Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
- By Aaron Woland, Vivek Santuka, Chad Mitchell, Jamie Sanbower
- Published Apr 6, 2019 by Cisco Press. Part of the CCIE Professional Development series.
Best Value Purchase
Book + eBook Bundle
- Your Price: $86.39
- List Price: $143.98
- Includes EPUB and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Individual Purchases
eBook (Watermarked)
- Your Price: $51.19
- List Price: $63.99
- Includes EPUB and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Features
- Second of two volumes: Volume 2 focuses on identity, context sharing, encryption, secure connectivity and virtualization security
- Discover how ACS, ISE, pxGrid, WSA, FMC, WLC, ASA/FTD, ACI, APIC-EM, VSG, and related technologies integrate, and help you safeguard your network
- Includes verification and troubleshooting sections for each topic, designed specifically to help you prepare for the CCIE Security lab exam
- Copyright 2019
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 688
- Edition: 1st
- Book
- ISBN-10: 1-58714-707-6
- ISBN-13: 978-1-58714-707-4
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization
Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams.
Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions.
Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.
- Review the essentials of Authentication, Authorization, and Accounting (AAA)
- Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them
- Enforce basic network access control with the Cisco Identity Services Engine (ISE)
- Implement sophisticated ISE profiling, EzConnect, and Passive Identity features
- Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services
- Safely share context with ISE, and implement pxGrid and Rapid Threat Containment
- Integrate ISE with Cisco FMC, WSA, and other devices
- Leverage Cisco Security APIs to increase control and flexibility
- Review Virtual Private Network (VPN) concepts and types
- Understand and deploy Infrastructure VPNs and Remote Access VPNs
- Virtualize leading Cisco Security products
- Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
Online Sample Chapter
Sample Pages
Download the sample pages (includes Chapter 6)
Table of Contents
- Part I: Knock, Knock! Who's There?
- 1. Who and What - AAA Basics
- 2. Network Access
- 3. Extending Network Access
- 4. pxGrid with the Identity Services Engine
- 5. Device Administration
- Part II:
- 6. Secure Connectivity
- Part III: The Red Pill
- 7. Virtualization and Automation
Errata
We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.
Submit Errata
- Request an Instructor or Media review copy.
- Corporate, Academic, and Employee Purchases
- International Buying Options
Other Things You Might Like
- CCIE Enterprise Infrastructure Foundation, 2nd Edition
- eBook (Watermarked) $95.99