O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 27. Network Edge Authentication Topology

A friend of ours, Chuck Parker, is a systems engineer at Cisco who was responsible for one of the largest deployments of 802.1X in the world. Chuck has this wonderful expression that I want to share with you: “When it comes to network security, if it’s not everywhere, it’s nowhere.”

Let’s look at a specific example of a business problem: conference room network access. Most conference rooms have few network drops in them, where a guest or an employee may be able to plug in and gain access to the network or the Internet. These conference rooms may often need more connections than exist. If wireless is not an option, how does a company securely permit this access? Many organizations would want to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required