Network Access Control Platform Comparison: Cisco ISE vs HPE Aruba ClearPass vs Forescout 4D Platform vs Juniper Mist Access Assurance

Four enterprise network access control platforms — Cisco Identity Services Engine 3.4, HPE Aruba Networking ClearPass Policy Manager 6.12, the Forescout 4D Platform (eyeSight / eyeControl / eyeSegment), and Juniper Mist Access Assurance — compared on deployment model, AAA protocol breadth, profiling technique, 802.1X and MAB support, BYOD and guest workflows, identity-source integrations, switch interop, segmentation approach, and compliance certifications that drive NAC procurement decisions.

WiFi Hotshots is a vendor-agnostic enterprise engineering firm serving enterprise customers, enterprise architects, infrastructure buyers, and network engineering teams across Southern California and the broader US market.

Multi-CCIE Security engineering bench

Ekahau ECSE — Certified Survey Engineer on every wireless engagement

Fixed-fee SOW — no T&M surprises

25 years of enterprise networking leadership

All four NAC platforms enforce 802.1X, MAC Authentication Bypass, and policy-driven network access — but they diverge sharply on how they get there. Cisco ISE and HPE Aruba ClearPass are mature on-premises AAA servers with extensive RADIUS and TACACS+ feature sets and per-appliance endpoint scale. Forescout is an agentless device-intelligence platform that layers visibility, control, and segmentation across existing switches and firewalls without requiring a full rip-and-replace of incumbent AAA infrastructure. Juniper Mist Access Assurance is a cloud-native, microservices-based RadSec service with FedRAMP Moderate authorization and no on-premises controller option. See the network security services line for NAC design and deployment, browse the broader enterprise engineering services portfolio, or step into the vendor comparison library — the enterprise NGFW comparison and the Wi-Fi 6E flagship AP comparison are the logical next reads since NAC sits between both layers.

Why These Four NAC Platforms

These four platforms represent the architectural spectrum of enterprise NAC procurement in 2026. Cisco ISE 3.4 is the incumbent AAA server for Cisco-centric estates with tight TrustSec / SGT integration and a device administration (TACACS+) persona. HPE Aruba Networking ClearPass Policy Manager 6.12 is the established multi-vendor AAA alternative built around a context-based policy engine and clustered hardware / virtual appliances. The Forescout 4D Platform is the visibility-first, agentless approach — eyeSight for discovery and classification, eyeControl for enforcement, eyeSegment for policy-driven segmentation across IT, IoT, IoMT, and OT estates. Juniper Mist Access Assurance is the cloud-delivered, microservices-based NAC that uses RadSec (RADIUS over TLS) to decouple authentication from on-premises AAA servers. Other platforms — Extreme ExtremeControl, Fortinet FortiNAC, Portnox CLEAR, SecureW2 JoinNow — serve adjacent scopes and will appear in future library entries.

The Comparison Matrix: Specifications That Matter

Where a specification reads “not publicly documented,” the vendor’s primary documentation reviewed for this page does not disclose that value — the capability may exist, but should be confirmed with the vendor before downselecting. NAC licensing models and per-endpoint scaling numbers should always be validated against a current, signed vendor quote tied to the customer’s actual endpoint count.

SpecificationCisco ISE 3.4HPE Aruba ClearPass 6.12Forescout 4D PlatformJuniper Mist Access Assurance
Deployment modelOn-premises physical (SNS-3700 series), virtual (VMware, Hyper-V, KVM, Nutanix AHV), and native cloud (AWS, Azure, OCI) per ISE 3.4 installation guide.On-premises physical (C1000 / C2000 / C3000 hardware), virtual (VMware ESXi, Microsoft Hyper-V, CentOS KVM), and public cloud (AWS EC2, Microsoft Azure).Physical appliances (Forescout 4100 / 5100 / 6100 series), virtual appliances on VMware ESXi / Microsoft Hyper-V / Linux KVM, Forescout Cloud classification assist.Cloud-delivered only. Microservices-based, geographically distributed PoPs. No on-premises controller option documented. Mist Edge provides on-prem RadSec proxy for survivability.
AAA protocol supportRADIUS + TACACS+ (TACACS+ requires Device Administration license on Policy Service nodes). ISE 3.4 added TACACS authentication over TLS.RADIUS + TACACS+ (native). OnConnect SNMP-based enforcement for non-RADIUS switches per ClearPass 6.12 admin guide.Can operate as a RADIUS server or RADIUS proxy, or operate alongside Cisco ISE / ClearPass as visibility + enforcement overlay without replacing AAA.RADIUS over TLS (RadSec) to radsec.nac.mist.com on TCP port 2083. TACACS+ not publicly documented in Mist Access Assurance primary sources.
802.1X + MAB + captive portalFull 802.1X (EAP-TLS, PEAP, EAP-FAST, EAP-TTLS, TEAP), MAB, Central Web Auth (CWA), Local Web Auth (LWA) per ISE secure wired access guide.Full 802.1X with all major EAP methods, MAC Authentication (MAB), Web Authentication / Captive Portal via ClearPass Guest.Enforces with or without 802.1X. Captive portal, DHCP-based, SPAN-based, and switch-ACL-based control actions documented.802.1X EAP-TLS, EAP-TTLS/PAP, Multi Pre-Shared Key (MPSK), and MAB per Mist authentication methods documentation. PEAP and captive portal not publicly documented in reviewed sources.
Posture / endpoint healthAnyConnect posture agent, stealth agent, or temporal agent; Essentials / Advantage / Premier tiers gate depth.OnGuard agent (persistent or dissolvable) plus agentless web-based health checks. Licensed per-device on 24-hour basis.Agentless posture via 20+ passive and active monitoring techniques per Forescout eyeSight product page.Device posture assessment referenced in Mist Access Assurance overview; deep posture feature parity with ISE / ClearPass not publicly documented.
Profiling techniqueHybrid: RADIUS / DHCP / HTTP / SNMP / NetFlow probes + ISE endpoint profile library + optional AI Endpoint Analytics.Context-based profiling with DHCP, HTTP User-Agent, MAC OUI, SNMP, NMAP, Active Sync, and device fingerprint dictionary.Agentless device intelligence drawing on the Forescout Device Cloud (3M+ device profile reference set per eyeSight page).X.509 certificate attribute matching, IdP group membership, MDM integration (Intune, Jamf), and client fingerprinting; profile scale not publicly documented.
BYOD onboardingNative BYOD portal, SCEP / EST certificate provisioning, My Devices portal. Included at Advantage tier and above.ClearPass Onboard application license. Onboard-generated device certificate model; license counted per user with Onboard certs.Not a primary BYOD provisioning platform; typically integrates with Onboard / ISE BYOD for certificate provisioning and overlays visibility.BYOD onboarding via integrated PKI and external PKI providers referenced in Mist Access Assurance datasheet; certificate lifecycle tied to identity provider.
Guest workflowNative sponsor and self-registration portals, hotspot access, CWA redirect. Requires Essentials license.ClearPass Guest (included with Platform + Access license) with sponsor workflows, social login, SMS / email receipts.Guest access via eyeControl differentiated policy and captive portal redirect; integrates with third-party sponsor platforms.Guest workflows not the headline use case; Mist handles guest via separate wireless guest portal feature on APs rather than Access Assurance.
Identity-source integrationsActive Directory (multi-forest), LDAP, ODBC / SQL, RSA SecurID, RADIUS token, REST ID store, SAML IdP (Entra ID, Okta), pxGrid.Active Directory, LDAP, SQL DB, HTTP, Kerberos, SAML IdP, REST, Entra ID via SAML per ClearPass auth architecture and flow.Pulls identity from AD, Entra ID, Okta, SAML IdPs, Cisco ISE, Aruba ClearPass, MDM, CMDB — 70+ third-party integrations per Forescout 4D Platform page.Native integrations with Microsoft Entra ID (Azure AD), Okta, Google Workspace, plus MDM providers Microsoft Intune and Jamf per Mist NAC architecture page.
Switch / WLC interopBroad multi-vendor via standards RADIUS + vendor-specific attributes; deepest integration with Cisco Catalyst, Nexus, Meraki, and WLC / Catalyst 9800.Explicitly multi-vendor; integration examples for Cisco switches, Juniper EX, Aruba, and HPE per ClearPass 6.12 deployment guide.Integrates with 300+ switch / firewall / WLC vendors via SNMP, CLI, RADIUS, and API per Forescout technology partner program.Juniper EX / EX4000 native; Cisco wired switches and Aruba controllers via Mist Edge RadSec proxy per Mist NAC FAQ.
Segmentation approachCisco TrustSec Security Group Tags (SGT) assigned at authentication, propagated via inline SGT, SXP, or pxGrid; consumed by Catalyst, Nexus, ASA / FTD firewalls.Dynamic Segmentation via user / device roles plus VLAN steering; downloadable ACL (dACL) push to Cisco switches; integrates with AOS-CX / ArubaOS role-based policy.eyeSegment visualizes traffic flows across IT / OT / IoT and orchestrates enforcement across firewalls, switches, SDN per eyeSegment product page.VLAN assignment plus Group-Based Policy (GBP) with Scalable Group Tags over VXLAN EVPN on Juniper EX fabrics per Mist GBP documentation.
IoT discovery + fingerprintingISE endpoint profile library + AI Endpoint Analytics (Advantage+) + integration with Cisco Cyber Vision for OT.Built-in device fingerprint dictionary updated via feed; integrates with Aruba IntroSpect and third-party IoT discovery.Headline capability. Agentless classification across IT / IoT / IoMT / OT; 250+ OT / ICS DPI protocols per Forescout platform page.Client fingerprinting plus MDM-enriched context; OT / ICS depth not the headline use case for Mist Access Assurance.
Cloud-delivered vs on-premBoth — on-prem remains the default; native AWS / Azure / OCI since ISE 3.1+ per ISE cloud deployment guide.Both — on-prem clustered (hardware or VM) default; public-cloud VM supported.Both — on-prem appliances are the core control plane; Forescout Cloud augments classification.Cloud-only control plane. On-premises is a lightweight RadSec edge for survivability, not a full controller.
Licensing modelTiered subscription: Essentials, Advantage, Premier (nested); separate Device Administration license for TACACS+. Smart Licensing via Cisco Smart Account.Platform License + Application Licenses (Access, OnGuard, Onboard). Access license consumed per active session; OnGuard per-device per-24-hour; Onboard per-user with active cert.Forescout Flexx software-centric licensing; device-count licenses pooled across appliances and segments; licenses decoupled from appliances.Subscription based on average concurrently active client devices over a 7-day rolling period per Mist Access Assurance FAQ.
Per-node scale (PSN / standalone)SNS-3715: 25K dedicated-PSN endpoints. SNS-3755: 50K. SNS-3795: 100K. Max 2M active endpoints / 4M total in DB per ISE performance and scalability guide.C1000: up to 1,000 concurrent sessions. C2000: up to 10,000. C3000: up to 50,000 per ClearPass hardware appliance specs.Per-appliance endpoint capacity driven by Flexx license and appliance model; XL virtual appliance scales highest. Specific numbers in Forescout sizing guide.Elastic cloud scale; no per-node ceiling published. Subscription caps scale rather than hardware.
FIPS / Common Criteria / FedRAMPFIPS 140-3 compliance referenced in ISE 3.4 release (IPsec VTI). Specific CMVP certificate numbers and FedRAMP status for ISE itself should be verified via Cisco Trust Portal; several Cisco cloud security products hold FedRAMP Moderate.FIPS mode with FIPS-validated cryptographic module per ClearPass 6.12 admin FIPS tab. Common Criteria NDcPP + Authentication Server EP per Aruba external security testing page. FIPS 140-3 specific certificate should be verified via NIST CMVP.DoDIN APL listing (v8.x), FIPS 140-2 validated, NIAP Common Criteria certification (v8.1) per Forescout compliance documentation. FIPS 140-3 specific validation should be verified via Forescout compliance team.FedRAMP Moderate authorization for Juniper Mist Government Cloud granted April 2025 per Juniper press release. Government Cloud covers wireless, wired, WAN, Marvis, and NAC. FIPS 140-3 status for Access Assurance not publicly documented in reviewed sources.

