TY - BOOK AU - Richter,Andy AU - Wood,Jeremy TI - Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments SN - 9780128045046 AV - TK5105.59 U1 - 005.8 PY - 2015/// CY - Rockland, MA PB - Elsevier Science & Technology Books KW - Computer networks--Security measures KW - Computers--Access control KW - Electronic books N1 - Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Chapter 1 - Introduction -- Chapter 2 - ISE Clustering and Basic Setup -- Introduction -- Sizing and preparation -- Server/node deployment -- Certificates -- Cluster configuration -- Replication optimization -- Licensing -- Patching -- Backups -- Active directory -- Chapter 3 - Authentication Methods -- Chapter 4 - Policy Elements -- Breakdown of compound condition -- Chapter 5 - Authentication -- Chapter 6 - Authorization -- Chapter 7 - Network Access Device Configuration -- Wired -- Wireless -- Chapter 8 - ISE Profiling -- Introduction -- Setting Up Profiling -- Profiling basics -- Profiling custom devices -- Example AuthZ -- Device example-iPhone -- Chapter 9 - ISE Portals and Guest Access -- Introduction -- Portal overview -- Guest portal types -- Hotspot Portal -- Self-Registered Portal -- Sponsored Guest Portal -- Guest types -- Sponsor setup -- Sponsor Groups -- Device portals -- Global guest settings -- Making portal modifications -- Scenarios -- Hotspot Portal -- Guest Portal AuthZ Rules -- Configuring Sponsors -- Chapter 10 - Deployment Strategies -- Wireless -- Chapter 11 - ISE Policy Design Practices -- Chapter 12 - Corporate Authentication Designs -- PEAP machine-only authentication -- X509 Authentication -- Chapter 13 - BYOD Designs -- User PEAP -- BYOD EAP-TLS -- Web authentication for BYOD access -- Chapter 14 - ISE Posture Assessment -- Introduction -- Posture basics -- Required AuthZ components -- Client provisioning -- Posture rules -- Conditions -- Remediation -- Requirements -- Posture policy -- Examples -- Basic Company Posture -- Patch Checking -- Chapter 15 - VPN Integrations -- Posture -- Chapter 16 - ISE Reporting and Logging -- Introduction -- Reporting -- Logging -- Monitoring -- Examples -- Send Events to Remote Servers; Identity Firewall with Context Directory Agent -- Set Up a Remote Syslog Server -- Configuring Rsyslog -- Configuring Elasticsearch -- Configuring Kibana -- Chapter 17 - ISE CLI -- Introduction -- ADE-OS-what is it? -- Manipulating output -- Show commands -- Logging -- Changing time zones -- Application commands -- Other tools -- Examples -- Getting Tech Support Info -- Create Another Admin -- Chapter 18 - ISE Administration -- Authenticating to ISE -- RBAC -- API -- Monitoring REST API -- External restful API -- pxGRID -- Subject Index -- Back Cover UR - https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4092862 ER -