[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How to expire Cisco ISE internal Endpoints

Posted on 2014-08-12
4
Medium Priority
?
1,128 Views
Last Modified: 2014-09-11
Hi all,

We are currently offering a guest wireless network using self-registration through a Cisco ISE custom guest portal.

We want to move from user account based access to DRW (DEvice Registration WebAuth) after clicking to accept an acceptable use policy

My tests using drw were successful.  However, it creates a permanent entry in the internal endpoint database.

I do not want guests to have to accept the AUP everytime they connect within a single day, but I do want to expire their endpoint account after a certain period of time.

Is there a way to do this?

Thanks,

Hugo
0
Comment
Question by:HugoJJ71
  • 2
  • 2
4 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 2000 total points
ID: 40256805
In a nutshell, no.  Once the endpoint's MAC enters the Internal Endpoints database it remains there indefinitely, or until you delete it.
0
 

Author Comment

by:HugoJJ71
ID: 40258168
Thanks Craig, I thought as much since I couldn't find anything on the matter.

I guess using the API's, we could semi automate the deletion of, say, week-old endpoints members of the Guest Endpoints group?
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 40258217
0
 

Author Comment

by:HugoJJ71
ID: 40268155
Thanks Craig, I'll be able to test the APIs later this week and circle back to let you know if it worked.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How does someone stay on the right and legal side of the hacking world?
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question