for backups, software updates, synchronization of nodes, and high availability configurations.

Policy Service Persona (Policy Services Node - PSN):

The Policy Service Persona, or Policy Services Node (PSN) focuses on the active enforcement of security and access policies within the network. It executes the core functions related to network access control, security policy enforcement, and user/device assessment. It ensures that network access is secure, compliant, and in line with the organization's policies and regulations.

  • Primary Responsibilities:

    • Authentication and Authorization: The PSN Processes network access requests, authenticating user and device credentials and authorizing network access based on predefined security policies. This process includes evaluating various attributes like user identity, device type, and connection method.

    • Device Profiling and Posture Assessment: The PSN also assesses the security posture of devices attempting to connect to the network. It also profiles devices to identify and categorize them, which is key for applying context-aware policies.

    • Guest Access Management: You will also find guest user access here. This includes user access to the network, including self-registration portals and sponsored access processes, ensuring secure and controlled access for visitors.

    • Consistent Policy Enforcement: Ensures that the same security policies are applied uniformly across all modes of network access, whether it be wired, wireless, or VPN connections.

    • Dynamic Response to Security Events: The PSN can also modify user access privileges and take other responsive actions in real-time based on the security context or triggered events.

Monitoring and Troubleshooting Persona (Monitoring and Troubleshooting Node - MnT):


The Monitoring and Troubleshooting Persona, also known as the Monitoring and Troubleshooting Node (MnT), is dedicated to the oversight and analysis of the network's security and operational status. Think of this as the observatory and analysis center of ISE, providing essential insights into network operations, security status, and user activities. Its capabilities are critical for maintaining network integrity, ensuring compliance, and facilitating effective response to security and operational challenges.

  • Primary Responsibilities:

    • Monitoring and Reporting: The MnT provides comprehensive monitoring capabilities, tracking the health and performance of the network and its devices. It generates detailed reports on various aspects of the network, including security incidents, user activities, and system status.

    • Security Event Analysis: This node is also responsible for analyzing security events and incidents. It gathers and presents data on potential threats and anomalies, aiding in the identification and understanding of security breaches or irregularities.

    • Audit Logs and Compliance: You will also find your audit logs here. Audit logs show a record all configuration changes, administrative activities, and authentication/authorization transactions. These logs are crucial for compliance purposes and forensic analysis in the event of security incidents.

    • System Health Checks: The MnT continuously monitors the health and performance of the ISE nodes, ensuring that the system is functioning optimally and alerting administrators to any issues that may arise.

    • Troubleshooting and Diagnostics: It offers a suite of diagnostic tools and features that assist administrators in troubleshooting network access issues and resolving policy application problems. This includes providing detailed insights into specific incidents or operational challenges.

    • Alarm and Event Notifications: Finally, the MnT node can be configured to send alerts and notifications in response to specific system events or identified threats, enabling timely and proactive management of potential issues.

pxGrid Persona (Platform Exchange Grid):

The pxGrid Persona, or Platform Exchange Grid, is designed for information sharing and collaboration among various security tools within the network infrastructure. This allows a more robust, responsive, and interconnected security posture across the entire network.

  • Information Exchange and Context Sharing: As mentioned above, pxGrid enables the sharing of contextual information and security intelligence between ISE and other compatible security devices and systems. This includes data like user identity, device type, location, and security posture.

  • Integration with Security Ecosystem: It integrates with a broad range of security solutions, such as firewalls, intrusion prevention systems (IPS), and Security Information and Event Management (SIEM) systems. This interoperability enhances the overall effectiveness of the security infrastructure.

  • Enhanced Network Visibility: By integrating with other security tools, pxGrid provides a more comprehensive view of network activities, enabling a deeper understanding of the security landscape and potential threats.

  • Automated Threat Response and Containment: pxGrid also enables automated responses to identified security threats. By sharing real-time security information across the network, it allows for rapid containment and mitigation of threats.

  • Adaptive Policy Enforcement: The intelligence shared through pxGrid can be used to dynamically adapt security policies and access controls in response to changing network conditions or emerging threats.

  • Scalable and Flexible Collaboration: pxGrid is designed to be scalable and flexible enough to integrate with various third-party security products and solutions.

Next
Next

ISE, ISE, Baby…Tackling the CCNP SISE Exam