O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Building a Cisco ISE Network Access Security Policy

In order for any network-centric security solution to be successful, a solid network access security policy (NASP) must first be employed. Once a policy is in place, ISE will enforce the policy network wide. A network access security policy defines, in as much detail as is practical, the type of network access that will be given to users and device types. Because network and device security threats are constantly changing, a network access security policy must also be a living, changeable document. This book does not attempt to assemble an all-encompassing network access security policy; instead, it focuses on showing you how to build policies that are relevant to the Cisco ISE solution. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required