Cargando…

Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /

Sharing their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments, the authors of this book shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Richter, Andy (Autor), Wood, Jeremy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn932214570
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 151215s2016 maua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d COO  |d DEBBG  |d DEBSZ  |d CEF  |d OCLCQ  |d AU@  |d UAB  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 966398033 
020 |a 9780128045046 
020 |a 0128045043 
020 |a 0128044578 
020 |a 9780128044575 
020 |z 9780128044575 
029 1 |a AU@  |b 000056972395 
029 1 |a DEBBG  |b BV043968419 
029 1 |a DEBSZ  |b 485789183 
029 1 |a GBVCP  |b 88274965X 
035 |a (OCoLC)932214570  |z (OCoLC)966398033 
037 |a CL0500000689  |b Safari Books Online 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Richter, Andy,  |e author. 
245 1 0 |a Practical deployment of Cisco Identity Services Engine (ISE) :  |b real-world examples of AAA deployments /  |c Andy Richter, Jeremy Wood. 
264 1 |a Waltham, MA :  |b Syngress,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (viii, 290 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (viewed December 14, 2015). 
504 |a Includes bibliographical references and index. 
520 |a Sharing their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments, the authors of this book shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. --  |c Edited summary from book. 
505 0 |a Machine generated contents note: 1.Introduction -- 2.ISE Clustering and Basic Setup -- Introduction -- Sizing and Preparation -- Server/node Deployment -- Certificates -- Cluster Configuration -- Replication Optimization -- Licensing -- Patching -- Backups -- Active Directory -- 3.Authentication Methods -- 4.Policy Elements -- Breakdown of Compound Condition -- 5.Authentication -- 6.Authorization -- 7.Network Access Device Configuration -- Wired -- Wireless -- 8.ISE Profiling -- Introduction -- Setting Up Profiling -- Profiling Basics -- Profiling Custom Devices -- Example AuthZ -- Device Example -- iPhone -- 9.ISE Portals and Guest Access -- Introduction -- Portal Overview -- Guest Portal Types -- Guest Types -- Sponsor Setup -- Device Portals -- Global Guest Settings -- Making Portal Modifications -- Scenarios -- 10.Deployment Strategies -- Wireless -- 11.ISE Policy Design Practices -- 12.Corporate Authentication Designs -- PEAP Machine-only Authentication -- 13.BYOD Designs 
505 0 |a Note continued: User PEAP -- BYOD EAP-TLS -- Web Authentication for BYOD Access -- 14.ISE Posture Assessment -- Introduction -- Posture Basics -- Required AuthZ Components -- Client Provisioning -- Posture Rules -- Conditions -- Remediation -- Requirements -- Posture Policy -- Examples -- 15.VPN Integrations -- Posture -- 16.ISE Reporting and Logging -- Introduction -- Reporting -- Logging -- Monitoring -- Examples -- 17.ISE CLI -- Introduction -- ADE-OS -- What Is It? -- Manipulating Output -- Show Commands -- Logging -- Changing Time Zones -- Application Commands -- Other Tools -- Examples -- 18.ISE Administration -- Authenticating to ISE -- RBAC -- API -- Monitoring Rest API -- External Restful API -- pxGrid. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Wood, Jeremy,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128045046/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP