We performed a comparison between Cisco DNA Center and Cisco ISE (Identity Services Engine) based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, Fortinet, HPE Aruba Networking and others in Network Management Applications."The most valuable feature of Cisco DNA Center is the AI (Artificial Intelligence) that provides us with valuable information."
"I like that we can easily configure any new hardware. It's also easy to deploy and easy to troubleshoot."
"It gives us automation capabilities for pushing out the configuration to branch networks. It also provides visibility into the health of user network devices."
"The most valuable features of the solution are all of its security features...It is a highly scalable solution."
"The automation features are significant, reducing configuration time. This means outstanding functionality. By deploying the controller automatically, the rest becomes automated"
"People like to use the dashboards to get an overview of their network."
"We can monitor all devices and get the required information using the product."
"The product offers an intuitive and automated way to manage user networks. It gives me an insight into the network health."
"SGTs are valuable because they make it easy to enforce policies, instead of pushing them across all the other platforms."
"One of the advantages is that you can easily find rogue endpoints. For example, if you don't want to allow any endpoints where you don't know the people plugging into what kind of devices, ISE can give you a big, clear picture, e.g., what kind of endpoints are getting connected to your network. That is one of the advantages."
"The solution enables us to authenticate with AD."
"The most valuable feature is the integration with StealthWatch and DNA as one fabric."
"For my use cases, the in-depth troubleshooting into why a client can't connect or why they failed, is very valuable. I can go back to someone and say, 'Hey, it's not my network. It's their certificates or user error,' or something else."
"The most valuable features are the ability to retrieve information about Active Directory user names, viewing the log files to see which MAC address tried to connect with the created SSIDs, portal designing for your company, hotspot tools, and creating network rules for WiFi access."
"For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS."
"The most valuable features are authentication, we have more granular control on the access policies for the administrators. The solution is easy to use, has a center point administration, and has a good GUI."
"DNA Center has been on the market for a few years and they need to update it."
"There is a limitation with the number of VRFs that you can have in your network, and this has caused us problems with some customers."
"The product doesn’t have good monitoring capabilities."
"The solution can be quite pricey."
"What I want to see in Cisco DNA Center in the future is more support for other platforms so that you can manage third-party products, such as Fortinet."
"Integration with analytic tools and API integrations would be ideal."
"The tool's deployment is complex. It also needs to improve its GUI."
"Cisco DNA Center should improve its configuration management. It is better to have a dev version before pushing it."
"Cisco ISE is complex. The deployment and design of networks with it is so complex. If it could change it would be better."
"They should improve the documentation. There tends to be a lot of old text, or the new things aren't always up to what's been released on the code, and sometimes the documentation is inconsistent."
"The knocks I have against the product are the number of bugs that we encounter, constantly, and the amount of upgrading that we have to do."
"The user interface could be improved to make it more user-friendly."
"Troubleshooting and multi-ISE can be challenging with the solution."
"In an upcoming release, it would be nice to have NAC already standard in the solution."
"Sometimes some of Cisco ISE's graphical interfaces could be a little bit smoother. However, with the different versions, the product is getting better and better."
"Cisco ISE could be simplified somewhat. I would also prefer certificate-based authentication over confirmation-based authentication for all the processes. It's possible for us to do a workaround, but the process needs to be simplified."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco DNA Center is ranked 1st in Network Management Applications with 37 reviews while Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 138 reviews. Cisco DNA Center is rated 7.8, while Cisco ISE (Identity Services Engine) is rated 8.2. The top reviewer of Cisco DNA Center writes "Practical implementation of VXLAN is good and provides centralized control". On the other hand, the top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". Cisco DNA Center is most compared with Cisco Prime, Aruba Airwave, SolarWinds Network Configuration Manager and Huawei eSight, whereas Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator.
We monitor all Network Management Applications reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hi Anyman
1- first you need to enable pixgrid setting at CIsco ISE at Admin setting.
2- You Need to activate ISE as Radius in DNA Setting tab at the left corner (user name and password is any ISE administrator user ).
3- From Network Hierarchy Tab in DNA Cisco choose ISE as your AAA server.
4- You need to create STG group at policy tab to create the proper user grouping.
4-Then go to provision / fabric / switch interface then apply ISE as your authentication profile.
Most Importantly you need to ensure that your fabric switch has DNA advantage license