Chapter 19

Deploying Safely

This chapter covers the following topic:

Throughout this book, you have seen quite a bit of configuration detail about ISE and about network access devices. You have explored the technical merit of policy creation, guest lifecycle management, posture assessment, and much more. There is obviously a great deal to consider when you deploy a system such as this one; it is not something you can just enable overnight by flipping a switch.

This chapter focuses on the recommended approach to deploying not only ISE but also a full secure network access system. It reviews some of the challenges that were common in the past and why certain technologies were enhanced ...

Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.