NAC Is a Five-Year Operational Commitment

The wrong NAC platform burns engineering hours for half a decade. Send network diagrams, switch inventory, endpoint count, identity-source topology, and compliance scope. WiFi Hotshots returns a fixed-fee SOW that picks the platform based on fit — not on vendor allegiance.

Per-Vendor Fact Summaries

Cisco Identity Services Engine 3.4

The incumbent for Cisco-heavy estates. ISE 3.4 (GA late 2024, shipping through 2026) runs on SNS-3715 / 3755 / 3795 hardware, on VMware / Hyper-V / KVM / Nutanix AHV, and natively on AWS, Azure, and OCI per the ISE 3.4 installation guide. Node personas include Policy Administration (PAN), Monitoring (MnT), Policy Service (PSN), and pxGrid; the TACACS+ function requires a Device Administration license on PSNs. ISE 3.4 added TACACS over TLS and the Message-Authenticator required-on-response option as mitigation for the Blast-RADIUS vulnerability. Licensing follows Essentials → Advantage → Premier nesting; BYOD, posture, and profiling depth gate at Advantage, and TrustSec / pxGrid SGT publishing gates at Premier. Deepest integration is with Catalyst switches, Nexus data-center fabric, Meraki Dashboard, and Catalyst 9800 wireless controllers for SGT inline tagging and Adaptive Network Control.

HPE Aruba Networking ClearPass Policy Manager 6.12

The established multi-vendor AAA platform. ClearPass 6.12 runs on C1000 / C2000 / C3000 hardware (1K / 10K / 50K concurrent sessions respectively) and on VMware ESXi, Hyper-V, CentOS KVM, AWS EC2, and Azure VM per the ClearPass data sheet. The platform is explicitly multi-vendor — Cisco switch integration guides are part of core documentation, as are Juniper EX, ArubaOS-Switch, and AOS-CX integration paths. Application licensing separates Access (per active session), OnGuard (per-device, 24-hour), and Onboard (per-user with cert). Common Criteria certified under NDcPP and the Authentication Server Extended Package. FIPS-validated cryptographic module when FIPS mode is enabled per ClearPass admin guide. Dynamic Segmentation uses user / device roles plus dACL or VLAN steering for policy-driven enforcement across multi-vendor estates.

Forescout 4D Platform (eyeSight / eyeControl / eyeSegment)

The visibility-first, agentless architecture. The Forescout 4D Platform is built around three function modules: eyeSight for real-time device discovery and classification across IT / IoT / IoMT / OT, eyeControl for policy-driven enforcement with or without 802.1X, and eyeSegment for traffic-flow visualization and multi-enforcement-point segmentation orchestration. Runs on 4100 / 5100 / 6100 series physical appliances and virtual appliances (ESXi, Hyper-V, KVM) under Flexx software-centric licensing. Strength is OT / ICS scope — 250+ deep-packet-inspection protocols per the Forescout 4D Platform page — and multi-vendor orchestration via 70+ third-party integrations including Cisco ISE, ClearPass, Palo Alto Networks, Fortinet, Check Point, and Cisco DNA-Center per the Forescout segmentation solution brief.

DoDIN APL listed with FIPS 140-2 validated cryptographic modules and NIAP Common Criteria certification on v8.x per Forescout’s compliance posture. Forescout often sits beside an incumbent AAA server (ISE or ClearPass) rather than replacing it — adding IoT / OT visibility and segmentation orchestration without a controller-replacement project.

