Loading…

Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /

Sharing their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments, the authors of this book shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Authors: Richter, Andy (Author), Wood, Jeremy (Author)
Format: Electronic eBook
Language:Inglés
Published: Waltham, MA : Syngress, [2016]
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Machine generated contents note: 1.Introduction
  • 2.ISE Clustering and Basic Setup
  • Introduction
  • Sizing and Preparation
  • Server/node Deployment
  • Certificates
  • Cluster Configuration
  • Replication Optimization
  • Licensing
  • Patching
  • Backups
  • Active Directory
  • 3.Authentication Methods
  • 4.Policy Elements
  • Breakdown of Compound Condition
  • 5.Authentication
  • 6.Authorization
  • 7.Network Access Device Configuration
  • Wired
  • Wireless
  • 8.ISE Profiling
  • Introduction
  • Setting Up Profiling
  • Profiling Basics
  • Profiling Custom Devices
  • Example AuthZ
  • Device Example
  • iPhone
  • 9.ISE Portals and Guest Access
  • Introduction
  • Portal Overview
  • Guest Portal Types
  • Guest Types
  • Sponsor Setup
  • Device Portals
  • Global Guest Settings
  • Making Portal Modifications
  • Scenarios
  • 10.Deployment Strategies
  • Wireless
  • 11.ISE Policy Design Practices
  • 12.Corporate Authentication Designs
  • PEAP Machine-only Authentication
  • 13.BYOD Designs
  • Note continued: User PEAP
  • BYOD EAP-TLS
  • Web Authentication for BYOD Access
  • 14.ISE Posture Assessment
  • Introduction
  • Posture Basics
  • Required AuthZ Components
  • Client Provisioning
  • Posture Rules
  • Conditions
  • Remediation
  • Requirements
  • Posture Policy
  • Examples
  • 15.VPN Integrations
  • Posture
  • 16.ISE Reporting and Logging
  • Introduction
  • Reporting
  • Logging
  • Monitoring
  • Examples
  • 17.ISE CLI
  • Introduction
  • ADE-OS
  • What Is It?
  • Manipulating Output
  • Show Commands
  • Logging
  • Changing Time Zones
  • Application Commands
  • Other Tools
  • Examples
  • 18.ISE Administration
  • Authenticating to ISE
  • RBAC
  • API
  • Monitoring Rest API
  • External Restful API
  • pxGrid.