O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Bootstrapping Network Access Devices

I don’t know about you, but when I go to put on my boots, I have to grab the bootstraps in order to pull the boots onto my feet. I can’t wear them, or even begin to lace them up, without first pulling them on. So, “bootstrapping” is a critical step for me to be successful in wearing my chosen boots. This is where the metaphor “bootstrapping” came from. In the present context, it refers to configuring a device to work with Cisco ISE and the Secure Unified Access System. Before end users attempt to connect their devices to the network and have them be authenticated, the network access device (NAD) must be configured to authenticate those devices.

Two NAD types that are examined in this chapter, Cisco ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required