This chapter covers the following topic:
Throughout this book, you have seen quite a bit of configuration detail about ISE and about network access devices. You have explored the technical merit of policy creation, guest lifecycle management, posture assessment, and much more. There is obviously a great deal to consider when you deploy a system such as this one; it is not something you can just enable overnight by flipping a switch.
This chapter focuses on the recommended approach to deploying not only ISE but also a full secure network access system. It reviews some of the challenges that were common in the past and why certain technologies were enhanced ...