Chapter 5. Following a Phased Deployment
One of the most common mistakes that you can make in any 802.1X deployment is to perform a quick and incomplete proof of concept and then deploy too much technology, too fast. There is so much power that can be enabled in a Secure Access deployment. More often than not an organization will attempt the deployment all at once, instead of deploying the technology in more manageable portions.
This chapter examines deployment concepts, and discusses a framework that will allow you to deploy Secure Access in a manageable way, with little to no impact on the end users. This chapter provides an overview of the phases of deploying the Secure Access solution. The details and configuration involved in each phase ...
Get Cisco ISE for BYOD and Secure Unified Access now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.