Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments

  • 4h 29m
  • Andy Richter, Jeremy Wood
  • Elsevier Science and Technology Books, Inc.
  • 2016

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments.

ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

About the Authors

Andy Richter is an information security consultant with years in the field. He is one of the leading experts in implementing and configuring ISE successfully in many enterprises and environments and has been providing clients with his expertise on Cisco ISE since the launch of the product.

Jeremy Wood is the Security and Data Center Engineer at Norwich University in Northfield, VT. He has been with the university since graduation in 2007 and holds a BS in Computer Security and Information Assurance. He is responsible for the university's Cisco NAC and current ISE environments, including all wired, wireless and VPN connectivity.

In this Book

  • Introduction
  • ISE Clustering and Basic Setup
  • Authentication Methods
  • Policy Elements
  • Authentication
  • Authorization
  • Network Access Device Configuration
  • ISE Profiling
  • ISE Portals and Guest Access
  • Deployment Strategies
  • ISE Policy Design Practices
  • Corporate Authentication Designs
  • BYOD Designs
  • ISE Posture Assessment
  • VPN Integrations
  • ISE Reporting and Logging
  • ISE CLI
  • ISE Administration
SHOW MORE
FREE ACCESS

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)