O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access, 2nd Edition by Jamey Heary, Aaron Woland

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8 Building a Device Security Policy

This chapter covers the following topics:

Image ISE device profiling

Image Threat-Centric NAC

Cisco Identity Services Engine takes into account the security of the individual devices when determining which network access control policy to invoke. Chapter 7, “Building a Cisco ISE Network Access Security Policy,” discussed the creation of a network access security policy (NASP), part of which took into account the device’s security posture. Device posture assessment is one of several tools that Cisco ISE can use to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required