O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 22. Low-Impact Mode

As previously described in Chapter 20, “Deployment Phases,” Low-Impact Mode is one of the end-state choices for your deployment. Closed Mode is the other final stage. There is no specific best practice for which mode is better to deploy; it entirely depends on your organization and its specific needs.

Figure 22-1 shows the operational flow intended for Low-Impact Mode. This mode is one of the two possible end-states (closed mode being the second) and, as such, specific access may be provide per user, device, or other condition that you want to use in the ISE Authorization Policies. Remember, the end goal of Low-Impact Mode is to provide limited network access to devices without authentication, and then provide specific ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required