Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments / Andy Richter, Jeremy Wood.

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access cont...

Full description

Saved in:
Bibliographic Details
Main Authors: Richter, Andy (Author), Wood, Jeremy (Author)
Format: eBook
Language:English
Published: Rockland : Syngress, 2015.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Cover; Title Page; Copyright Page; Contents; Acknowledgments; Chapter 1
  • Introduction; Chapter 2
  • ISE Clustering and Basic Setup; Introduction; Sizing and preparation; Server/node deployment; Certificates; Cluster configuration; Replication optimization; Licensing; Patching; Backups; Active directory; Chapter 3
  • Authentication Methods; Chapter 4
  • Policy Elements; Breakdown of compound condition; Chapter 5
  • Authentication; Chapter 6
  • Authorization; Chapter 7
  • Network Access Device Configuration; Wired; Wireless; Chapter 8
  • ISE Profiling; Introduction; Setting Up Profiling.
  • Profiling basicsProfiling custom devices; Example AuthZ; Device example-iPhone; Chapter 9
  • ISE Portals and Guest Access; Introduction; Portal overview; Guest portal types; Hotspot Portal; Self-Registered Portal; Sponsored Guest Portal; Guest types; Sponsor setup; Sponsor Groups; Device portals; Global guest settings; Making portal modifications; Scenarios; Hotspot Portal; Guest Portal AuthZ Rules; Configuring Sponsors; Chapter 10
  • Deployment Strategies; Wireless; Chapter 11
  • ISE Policy Design Practices; Chapter 12
  • Corporate Authentication Designs; PEAP machine-only authentication.
  • X509 AuthenticationChapter 13
  • BYOD Designs; User PEAP; BYOD EAP-TLS; Web authentication for BYOD access; Chapter 14
  • ISE Posture Assessment; Introduction; Posture basics; Required AuthZ components; Client provisioning; Posture rules; Conditions; Remediation; Requirements; Posture policy; Examples; Basic Company Posture; Patch Checking; Chapter 15
  • VPN Integrations; Posture; Chapter 16
  • ISE Reporting and Logging; Introduction; Reporting; Logging; Monitoring; Examples; Send Events to Remote Servers; Identity Firewall with Context Directory Agent; Set Up a Remote Syslog Server.
  • Configuring RsyslogConfiguring Elasticsearch; Configuring Kibana; Chapter 17
  • ISE CLI; Introduction; ADE-OS-what is it?; Manipulating output; Show commands; Logging; Changing time zones; Application commands; Other tools; Examples; Getting Tech Support Info; Create Another Admin; Chapter 18
  • ISE Administration; Authenticating to ISE; RBAC; API; Monitoring REST API; External restful API; pxGRID; Subject Index; Back Cover.