Juniper Mist Access Assurance

The cloud-native alternative. Juniper Mist Access Assurance is a microservices-based NAC delivered from geographically distributed Mist Cloud PoPs, with authentication traffic encapsulated in RadSec (RADIUS over TLS, TCP 2083) to radsec.nac.mist.com. Authentication methods documented on the public Mist docs: 802.1X EAP-TLS, EAP-TTLS/PAP, Multi Pre-Shared Key, and MAB. Identity-provider integrations include Microsoft Entra ID (Azure AD), Okta, Google Workspace, Ping Identity, Intune, and Jamf per the Mist NAC architecture page. Third-party switches (Cisco wired, Aruba controllers) integrate via Mist Edge RadSec proxy per Mist documentation. Juniper Mist Government Cloud achieved FedRAMP Moderate authorization in April 2025 per Juniper’s investor press release, with wireless, wired, WAN, Marvis, and NAC all in scope; U.S.

Department of Veterans Affairs was the sponsoring agency. FIPS 140-3 specific validation for Access Assurance is not publicly documented in the sources reviewed and should be confirmed via Juniper Pathfinder Compliance Advisor. Segmentation uses VLAN assignment plus Group-Based Policy with Scalable Group Tags across VXLAN EVPN on Juniper EX fabrics. No on-premises controller option is published — buyers with air-gap, no-cloud-egress, or data-residency mandates outside FedRAMP Moderate regions should weigh this carefully.

When Each Platform Is Worth Evaluating First

These are routing heuristics, not recommendations. A production NAC decision requires a switch inventory, identity-topology review, compliance-scope review, and written scope. WiFi Hotshots engineers platforms across all four vendors; the routing reflects what the documented specifications favor for common scenarios.

  • Cisco-heavy campus with TrustSec / SGT segmentation ambition: Cisco ISE 3.4. Inline SGT tagging on Catalyst 9000 and Nexus 9000, pxGrid SGT publication to FTD, and ASA consumption are the deepest native integrations in NAC today.
  • Multi-vendor switch estate without a dominant incumbent: HPE Aruba ClearPass 6.12 or Forescout 4D. ClearPass was designed explicitly multi-vendor; Forescout layers over whatever switches are present without requiring AAA replacement.
  • Healthcare with heavy IoMT or manufacturing with OT / ICS in scope: Forescout 4D. The agentless, passive-classification model plus 250+ OT DPI protocols per Forescout’s platform page is built for environments where endpoint agents are not acceptable.
  • Greenfield cloud-first deployment with Entra ID or Okta as the identity source of truth: Juniper Mist Access Assurance. The RadSec-to-cloud model removes on-prem AAA servers from the operational picture; Entra ID and Okta are first-class native integrations.
  • FedRAMP Moderate or federal civilian ATO required today: Juniper Mist Government Cloud is FedRAMP Moderate authorized (April 2025) per Juniper’s press release, with Access Assurance in scope. Cisco, Aruba, and Forescout all hold FIPS and Common Criteria programs; verify the specific authorization boundary and cert numbers with each vendor’s compliance team.
  • Air-gapped or no-cloud-egress mandate: Cisco ISE or HPE Aruba ClearPass on-premises. Forescout on-prem appliances also qualify. Juniper Mist Access Assurance is cloud-only — not a fit.
  • TACACS+ device administration is in scope: Cisco ISE (with Device Admin license) or HPE Aruba ClearPass native. Forescout is primarily NAC, not a TACACS+ server. Juniper Mist Access Assurance does not publicly document TACACS+ in primary sources.

Frequently Asked Questions

Which NAC platforms support both RADIUS and TACACS+ natively?

Cisco ISE 3.4 supports RADIUS natively and TACACS+ with a Device Administration license on Policy Service nodes per ISE documentation; ISE 3.4 added TACACS authentication over TLS. HPE Aruba Networking ClearPass Policy Manager 6.12 supports RADIUS and TACACS+ natively. Forescout can act as a RADIUS server or proxy but is primarily an NAC visibility / enforcement platform rather than a TACACS+ AAA server.

Juniper Mist Access Assurance is built around RadSec (RADIUS over TLS on TCP 2083); TACACS+ is not publicly documented in the Mist Access Assurance primary sources reviewed.

Is Juniper Mist Access Assurance available on-premises?

No. Juniper Mist Access Assurance is a cloud-only service delivered from distributed Mist Cloud points of presence. Mist Edge provides an on-premises RadSec proxy plus local-cache survivability for previously authenticated clients per Juniper’s site survivability documentation, but the full NAC control plane (policy, identity-provider federation, certificate lifecycle) is cloud-hosted. Buyers with air-gap or no-cloud-egress mandates should evaluate Cisco ISE, HPE Aruba ClearPass, or Forescout on-premises.

Can Forescout replace Cisco ISE or Aruba ClearPass?

Sometimes yes, often no. The Forescout 4D Platform can operate as a standalone NAC with or without 802.1X per the eyeControl product page. In practice, Forescout is most frequently deployed alongside an incumbent AAA server — ISE or ClearPass — because Forescout’s strength is agentless IoT / IoMT / OT visibility and multi-enforcement-point segmentation orchestration, while ISE or ClearPass continues to handle 802.1X AAA, BYOD certificate provisioning, and TACACS+ device administration.

Peer-to-peer replacement decisions should be scoped against actual AAA-protocol requirements and existing switch configurations.

What does FedRAMP Moderate actually cover for Juniper Mist?

Per Juniper’s April 2025 investor press release, Juniper Mist Government Cloud achieved FedRAMP Moderate authorization with the U.S. Department of Veterans Affairs as sponsoring agency. The authorization boundary includes wireless, wired, WAN, Marvis Virtual Network Assistant, network access control, indoor location services, and premium analytics. The authorization applies to the Government Cloud specifically — not the commercial Mist Cloud — so federal buyers must provision services in the Government Cloud region to inherit the FedRAMP Moderate control set.

