Skip to product information
1 of 1
Regular price £42.79 GBP
Regular price £54.99 GBP Sale price £42.79 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Practical Deployment of Cisco Identity Services Engine (ISE)
Real-World Examples of AAA Deployments

ISE can be hard—Andy Richter and Jeremy Wood share their expertise and real-world examples of how to make it work for you

Andy Richter (Author), Jeremy Wood (Author)

9780128044575, Elsevier Science

Paperback, published 27 November 2015

298 pages
23.5 x 19 x 2 cm, 0.57 kg

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments.

ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

  1. Intro
  2. ISE Clustering and Basic Setup
  3. ISE Authentication Methods
  4. ISE Policy Elements
  5. Authentication
  6. Authorization
  7. Network Access Device Configuration
  8. ISE Profiling
  9. ISE Portals and Guest Access
  10. Deployment Strategies
  11. ISE Policy Design Practices
  12. Corporate Authentication Designs
  13. BYOD Designs
  14. ISE Posture Assessment
  15. VPN Integrations
  16. ISE Reporting and Logging
  17. ISE CLI

Subject Areas: Computer networking & communications [UT], Computer security [UR]

View full details