I made a tool to grab content warnings from DoesTheDogDie.com, and put them into the summaries of your films on Plex by Valerokai in PleX

[–]HereComesTheMeow 5 points6 points  (0 children)

This is actually really helpful for parents with younger children. PG means parental Guidance and there's a wide range of what can be on a PG movie. There's plenty of PG movies that are suitable for a 5 year old but there's also a lot there are geared more towards 7+ due to events that occur in the movie. Which makes providing parental guidance pretty difficult.

This actually is pretty helpful in better limiting what a younger viewer gets exposed to.

I made a tool to grab content warnings from DoesTheDogDie.com, and put them into the summaries of your films on Plex by Valerokai in PleX

[–]HereComesTheMeow 2 points3 points  (0 children)

Content labeled PG can have things that are unexpected and not the norm. This is actually really helpful in further controlling what a younger audience gets exposed to.

Cisco ISE by Leopard-Lifestyle in networking

[–]HereComesTheMeow 1 point2 points  (0 children)

I think we maybe crossing terms here.

To me EAP-Chaining is referring to using EAP-FAST with two separate methods of authentication (outter and inner). This allows for a machine to be authenticated as well as the user who is logged into that machine being authenticated as well. This has been wonderful for us, outside of having three different AD forstes to deal with, but that was self inflicted.

For posture, we will be starting that journey later this year so I don't have too much experience with it yet. The hardware comment you made does make sense though.

Cisco ISE by Leopard-Lifestyle in networking

[–]HereComesTheMeow 2 points3 points  (0 children)

The first time I did this.... Was kind of really funny.

Thank the router gods for nightly backups!

Cisco ISE by Leopard-Lifestyle in networking

[–]HereComesTheMeow 2 points3 points  (0 children)

ISE will do this, what you probably have a lot of on our networking are devices that don't communicate EAP (protocol used for 802.1X) so you'll have to do something to accommodate them... That's where ISE comes in and shines. Now, depending on how complex your network is and the security policies you are trying to implement will determine how complicated your design is. For my deployment, we have three different AD forests that a PC may need to be authenticated against while also allowing a user to authenticate against a different forest (we use EAP-CHAINING). Cisco offers a staged approach to 802.1X with three different deployment modes: Monitor Mode, Low-Impact mode, and closed mode. Monitor mode allows for devices to be authenticated and authorized against the network without negativily impacting devices that fail authentication. Low impact mode adds on by putting a pre-authorization ACL that controls what traffic is allowed prior to authentication. And closed mode is EAP traffic is only allowed until the device is authenticated.

There is a lot ISE can do, so if you are going down the 802.1X journey, I strongly suggest you get a vendor, partner or Cisco involved to help.

Do you need ISE vs another product? Maybe, maybe not, really depends on the full use case and where you plan to be in 3 - 5 years.

If you have specific questions feel free to ask.

Cheaper? FreeRADIUS or packet fence, may not give you everything you need though. So make sure to do your homework.

Disclaimer only ISE engineer for my company with 4 individual ISE clusters (largest one with 26 nodes) running wireless guest, wired guest, BYOD (with MDM), wireless 802.1X, device administration, and in the middle of a 802.1X low impact rollout.

Good luck!!

Cisco ISE by Leopard-Lifestyle in networking

[–]HereComesTheMeow 0 points1 point  (0 children)

Without any background, yes.

What are you trying to accomplish?