O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Following a Phased Deployment

One of the most common mistakes that you can make in any 802.1X deployment is to perform a quick and incomplete proof of concept and then deploy too much technology, too fast. There is so much power that can be enabled in a Secure Access deployment. More often than not an organization will attempt the deployment all at once, instead of deploying the technology in more manageable portions.

This chapter examines deployment concepts, and discusses a framework that will allow you to deploy Secure Access in a manageable way, with little to no impact on the end users. This chapter provides an overview of the phases of deploying the Secure Access solution. The details and configuration involved in each phase ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required