Book description
Plan and deploy identity-based secure access for BYOD and borderless networks
Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.
Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.
You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.
Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.
Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT
Understand the building blocks of an Identity Services Engine (ISE) solution
Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout
Build context-aware security policies
Configure device profiling, endpoint posture assessments, and guest services
Implement secure guest lifecycle management, from WebAuth to sponsored guest access
Configure ISE, network access devices, and supplicants, step-by-step
Walk through a phased deployment that ensures zero downtime
Apply best practices to avoid the pitfalls of BYOD secure access
Simplify administration with self-service onboarding and registration
Deploy Security Group Access, Cisco’s tagging enforcement solution
Add Layer 2 encryption to secure traffic flows
Use Network Edge Access Topology to extend secure access beyond the wiring closet
Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system
Table of contents
- About This eBook
- Title Page
- Copyright Page
- About the Authors
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Command Syntax Conventions
- Introduction
- Section I: The Evolution of Identity Enabled Networks
- Section II: The Blueprint, Designing an ISE Enabled Network
-
Section III: The Foundation, Building a Context-Aware Security Policy
-
Chapter 6. Building a Cisco ISE Network Access Security Policy
- What Makes Up a Cisco ISE Network Access Security Policy?
- Involving the Right People in the Creation of the Network Access Security Policy
- Determining the High-Level Goals for Network Access Security
- Common High-Level Network Access Security Goals
- Defining the Security Domains
- Understanding and Defining ISE Authorization Rules
- Establishing Acceptable Use Policies
- Defining Network Access Privileges
- Summary
- Chapter 7. Building a Device Security Policy
- Chapter 8. Building an ISE Accounting and Auditing Policy
-
Chapter 6. Building a Cisco ISE Network Access Security Policy
-
Section IV: Configuration
- Chapter 9. The Basics: Principal Configuration Tasks for Cisco ISE
- Chapter 10. Profiling Basics
- Chapter 11. Bootstrapping Network Access Devices
- Chapter 12. Authorization Policy Elements
- Chapter 13. Authentication and Authorization Policies
- Chapter 14. Guest Lifecycle Management
-
Chapter 15. Device Posture Assessment
- ISE Posture Assessment Flow
- Configure Global Posture and Client Provisioning Settings
- Configure the NAC Agent and NAC Client Provisioning Settings
- Configure Posture Conditions
- Configure Posture Remediation
- Configure Posture Requirements
- Configure Posture Policy
- Enabling Posture Assessment in the Network
- Summary
- Chapter 16. Supplicant Configuration
- Chapter 17. BYOD: Self-Service Onboarding and Registration
- Chapter 18. Setting Up a Distributed Deployment
- Chapter 19. Inline Posture Node
- Section V: Deployment Best Practices
- Section VI: Advanced Secure Unified Access Features
- Section VII: Monitoring, Maintenance, and Troubleshooting
- Appendix A. Sample User Community Deployment Messaging Material
- Appendix B. Sample ISE Deployment Questionnaire
- Appendix C. Configuring the Microsoft CA for BYOD
- Appendix D. Using a Cisco IOS Certificate Authority for BYOD Onboarding
- Appendix E. Sample Switch Configurations
- Index
Product information
- Title: Cisco ISE for BYOD and Secure Unified Access
- Author(s):
- Release date: June 2013
- Publisher(s): Cisco Press
- ISBN: 9780133103632
You might also like
book
Cisco ISE for BYOD and Secure Unified Access, 2nd Edition
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture …
book
Network Security with pfSense
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid …
book
Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity …
book
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give …