Verify the current authorization boundary and control-set version via fedramp.gov before making a procurement decision.

How do per-endpoint scale numbers differ among the four platforms?

Cisco ISE on SNS-3795 hardware supports up to 100,000 active endpoints when deployed as a dedicated Policy Service Node per ISE performance and scalability guide, with a 2 million active / 4 million total database ceiling. HPE Aruba ClearPass C3000 supports up to 50,000 concurrent sessions per ClearPass hardware specs. Forescout per-appliance scale depends on appliance model and Flexx license; the XL virtual appliance is the top of the range and specific numbers are published in the Forescout licensing and sizing guide.

Juniper Mist Access Assurance is cloud-elastic with no per-node ceiling documented — subscription scales with concurrent client count averaged over a 7-day rolling window per the Mist Access Assurance FAQ.

How does each platform handle segmentation beyond VLAN steering?

Cisco ISE uses TrustSec Security Group Tags (SGT) assigned at authentication and propagated inline, via SXP, or via pxGrid to Catalyst, Nexus, and FTD firewalls. HPE Aruba ClearPass uses Dynamic Segmentation with user / device roles, dACL push, and ArubaOS role-based policy on AOS-10 fabrics. Forescout eyeSegment visualizes real-time traffic flows across IT / OT / IoT and orchestrates enforcement across firewalls, switches, SDN, and agent-based segmentation.

Juniper Mist Access Assurance uses Group-Based Policy with Scalable Group Tags over VXLAN EVPN on Juniper EX fabrics per the Mist GBP documentation.

None of the four is a one-to-one substitute for the others — segmentation fit depends on the switching and firewall estate.

Do all four platforms integrate with Microsoft Entra ID (Azure AD)?

Yes, via different paths. Cisco ISE integrates with Entra ID via SAML IdP federation for SAML-capable portals and via REST ID-store for specific flows per ISE 3.4 admin guide. HPE Aruba ClearPass supports Entra ID via SAML IdP authentication per ClearPass auth architecture documentation. Forescout pulls identity from Entra ID alongside AD, Okta, and other identity sources for policy-decision context.

Juniper Mist Access Assurance natively integrates with Entra ID, Okta, Google Workspace, and Ping per the Mist NAC architecture page — Entra ID is a first-class identity source for EAP-TTLS/PAP credential authentication flows.

Are FIPS 140-3 and Common Criteria still vendor differentiators for NAC in 2026?

No. FIPS and Common Criteria are table stakes for all four major NAC vendors at enterprise and federal scope. Cisco ISE 3.4 references FIPS 140-3 compliance in its IPsec VTI work per the ISE 3.4 release notes. HPE Aruba ClearPass ships a FIPS-validated cryptographic module and is Common Criteria certified under NDcPP plus the Authentication Server Extended Package. Forescout is DoDIN APL listed with FIPS 140-2 validated cryptographic modules and NIAP Common Criteria certification on v8.x.

Juniper Mist Government Cloud is FedRAMP Moderate authorized (April 2025).

Federal and highly regulated buyers must verify the specific certificate number, authorization boundary, and firmware / software train with each vendor’s compliance team before downselecting — generic “FIPS 140-3 compliant” marketing language is not a substitute for a current CMVP certificate.

What is the right first comparison to read alongside this one?

Two. The enterprise NGFW comparison is essential because NAC and NGFW are the two enforcement surfaces for segmentation — SGT from ISE terminates on FTD, user / device roles from ClearPass terminate on Aruba or third-party firewalls, Forescout orchestrates across NGFWs and switches, and Mist GBP tags ride VXLAN EVPN fabrics that adjoin the firewall layer.

The Wi-Fi 6E flagship access point comparison matters because 802.1X on the wireless edge is where NAC policy lives for most users, and WLC / AP integration with the NAC platform is a meaningful procurement criterion.

What are the standard Cisco ISE deployment models, and when do I pick one over another?

Cisco ISE ships three reference deployment models per the Cisco ISE Performance and Scalability Guide. (1) Standalone — Administration, Monitoring, and Policy Service roles on a single node, appropriate for labs or very small deployments under 7,500 endpoints. (2) Hybrid — PAN (Primary Admin Node) plus MnT (Monitoring and Troubleshooting) co-located with dedicated PSNs (Policy Service Nodes), supporting up to 50,000 endpoints on SNS-3755 and 500,000 endpoints on SNS-3795. (3) Distributed — separate PAN-PAN HA pair, MnT-MnT HA pair, and up to 58 PSN nodes for up to 2 million active endpoints, 4 million total database.

The practical trigger for Distributed is cross-region latency — ISE PSN co-location with the network access devices authenticating against them keeps RADIUS round-trip times low. Cross-continent deployments typically run one Distributed cluster per region, federated via pxGrid and Platform Exchange Grid (PxGrid Cloud on ISE 3.3+). Size PSNs against authentication rate peaks, not just average load.

How does ClearPass C1000 / C2000 / C3000 hardware sizing compare against the N1000 / N3000 / N3001?

The HPE Aruba Networking ClearPass C1000, C2000, and C3000 are the previous-generation hardware appliances; the N1000, N3000, and N3001 are the current-generation replacements. Per ClearPass hardware specs, the C1000 supports up to 5,000 concurrent sessions, C2000 up to 25,000, and C3000 up to 50,000. The N-series refresh targets similar concurrent-session envelopes with newer silicon, expanded RAM, and larger NVMe storage for log retention.

