This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Plan and deploy identity-based secure access for BYOD and borderless networks
Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.
Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.
Section I: Identity Enabled Network: Unite!
Chapter 1: Fundamentals of AAA
Chapter 2: The Evolution of Network Access (10pgs)
Chapter 3: Introducing Cisco Secure Access and the Identity Services Engine (6pgs)
Section II: The Blueprint, Designing an ISE Enabled Network – 30 Pages
Chapter 3: What are the building blocks in ISE Design? (10pgs)
Chapter 4: Making Sense of all the ISE Design Options (15pgs)
Chapter 5: The Basics: Principal Configuration Tasks for ISE (30pgs)
Section III: The Foundation, Building a Context-Aware Security Policy – 30 Pages
Chapter 6: Creating Authentication and Authorization Policies (10pgs)
Chapter 7: Building a Device Security Policy (10pgs)
Chapter 8: Building an Accounting and Audit Policy (10pgs)
Section IV: Let's Configure! – 300 Pages
Chapter 9: Profiling Basics and Initial Configuration (20 pgs)
Chapter 10: Bootstrapping Network Access Devices (40pgs)
Chapter 11: The Building Blocks: Roles and Authorization Results (15pgs)
Chapter 12: Authentication and Authorization Policies (30pgs)
Chapter 13: Guest Lifecycle Management (60pgs)
Chapter 14: Device Posture Assessments (10pgs)
Chapter 15: Supplicant Configuration (20pgs)
Chapter 16: BYOD: Self Service Onboarding and Registration (40)
Chapter 17: Setting up a Distributed ISE Deployment (10 pgs)
Chapter 18: Remote Access VPN with ASA and Cisco ISE (15)
Chapter 19: Deploying in Phases (50pgs)
Section V: Advanced Secure Access Features – 50 Pages
Chapter 20: Advanced Profiling Configuration (15pgs)
Chapter 21: Cisco TrustSec AKA:Security Group Access (25pgs)
Chapter 22: High Availability & Disaster Scenarios
Chapter 23: ISE Ecosystems: the platform exchange Grid (pxGrid)
Section VI: Monitoring, Maintenance, and Troubleshooting for Network Access AAA – 50 Pages
Chapter 24: Understanding Monitoring and Alerting (20pgs)
Chapter 25: Troubleshooting (25pgs)
Chapter 26: Backup, Upgrading (15pgs)
Section VII: Device Administration – 100 Pages
Chapter 27: Device Admin AAA Fundamentals & Design (20pgs)
Chapter 28: Configuring Device Admin AAA with Cisco IOS (25pgs)
Chapter 29: Configuring Device Admin AAA with Cisco WLC (25pgs)
Chapter 30: Device Admin AAA with Cisco NX-OS (10pgs)
Chapter 31: Device Admin AAA with Cisco FirePower Manager (15pgs)
Appendix A: Sample User Community Deployment Messaging Material (7pgs)
Appendix B: Sample ISE Deployment Project Plan (5pgs)
Appendix C: Sample Switch Configurations