Cisco ISE is one of the most widely used Identity Management Solutions in modern enterprise networks. In this course, ISE Profiling Services for CCNP Security (300-208) SISAS, you'll learn the ins and outs of the Cisco Profiler service. First, you'll cover how this service can help you to properly identify devices that connect to your network. Next, you'll explore how to apply proper authorization policies in Cisco ISE to devices like printers, cameras, and IoT devices. Finally, you'll learn about the topics that would be asked on the 300-208 SISAS exam. By the end of this course, you'll be able to deploy Profiler and identify devices by placing them into endpoint identity groups, and then applying authorization policy to those devices.
Course Overview Hi everyone. My name is Brandon Carroll, and welcome to my course, ISE Profiling Services for CCNP Security (300-208) SISAS. I'm a network security engineer at Global Config Technology Solutions. Cisco ISE is one of the most widely used identify management solutions in modern enterprise networks. In this course, we're going to introduce you to the profiler service of Cisco ISE. Some of the major topics that we'll cover include what is profiler? What are probes, and how does the profiler service use them? How are profiler policies built? And what do I do when profiler doesn't have a prebuilt policy to identify my devices? By the end of this course, you'll be able to deploy profiler and identify devices, placing them into endpoint identity groups, and then applying authorization policy to those devices. Before beginning the course, you should be familiar with the general setup of Cisco ISE and how to configure basic authentication and authorization policies. I hope you'll join me on this journey to learn how to profile devices with the ISE profiling services for CCNP security SISAS course at Pluralsight.
Using Profiler Information in Policies Well, hi there everyone, and welcome to Using Profiler Information in Policies. My name is Brandon Carroll. Let's discuss what we're going to cover in this module. We're going to begin by talking about how we can profile without the use of probes. And then we're going to talk about how the process works and how the change of authorization is used when we perform profiling. Then we're going to do a little bit of a profiler policy overview and talk about parent policies and child policies, and when we do that, we'll just break down the different elements of our policy, so let's go ahead and begin our discussion of profiling without using probes.
Creating Custom Profiler Policies Well, hi again, and welcome to Creating Custom Profiler Policies. My name is Brandon Carroll. Let's take a look at what we're going to see as we move through this particular module. We're going to start out by discussing why we need custom policies. We've already seen that ISE has several built-in policies and we've actually configured those policies in the lab to identify devices for us, so why would I need to create custom ones? We're going to answer that question for you. And then we're also going to talk about how we do that, how exactly do we create a custom policy, what do we need to know? And then we're going to jump over into our lab environment, and we'll demonstrate how this can be done. So with that said, let's go ahead and jump into that first topic, why do we need custom policies?