ClearPass also runs as Virtual Appliances on VMware ESXi, KVM, Hyper-V, AWS, and Azure in VA-500, VA-5K, and VA-25K SKUs. Mixing virtual and hardware appliances in a single cluster is supported; pick hardware when dedicated TPM-backed cryptography, offload acceleration, or a predictable sustained-TPS ceiling matters. For sub-5,000 endpoint deployments, VA-500 on a properly sized ESXi host is typically sufficient.

What is the scope of the Fortinet FortiNAC integration with FortiGate and the Security Fabric?

FortiNAC integrates with the Fortinet Security Fabric to exchange device context with FortiGate (for policy enforcement based on MAC / hostname / classification), FortiAnalyzer (for extended session logging), FortiManager (for policy-sync across ADOMs), and FortiSIEM. FortiNAC profiles endpoints via DHCP fingerprinting, HTTP user-agent, SNMP query, NMAP, and over 13 other profiling methods per FortiNAC documentation. 802.1X supplicant management is supported but FortiNAC is typically deployed agentless.

FortiNAC scales to hundreds of thousands of endpoints with a Control and Application server architecture. The differentiator vs Cisco ISE or ClearPass is tight integration with the Fortinet Security Fabric — endpoint posture from FortiClient, FortiEDR telemetry, and FortiGate session data aggregate in one platform. For mixed-vendor network estates (non-Fortinet switches), FortiNAC supports RADIUS-based enforcement on third-party switches but loses some of the Fabric-native telemetry richness.

When should I use 802.1X, MAB, web auth, or a hybrid model?

802.1X (IEEE 802.1X-2020) is the strong-authentication standard for enterprise-managed endpoints — domain-joined workstations, laptops with MDM-enrolled certificates, VoIP phones with LSC certificates. MAC Authentication Bypass (MAB) is the fallback for endpoints that cannot run an 802.1X supplicant — printers, IoT sensors, specialty equipment — with MAB authenticating against a MAB-allowed MAC address list on the AAA server. Web Authentication (webauth / captive portal) is typically used for guest access or BYOD onboarding.

Hybrid deployments run 802.1X as primary with MAB fallback on the same port (IEEE 802.1X-rev mode) — if supplicant timeout fires, the port drops to MAB. All four NAC platforms (Cisco ISE, Aruba ClearPass, Fortinet FortiNAC, Juniper Mist Access Assurance) support this pattern. Web auth for corporate users is generally discouraged — it does not provide continuous authentication, it does not validate device posture, and it is vulnerable to credential theft compared to EAP-TLS certificate-based 802.1X.

When do I use RADIUS versus TACACS+ for network device administration?

RADIUS (RFC 2865) is the standard for endpoint AAA — authenticating user and device sessions on switches, wireless controllers, VPN concentrators, and firewalls. TACACS+ (draft-ietf-opsawg-tacacs) separates authentication, authorization, and accounting into independent exchanges and is primarily used for network device administrator access — controlling who can log into a switch, router, or firewall and what commands they can execute.

Both Cisco ISE and HPE Aruba ClearPass support RADIUS and TACACS+ natively with separate licensing for the Device Administration feature. FortiNAC is a RADIUS-centric platform; network device administration on Fortinet stacks usually pairs with a dedicated TACACS+ server (ISE, ClearPass, or a standalone TAC_PLUS / shrubbery.net-style deployment). Juniper Mist Access Assurance uses RadSec (RADIUS over TLS on TCP 2083) as its primary AAA; TACACS+ for network device admin on Juniper is typically handled out-of-platform.

How does posture checking differ between ISE Posture, ClearPass OnGuard, and Cisco Secure Client posture module?

Cisco ISE Posture performs continuous endpoint compliance assessment via the Cisco Secure Client (formerly AnyConnect) ISE Posture module — evaluating OS patch level, AV signature currency, disk encryption status, firewall status, and custom conditions against a Posture Policy. Failed-posture endpoints land in a quarantine VLAN or ACL-restricted posture-remediation segment. HPE Aruba ClearPass OnGuard is the ClearPass equivalent — health checks via the OnGuard persistent or dissolvable agent against OnGuard policy.

Posture results are time-bound; endpoints re-posture on a periodic schedule (typically hourly for managed endpoints) and on RADIUS CoA events. Unmanaged endpoints (IoT, contractor laptops) cannot be postured via agent and are typically isolated to VLANs with restricted ACLs. Per CIS Controls v8 Control 4 (Secure Configuration of Enterprise Assets) and Control 13 (Network Monitoring and Defense), continuous endpoint posture is a foundational control — running NAC without posture is an incomplete implementation.

How do BYOD and guest onboarding workflows compare across the four platforms?

Cisco ISE uses the My Devices Portal and BYOD Portal with a single sign-on employee flow that provisions an EAP-TLS certificate onto the personal device via SCEP plus a supplicant profile. Guest onboarding uses Sponsored Guest, Self-Registered Guest, and Hotspot portals customizable via the Portal Builder. HPE Aruba ClearPass uses Onboard (BYOD with certificate provisioning via ClearPass Onboard CA) and Guest (sponsored, self-service, social-login, and SMS approval workflows). Fortinet FortiNAC has a Self-Registration portal and guest-access workflow. Juniper Mist Access Assurance uses Mist Access Assurance’s IDP-federated onboarding with Google Workspace / Entra ID / Okta.

