Chapter 19

Deploying Safely

This chapter covers the following topic:

Throughout this book, you have seen quite a bit of configuration detail about ISE and about network access devices. You have explored the technical merit of policy creation, guest lifecycle management, posture assessment, and much more. There is obviously a great deal to consider when you deploy a system such as this one; it is not something you can just enable overnight by flipping a switch.

This chapter focuses on the recommended approach to deploying not only ISE but also a full secure network access system. It reviews some of the challenges that were common in the past and why certain technologies were enhanced ...

Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.