Cisco Core Security: Secure Network Access Using Cisco ISE
Allowing only authorized devices to connect to a corporate network while maintaining operational efficiency is tough. This course will teach you how to use Cisco ISE to implement 802.1X to ensure only authorized devices connect to your network.
What you'll learn
Only allowing authorized devices access to a network is challenging enough, but ensuring appropriate device access while still having operational efficiency is even harder. In this course, Cisco Core Security: Secure Network Access Using Cisco ISE, you will gain the ability to leverage Cisco ISE to implement 802.1X. First, you will learn the foundational information needed to understand 802.1X. Next, you will discover how to configure Cisco ISE to support your devices and apply the correct policy to them. Finally, you will explore how to configure Cisco switches to support 802.1X and MAB. When you are finished with this course, you will have the skills and knowledge of implementing 802.1X with Cisco ISE needed to ensure only authorized devices connect to your network.
Table of contents
- Course Overview and Objectives 8m
- What 802.1x Is and the Benefits It Provides 4m
- Devices and Protocols Required to Implement 802.1x and MAB 6m
- Demo: Adding Network Devices to Cisco ISE 5m
- Demo: Configuring Global Settings on a Cisco Switch to Support 802.1x 11m
- Demo: Configuring a Cisco Switchport to Use 802.1X and MAB 10m
- Understanding ISE Identity Stores and MAC Authentication Bypass 4m
- Demo: Internal Identity Stores and Configuring MAC Authentication Bypass 4m
- Demo: Verifying MAC Authentication Bypass 5m
- ISE Identity Stores 1m
- Demo: ISE External Identity Sources and Active Directory Integration 3m
- EAP Types 7m
- Demo: Configuring a Windows 10 Supplicant’s EAP Type 5m
- Policy Sets and Authentication Policies 5m
- Demo: Configuring Authentication Policies to Leverage Usernames 5m
- Demo: Verifying and Troubleshooting Authentication Using 802.1x 5m
- Profiling Devices, Determining Their Posture, and Cisco TrustSec 8m
- Understanding WebAuth, Guest Services, and BYOD 7m
- Demo: Configure Guest Access Components on ISE 10m
- Demo: Configuring a WLC and ISE Authorization Profiles for WebAuth 8m
- Demo: Configure ISE Policy for WebAuth 7m
- Demo: Verifying WebAuth Is Working 7m
- Course Summary 3m