Integrated security technologies and solutions, Volume II: Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization

Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration exampl...

Full description

Bibliographic Details
Main Authors: Woland, Aaron T., Santuka, Vivek (Author), Sanbower, Jamie (Author), Mitchell, Chad (Author)
Format: eBook
Language:English
Published: Hoboken, NJ Cisco Press 2019
Series:CCIE professional development
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04062nmm a2200457 u 4500
001 EB001926585
003 EBX01000000000000001089487
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780134807614 
050 4 |a QA76.585 
100 1 |a Woland, Aaron T. 
245 0 0 |a Integrated security technologies and solutions, Volume II: Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization  |c Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell 
246 3 1 |a Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization 
260 |a Hoboken, NJ  |b Cisco Press  |c 2019 
300 |a 1 volume  |b illustrations 
505 0 |a Includes bibliographical references 
653 |a Firewalls (Computer security) / fast 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Coupe-feu (Sécurité informatique) 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Firewalls (Computer security) / http://id.loc.gov/authorities/subjects/sh00006011 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
653 |a Computer Security 
700 1 |a Santuka, Vivek  |e author 
700 1 |a Sanbower, Jamie  |e author 
700 1 |a Mitchell, Chad  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a CCIE professional development 
776 |z 9780134807638 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780134807614/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.  
520 |a The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions.  
520 |a Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation