ORPP logo
Image from Google Jackets

Practical Deployment of Cisco Identity Services Engine (ISE) : Real-World Examples of AAA Deployments.

By: Contributor(s): Material type: TextTextPublisher: Rockland, MA : Elsevier Science & Technology Books, 2015Copyright date: ©2016Edition: 1st edDescription: 1 online resource (300 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128045046
Subject(s): Genre/Form: Additional physical formats: Print version:: Practical Deployment of Cisco Identity Services Engine (ISE)DDC classification:
  • 005.8
LOC classification:
  • TK5105.59
Online resources:
Contents:
Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Chapter 1 - Introduction -- Chapter 2 - ISE Clustering and Basic Setup -- Introduction -- Sizing and preparation -- Server/node deployment -- Certificates -- Cluster configuration -- Replication optimization -- Licensing -- Patching -- Backups -- Active directory -- Chapter 3 - Authentication Methods -- Chapter 4 - Policy Elements -- Breakdown of compound condition -- Chapter 5 - Authentication -- Chapter 6 - Authorization -- Chapter 7 - Network Access Device Configuration -- Wired -- Wireless -- Chapter 8 - ISE Profiling -- Introduction -- Setting Up Profiling -- Profiling basics -- Profiling custom devices -- Example AuthZ -- Device example-iPhone -- Chapter 9 - ISE Portals and Guest Access -- Introduction -- Portal overview -- Guest portal types -- Hotspot Portal -- Self-Registered Portal -- Sponsored Guest Portal -- Guest types -- Sponsor setup -- Sponsor Groups -- Device portals -- Global guest settings -- Making portal modifications -- Scenarios -- Hotspot Portal -- Guest Portal AuthZ Rules -- Configuring Sponsors -- Chapter 10 - Deployment Strategies -- Wireless -- Chapter 11 - ISE Policy Design Practices -- Chapter 12 - Corporate Authentication Designs -- PEAP machine-only authentication -- X509 Authentication -- Chapter 13 - BYOD Designs -- User PEAP -- BYOD EAP-TLS -- Web authentication for BYOD access -- Chapter 14 - ISE Posture Assessment -- Introduction -- Posture basics -- Required AuthZ components -- Client provisioning -- Posture rules -- Conditions -- Remediation -- Requirements -- Posture policy -- Examples -- Basic Company Posture -- Patch Checking -- Chapter 15 - VPN Integrations -- Posture -- Chapter 16 - ISE Reporting and Logging -- Introduction -- Reporting -- Logging -- Monitoring -- Examples -- Send Events to Remote Servers.
Identity Firewall with Context Directory Agent -- Set Up a Remote Syslog Server -- Configuring Rsyslog -- Configuring Elasticsearch -- Configuring Kibana -- Chapter 17 - ISE CLI -- Introduction -- ADE-OS-what is it? -- Manipulating output -- Show commands -- Logging -- Changing time zones -- Application commands -- Other tools -- Examples -- Getting Tech Support Info -- Create Another Admin -- Chapter 18 - ISE Administration -- Authenticating to ISE -- RBAC -- API -- Monitoring REST API -- External restful API -- pxGRID -- Subject Index -- Back Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Chapter 1 - Introduction -- Chapter 2 - ISE Clustering and Basic Setup -- Introduction -- Sizing and preparation -- Server/node deployment -- Certificates -- Cluster configuration -- Replication optimization -- Licensing -- Patching -- Backups -- Active directory -- Chapter 3 - Authentication Methods -- Chapter 4 - Policy Elements -- Breakdown of compound condition -- Chapter 5 - Authentication -- Chapter 6 - Authorization -- Chapter 7 - Network Access Device Configuration -- Wired -- Wireless -- Chapter 8 - ISE Profiling -- Introduction -- Setting Up Profiling -- Profiling basics -- Profiling custom devices -- Example AuthZ -- Device example-iPhone -- Chapter 9 - ISE Portals and Guest Access -- Introduction -- Portal overview -- Guest portal types -- Hotspot Portal -- Self-Registered Portal -- Sponsored Guest Portal -- Guest types -- Sponsor setup -- Sponsor Groups -- Device portals -- Global guest settings -- Making portal modifications -- Scenarios -- Hotspot Portal -- Guest Portal AuthZ Rules -- Configuring Sponsors -- Chapter 10 - Deployment Strategies -- Wireless -- Chapter 11 - ISE Policy Design Practices -- Chapter 12 - Corporate Authentication Designs -- PEAP machine-only authentication -- X509 Authentication -- Chapter 13 - BYOD Designs -- User PEAP -- BYOD EAP-TLS -- Web authentication for BYOD access -- Chapter 14 - ISE Posture Assessment -- Introduction -- Posture basics -- Required AuthZ components -- Client provisioning -- Posture rules -- Conditions -- Remediation -- Requirements -- Posture policy -- Examples -- Basic Company Posture -- Patch Checking -- Chapter 15 - VPN Integrations -- Posture -- Chapter 16 - ISE Reporting and Logging -- Introduction -- Reporting -- Logging -- Monitoring -- Examples -- Send Events to Remote Servers.

Identity Firewall with Context Directory Agent -- Set Up a Remote Syslog Server -- Configuring Rsyslog -- Configuring Elasticsearch -- Configuring Kibana -- Chapter 17 - ISE CLI -- Introduction -- ADE-OS-what is it? -- Manipulating output -- Show commands -- Logging -- Changing time zones -- Application commands -- Other tools -- Examples -- Getting Tech Support Info -- Create Another Admin -- Chapter 18 - ISE Administration -- Authenticating to ISE -- RBAC -- API -- Monitoring REST API -- External restful API -- pxGRID -- Subject Index -- Back Cover.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.