000 05035cam a2200469Mi 4500
001 ocn935679899
003 OCoLC
005 20190719103201.0
006 m o d
007 cr |||||||||||
008 151119s2015 mau o 000 0 eng d
040 _aNLE
_beng
_erda
_epn
_cNLE
_dOCLCO
_dOPELS
_dOCLCF
_dEBLCP
_dTEFOD
_dMERUC
_dIDB
_dOCLCQ
_dU3W
_dWRM
_dD6H
_dOCLCQ
_dWYU
_dCUY
_dZCU
_dICG
_dDKC
019 _a936863097
020 _a9780128045046
_q(electronic bk.)
020 _a0128045043
_q(electronic bk.)
020 _z9780128044575
_q(pbk.)
035 _a(OCoLC)935679899
_z(OCoLC)936863097
050 4 _aTK5105.59
082 0 4 _a005.8
_223
100 1 _aRichter, Andy,
_eauthor.
245 1 0 _aPractical deployment of Cisco Identity Services Engine (ISE) :
_breal-world examples of AAA deployments /
_cAndy Richter, Jeremy Wood.
264 1 _aRockland :
_bSyngress,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aCIP data; item not viewed.
520 _aWith the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
505 0 _aCover; Title Page; Copyright Page; Contents; Acknowledgments; Chapter 1 -- Introduction; Chapter 2 -- ISE Clustering and Basic Setup; Introduction; Sizing and preparation; Server/node deployment; Certificates; Cluster configuration; Replication optimization; Licensing; Patching; Backups; Active directory; Chapter 3 -- Authentication Methods; Chapter 4 -- Policy Elements; Breakdown of compound condition; Chapter 5 -- Authentication; Chapter 6 -- Authorization; Chapter 7 -- Network Access Device Configuration; Wired; Wireless; Chapter 8 -- ISE Profiling; Introduction; Setting Up Profiling.
505 8 _aProfiling basicsProfiling custom devices; Example AuthZ; Device example-iPhone; Chapter 9 -- ISE Portals and Guest Access; Introduction; Portal overview; Guest portal types; Hotspot Portal; Self-Registered Portal; Sponsored Guest Portal; Guest types; Sponsor setup; Sponsor Groups; Device portals; Global guest settings; Making portal modifications; Scenarios; Hotspot Portal; Guest Portal AuthZ Rules; Configuring Sponsors; Chapter 10 -- Deployment Strategies; Wireless; Chapter 11 -- ISE Policy Design Practices; Chapter 12 -- Corporate Authentication Designs; PEAP machine-only authentication.
505 8 _aX509 AuthenticationChapter 13 -- BYOD Designs; User PEAP; BYOD EAP-TLS; Web authentication for BYOD access; Chapter 14 -- ISE Posture Assessment; Introduction; Posture basics; Required AuthZ components; Client provisioning; Posture rules; Conditions; Remediation; Requirements; Posture policy; Examples; Basic Company Posture; Patch Checking; Chapter 15 -- VPN Integrations; Posture; Chapter 16 -- ISE Reporting and Logging; Introduction; Reporting; Logging; Monitoring; Examples; Send Events to Remote Servers; Identity Firewall with Context Directory Agent; Set Up a Remote Syslog Server.
505 8 _aConfiguring RsyslogConfiguring Elasticsearch; Configuring Kibana; Chapter 17 -- ISE CLI; Introduction; ADE-OS-what is it?; Manipulating output; Show commands; Logging; Changing time zones; Application commands; Other tools; Examples; Getting Tech Support Info; Create Another Admin; Chapter 18 -- ISE Administration; Authenticating to ISE; RBAC; API; Monitoring REST API; External restful API; pxGRID; Subject Index; Back Cover.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputers
_xAccess control.
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputers
_xAccess control.
_2fast
_0(OCoLC)fst00872779
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
700 1 _aWood, Jeremy,
_eauthor.
776 0 8 _iPrint version:
_z9780128044575
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128044575
999 _c503790
_d503725