The BYOD design decision is certificate lifecycle management — how certificates are provisioned, renewed, revoked, and recovered across employee device refresh cycles. EAP-TLS with per-device certificates is the strongest posture but adds certificate-lifecycle operational cost; EAP-PEAP with AD credentials is simpler but weaker against credential-theft attacks. See the network security architecture services for BYOD certificate-lifecycle design scoping.

What endpoint profiling methods do the four platforms use?

All four NAC platforms combine multiple profiling methods to classify endpoints. DHCP fingerprinting parses Option 55 parameter-request-list and Option 60 vendor-class-identifier against a signature database. HTTP user-agent parsing identifies browsers, operating systems, and device types from the User-Agent header. SNMP queries against the endpoint (if SNMP is responsive) read sysDescr and similar OIDs. NMAP-style TCP / UDP probing identifies open services and service banners.

Cisco ISE, HPE Aruba ClearPass, Fortinet FortiNAC, and Juniper Mist Access Assurance also consume CDP / LLDP neighbor data, Microsoft SCCM / Intune integration, Active Directory computer-account attributes, and pxGrid / ClearPass Exchange / Security Fabric feeds from integrated endpoint-detection systems. The operational question is profile-library currency — how often the vendor refreshes its device signature database to cover new IoT / OT device shipments. All four publish regular profile updates; the enterprise SOC usually still authors custom profiles for in-house or specialty devices.

What are the certificate enrollment options for endpoint 802.1X onboarding?

Four primary enrollment protocols apply in enterprise NAC. SCEP (Simple Certificate Enrollment Protocol, RFC 8894) is the classic PKI-agnostic enrollment protocol used by Cisco ISE, ClearPass, Microsoft Intune, and Jamf — it is a client-pull enrollment against a registration authority. NDES (Network Device Enrollment Service) is Microsoft’s SCEP implementation on Active Directory Certificate Services and is the most common corporate-network enrollment endpoint. EST (Enrollment over Secure Transport, RFC 7030) is the HTTP / TLS-based modern replacement for SCEP with better automation and rollover support.

ACME (RFC 8555), originally designed for Let’s Encrypt, is increasingly used for internal CA automation where the issuing CA supports ACME. All four NAC platforms integrate with external PKI (Microsoft ADCS, Entrust, DigiCert, private OpenSSL / EJBCA) via SCEP / NDES / EST. Certificate lifetime, key size (minimum 2048-bit RSA or 256-bit ECC), and renewal cadence should align with enterprise PKI policy — typically 1 or 2 year lifetimes with automated renewal 30 days before expiry.

What is the difference between pxGrid, ClearPass Exchange, and Security Fabric integration buses?

Cisco pxGrid is a publish-subscribe ecosystem integration bus that exposes ISE context (endpoint IP, MAC, SGT, user identity, posture status) to external systems — SIEM, vulnerability scanners, EDR, firewall — over a TLS-secured bus. pxGrid is IETF-published as “A Multi-Vendor Security Context Exchange” and includes over 100 ecosystem partners. HPE Aruba ClearPass Exchange is the ClearPass equivalent — an open integration bus exchanging context with third-party systems including Cisco firewalls, Palo Alto, Check Point, Fortinet, and SIEMs.

Fortinet Security Fabric is Fortinet’s integration fabric, primarily Fortinet-to-Fortinet but with REST API hooks for third-party integration. Juniper Mist integrates via Marvis Actions API and Mist Cloud APIs. For SOC integration of NAC context into SIEM / SOAR / XDR, pxGrid and ClearPass Exchange are the most mature; for third-party firewall policy sync, vendor-specific connectors (ISE-to-FTD, ClearPass-to-PAN-OS) deliver the tightest integration.

How does SGT-based segmentation with Cisco TrustSec compare to VLAN-based segmentation?

Cisco TrustSec uses Security Group Tags (SGTs) — 16-bit labels assigned at authentication via ISE and propagated inline (CMD header on capable hardware), via SXP (SGT Exchange Protocol) to legacy devices, or via pxGrid to firewalls and other enforcement points. SGT-to-SGT policy replaces VLAN-to-VLAN ACLs, decoupling policy from topology. A single VLAN can carry endpoints in different SGTs; a single SGT can span multiple VLANs.

VLAN-based segmentation couples policy to topology — VLAN changes require switch reconfiguration. TrustSec simplifies multi-site mergers, M&A network integration, and BYOD isolation. The operational cost is TrustSec-capable hardware (Cisco Catalyst, Nexus, FTD, ASA) and ISE licensing. Non-Cisco shops typically use HPE Aruba Dynamic Segmentation with User-Roles propagating over VXLAN or CAPWAP tunnels, or Juniper Group-Based Policy (GBP) with Scalable Group Tags over VXLAN EVPN on EX fabrics — architecturally similar patterns with vendor-specific encapsulation.

How do I integrate Microsoft Entra ID (Azure AD) with my NAC for 802.1X authentication?

Entra ID is SAML-native, not RADIUS-native. Cisco ISE integrates with Entra ID via SAML IdP federation for SAML-capable portals (BYOD, Sponsor, CWA) and via the ISE REST ID Store plus the ROPC (Resource Owner Password Credentials) flow for legacy EAP-PEAP / PAP backends. HPE Aruba ClearPass supports Entra ID via SAML IdP authentication for portal flows and via Entra ID CBA (Certificate-Based Authentication) for EAP-TLS certificate lookups.

