Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Implementing and Configuring Cisco Identity

Services Engine (SISE) – 3 Days


Outline

● Describe Cisco ISE deployments, including core deployment components and how they interact to
create a cohesive security architecture. Describe the advantages of such a deployment and how each
Cisco ISE capability contributes to these advantages

● Describe concepts and configure components related to 802.1X and MAC Authentication Bypass
(MAB) authentication, identity management, and certificate services

● Describe how Cisco ISE policy sets are used to implement authentication and authorization, and
how to leverage this capability to meet the needs of your organization

● Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect

● Describe and configure web authentication, processes, operation, and guest services, including
guest access components and various guest access scenarios

● Describe and configure Cisco ISE profiling services and understand how to monitor these services
to enhance your situational awareness about network-connected endpoints. Describe best practices
for deploying this profiler service in your specific environment

● Describe endpoint compliance, compliance components, posture agents, posture deployment and
licensing, and the posture service in Cisco ISE

BYOD

● Describe and configure TACACS+ device administration using Cisco ISE, including command sets,
profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication,
and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols

Lab Outline

How to access CISE CLI

Getting to know services running on CISE

Getting to know CLI configuration such as IP/netmask/default gateway/domain name/name server.


Etc

How to create endpoints manually

configuring Network Access Device

configuring different Network Devices Groups

configuring Network Access Devices and associating to Network Devices Groups (NDG).
Configure Policy sets

Configuring Active Directory, retrieve groups and attributes

Configure existing or new authentication sequence

Profiling devices

Configuring Sponsored Gu Configuring self-registered guest userest users

Configure Hotspot and giving internet access

configure posture policy and validating posture of a device and give compliant access

Configuring TACACS

BYOD

Understanding Cisco SDA Fundamentals


(SDAFND) – 4 Days
Outline

● Introducing Cisco SD-Access

● Introducing Cisco DNA Center

● Exploring Cisco SD-Access Solution Components

● Exploring Cisco SD-Access Wireless Architecture

● Automating Network Changes with Cisco DNA Center

● Deploying Fabric Networks with Cisco DNA Center

● Exploring Cisco DNA Center Assurance

● Exploring Cisco DNA Center Programmability

Lab Outline

● Explore Cisco DNA Center User Interface

● Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access

● Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)

● Provision Access Points in Cisco DNA Center

● Provision Underlay Networks with Cisco DNA Center LAN Automation

● Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
● Deploy Cisco SD-Access Single Site Fabric

● Deploy Cisco SD-Access Single Site Fabric (cont.)

You might also like