What is included with this book?
Plan and deploy identity-based secure access for BYOD and borderless networks
Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.
Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.
You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.
Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.
Aaron Woland , CCIE No. 20113, is a Senior Secure Access Engineer at Cisco Systems and works with Cisco’s largest customers all over the world. His primary job responsibilities include secure access and ISE deployments, solution enhancements, futures, and escalations. Aaron joined Cisco in 2005 and is currently a member of numerous security advisory boards. Prior to joining Cisco, he spent 12 years as a consultant and technical trainer. His areas of expertise include network and host security architecture and implementation, regulatory compliance, and routing and switching. Aaron is the author of many white papers and design guides, including the TrustSec 2.0 Design and Implementation Guide and the NAC Layer 3 OOB Using VRFs for Traffic Isolation design guide. He is also a distinguished speaker at Cisco Live for topics related to identity and is a security columnist for Network World , where he blogs on all things related to identity. Additional certifications include CCSP, CCNP, CCDP, Certified Ethical Hacker, MCSE, and many other industry certifications.
Jamey Heary , CCIE No. 7680, is a Distinguished Systems Engineer at Cisco Systems, where he works as a trusted security advisor to Cisco customers and business groups. He is also a featured security columnist for Network World , where he blogs on all things security. Jamey sits on the PCI Security Standards Council-Board of Advisors, where he provides strategic and technical guidance for future PCI standards. Jamey is the author of Cisco NAC Appliance: Enforcing Host Security with Clean Access . He also has a patent pending on a new DDoS mitigation technique. Jamey sits on numerous security advisory boards for Cisco Systems and is a founding member of the Colorado Healthcare InfoSec Users Group. His other certifications include CISSP, and he is a Certified HIPAA Security Professional. He has been working in the IT field for 19 years and in IT security for 15 years.
Section I. The Evolution of Identity Enabled Networks
1. The Evolution of Network Access
2. Introducing Cisco TrustSec and the Identity Services Engine
Section II. The Blueprint, Designing a TrustSec Enabled Network
3. What are the building blocks in TrustSec Design?
4. Making Sense of all the ISE Design Options
5. Navigating the Deployment Phases of TrustSec
Section III. The Foundation, Building a Context-Aware Security Policy
6. Creating Authentication and Authorization Policies
7. Building a Device Security Policy
8. Building an Accounting and Audit Policy
Section IV. Configuration
9. The Basics. Principal Configuration Tasks for ISE
10. Profiling Configuration
11. Bootstrapping Network Access Devices
12. The Building Blocks. Roles and Authorization Results
13. Authentication and Authorization Policies
14. Guest Lifecycle Management
15. Device Posture Assessments
16. Supplicant Configuration
17. Setting up a Distributed ISE Deployment
18. Configuring an Inline Posture Node
Section V. Deployment Best Practices
19. TrustSec Deployment Phases
20. Monitor Mode Deployment
21. Authenticated Mode
22. Enforcement Mode
23. Closed Mode
Section VI. Advanced TrustSec Features
24. Secure Group Access
25. 802.1AE MACSec
26. Network Device Access Control
27. Network Edge Access Topology
Section VII. Monitoring, Maintenance, and Troubleshooting
28. Understanding Monitoring and Alerting
30. Backup, Upgrading
Appendix A. Device Security Policy Template
Appendix B. Authentication and Authorization Policy Template
Appendix C. Sample User Community Deployment Me
Appendix D. Sample ISE Deployment Project Plan