Juniper Mist Access Assurance natively integrates with Entra ID as a first-class identity source — EAP-TTLS/PAP flows authenticate against Entra ID via the Mist NAC’s IDP federation. Fortinet FortiNAC integrates with Entra ID via SAML and with Azure AD DS (Domain Services) via RADIUS agent. For pure EAP-TLS certificate-based authentication, the identity source is the certificate issuer chain, not Entra ID directly; the NAC validates the certificate and optionally looks up the subject against Entra ID for SGT / role assignment.

How do I integrate Intune, Jamf, and Workspace ONE with the NAC?

MDM integration serves two purposes in NAC: (1) validating that the endpoint is enrolled and compliant with MDM policy before granting network access, (2) automating certificate provisioning via SCEP / NDES from the MDM through the enterprise CA. Cisco ISE integrates with Intune via the Intune MDM API for compliance status lookup. HPE Aruba ClearPass integrates with Intune, Jamf Pro, VMware Workspace ONE, and Microsoft Configuration Manager via ClearPass Exchange partners.

Fortinet FortiNAC integrates with Intune and Jamf via REST API. Juniper Mist integrates with Intune via Graph API. The operational pattern: device enrolls in MDM; MDM provisions EAP-TLS certificate via SCEP; device authenticates 802.1X with the certificate; NAC looks up MDM compliance in real time before authorizing access. Failed-compliance devices are steered to a remediation VLAN. Per CIS Controls v8 Control 4, this is the recommended posture for BYOD and corporate-owned mobile device access.

What is RADIUS CoA (RFC 5176) and why does it matter?

RADIUS Change of Authorization (CoA, RFC 5176) is the mechanism that lets a NAC push dynamic policy changes to an already-authenticated session — forcing reauthentication, terminating a session, or changing the authorization profile (VLAN, ACL, SGT) without waiting for the next periodic reauth. CoA is the enforcement plumbing that makes real-time quarantine and re-profiling work. All four NAC platforms support CoA; all Cisco, HPE Aruba, Juniper, Fortinet, Extreme, and Arista campus switches are CoA-capable.

Typical CoA use cases: posture-check failure mid-session (quarantine), pxGrid / ClearPass Exchange alert from an integrated firewall or EDR (session termination), BYOD revocation (session terminate), SGT change on user role modification (reauth). CoA-Disconnect terminates the session; CoA-Request with new RADIUS attributes re-applies policy. Switch and AP configuration must permit RADIUS dynamic authorization (typically on UDP 3799, sometimes UDP 1700) from the NAC PSN / server IP.

What is the Common Criteria certification status across NAC platforms?

Common Criteria certification for NAC products is typically evaluated against the Authentication Server Extended Package (ESP) plus the Network Device collaborative Protection Profile (NDcPP). HPE Aruba ClearPass Policy Manager holds a Common Criteria certificate against NDcPP plus the Authentication Server ESP. Cisco ISE carries Common Criteria certification; verify the current certificate version against the NIAP-CCEVS product list at niap-ccevs.org. Forescout eyeSight holds NIAP Common Criteria certification on v8.x.

For DoD deployments, DoDIN APL listing is the procurement gate beyond CC. Juniper Mist Access Assurance as a cloud service is evaluated through FedRAMP Moderate authorization (April 2025, VA-sponsored) rather than a physical CC certificate. Federal buyers should verify the exact certificate number, authorization boundary, and firmware / software train on the relevant compliance registry before downselecting.

How do NAC licensing models compare — per-endpoint, unlimited, or subscription?

Cisco ISE uses a combination of Base (device admin or Meraki-managed switches), Essentials, Advantage, and Premier licenses — historically per-endpoint, currently migrating toward the Cisco Networking Subscription platform-license model. HPE Aruba ClearPass uses a per-endpoint Access, OnGuard, Guest, and Onboard licensing model with a concurrent-endpoints count — endpoints check out a license on authentication. Fortinet FortiNAC uses a concurrent-endpoint licensing model with Base and Plus tiers.

Juniper Mist Access Assurance uses a subscription model scaled against concurrent client count averaged over a 7-day rolling window, per the Mist Access Assurance FAQ. The operationally meaningful question is license-pool headroom under refresh-cycle device churn — how many endpoint certificates are simultaneously held versus active. Budget 20–30% headroom above peak concurrent active count to avoid license exhaustion during device refresh windows.

Primary Sources Cited on This Page

Citations are grouped by vendor for direct verification. If any specification on this page does not match the current vendor document, the vendor document takes precedence — please report the discrepancy to the WiFi Hotshots engineering team.

Cisco Identity Services Engine 3.4

HPE Aruba Networking ClearPass Policy Manager 6.12

Forescout 4D Platform (eyeSight / eyeControl / eyeSegment)

Juniper Mist Access Assurance

Buying an Access Architecture, Not a Feature Matrix

A comparison table is a starting point. The right NAC platform for a 40,000-endpoint hospital system with IoMT and OT is not the right NAC platform for a 12,000-student higher-education campus is not the right NAC platform for a federal-civilian agency with a FedRAMP Moderate mandate. Send switch inventory, endpoint count, identity-source topology, and compliance scope — WiFi Hotshots returns a fixed-fee SOW that picks the platform based on fit.