Since Tetration has visibility both inside the endpoint and the traffic flowing through the network, it gives us some amazing forensic analysis capabilities. In this post, we will review some of these powerful capabilities but this is far from all of the forensic features in Tetration.
Tetration - Policy Analysis
Tetration - Dynamic Policies and Vulnerability Detection
Tetration - More Application Mapping and Policy Creation
We previously went into application mapping in this blog post and we will delve into it further in this post to explain how that application mapping is used to create whitelists that can be used for micro-segmentation.
Vendor Specific RADIUS Dictionaries for ISE
I took some time to import and update quite a bit of RADIUS vendor dictionaries for 3rd party vendors into ISE. I grabbed this information from various community and open source sites but I obviously can't test it against every vendor out there since I don't have a selection of 140+ 3rd party NADs sitting in my lab. After I imported them to ISE, I exported them and have uploaded them here.
Tetration - Host Profile
Tetration - Application Mapping
Introduction to Tetration
Before I begin, I’d just like to thank my friend JP Cedeno for giving me a crash course into Tetration and allowing me to use what he taught me to make the next few blog posts. I’d also like to dedicate this blog post to Matt White who asked for it some months ago. In this blog post, we’re going to go over the fundamentals of Tetration.