Library Logo

Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments / (Record no. 247276)

000 -LEADER
fixed length control field 05058cam a2200469Mi 4500
001 - CONTROL NUMBER
control field ocn935679899
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114814.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151119s2015 mau o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency NLE
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency NLE
Modifying agency OCLCO
-- OPELS
-- OCLCF
-- EBLCP
-- TEFOD
-- MERUC
-- IDB
-- OCLCQ
-- U3W
-- WRM
-- D6H
-- OCLCQ
-- WYU
-- CUY
-- ZCU
-- ICG
-- DKC
019 ## -
-- 936863097
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128045046
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128045043
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128044575
Qualifying information (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)935679899
Canceled/invalid control number (OCoLC)936863097
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Richter, Andy,
Relator term author.
245 10 - TITLE STATEMENT
Title Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /
Medium [electronic resource]
Statement of responsibility, etc. Andy Richter, Jeremy Wood.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Rockland :
Name of producer, publisher, distributor, manufacturer Syngress,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note CIP data; item not viewed.
520 ## - SUMMARY, ETC.
Summary, etc. With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title Page; Copyright Page; Contents; Acknowledgments; Chapter 1 -- Introduction; Chapter 2 -- ISE Clustering and Basic Setup; Introduction; Sizing and preparation; Server/node deployment; Certificates; Cluster configuration; Replication optimization; Licensing; Patching; Backups; Active directory; Chapter 3 -- Authentication Methods; Chapter 4 -- Policy Elements; Breakdown of compound condition; Chapter 5 -- Authentication; Chapter 6 -- Authorization; Chapter 7 -- Network Access Device Configuration; Wired; Wireless; Chapter 8 -- ISE Profiling; Introduction; Setting Up Profiling.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Profiling basicsProfiling custom devices; Example AuthZ; Device example-iPhone; Chapter 9 -- ISE Portals and Guest Access; Introduction; Portal overview; Guest portal types; Hotspot Portal; Self-Registered Portal; Sponsored Guest Portal; Guest types; Sponsor setup; Sponsor Groups; Device portals; Global guest settings; Making portal modifications; Scenarios; Hotspot Portal; Guest Portal AuthZ Rules; Configuring Sponsors; Chapter 10 -- Deployment Strategies; Wireless; Chapter 11 -- ISE Policy Design Practices; Chapter 12 -- Corporate Authentication Designs; PEAP machine-only authentication.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note X509 AuthenticationChapter 13 -- BYOD Designs; User PEAP; BYOD EAP-TLS; Web authentication for BYOD access; Chapter 14 -- ISE Posture Assessment; Introduction; Posture basics; Required AuthZ components; Client provisioning; Posture rules; Conditions; Remediation; Requirements; Posture policy; Examples; Basic Company Posture; Patch Checking; Chapter 15 -- VPN Integrations; Posture; Chapter 16 -- ISE Reporting and Logging; Introduction; Reporting; Logging; Monitoring; Examples; Send Events to Remote Servers; Identity Firewall with Context Directory Agent; Set Up a Remote Syslog Server.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Configuring RsyslogConfiguring Elasticsearch; Configuring Kibana; Chapter 17 -- ISE CLI; Introduction; ADE-OS-what is it?; Manipulating output; Show commands; Logging; Changing time zones; Application commands; Other tools; Examples; Getting Tech Support Info; Create Another Admin; Chapter 18 -- ISE Administration; Authenticating to ISE; RBAC; API; Monitoring REST API; External restful API; pxGRID; Subject Index; Back Cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
Source of heading or term fast
Authority record control number (OCoLC)fst00872779
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcgft
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wood, Jeremy,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9780128044575
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128044575

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login