Implementing and Configuring Cisco Identity Services Engine (SISE) – Outline

Outline detalhado do curso

  • Section 1: Introducing Cisco ISE Architecture and Deployment
    • Using Cisco ISE as a Network Access Policy Engine
    • Cisco ISE Use Cases
    • Describing Cisco ISE Functions
    • Cisco ISE Deployment Models
    • Context Visibility
    • Discovery 1: Access the SISE Lab and Install ISE 2.4
    • Discovery 2: Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage
  • Section 2: Cisco ISE Policy Enforcement
    • Using 802.1X for Wired and Wireless Access
    • Using MAC Authentication Bypass for Wired and Wireless Access
    • Introducing Identity Management
    • Configuring Certificate Services
    • Discovery 3: Integrate Cisco ISE with Active Directory
    • Introducing Cisco ISE Policy
    • Discovery 4: Configure Cisco ISE Policy
    • Implementing Third-Party Network Access Device Support
    • Introducing Cisco TrustSec
    • TrustSec Configuration
    • Easy Connect
    • Discovery 5: Configure Access Policy for Easy Connect
  • Section 3: Web Auth and Guest Services
    • Introducing Web Access with Cisco ISE
    • Introducing Guest Access Components
    • Configuring Guest Access Settings
    • Discovery 6: Configure Guest Access
    • Configure Sponsor and Guest Portals
    • Discovery 7: Configure Guest Access Operations
    • Discovery 8: Create Guest Reports
  • Section 4: Cisco ISE Profiler
    • Introducing Cisco ISE Profiler
    • Profiling Deployment and Best Practices
    • Discovery 9: Configure Profiling
    • Discovery 10: Customize the Cisco ISE Profiling Configuration
    • Discovery 11: Create Cisco ISE Profiling Reports
  • Section 5: Cisco ISE BYOD
    • Introducing the Cisco ISE BYOD Process
    • Describing BYOD Flow
    • Configuring the My Devices Portal
    • Configuring Certificates in BYOD Scenarios
    • Discovery 12: Configure BYOD
    • Discovery 13: Blacklisting a Device
  • Section 6: Cisco ISE Endpoint Compliance Services
    • Introducing Endpoint Compliance Services
    • Discovery 14: Configure Cisco ISE Compliance Services
    • Configuring Client Posture Services and Provisioning
    • Discovery 15: Configure Client Provisioning
    • Discovery 16: Configure Posture Policies
    • Discovery 17: Test and Monitor Compliance Based Access
    • Discovery 18: Test Compliance Policy
  • Section 7: Working with Network Access Devices
    • Review AAA
    • Cisco ISE TACACS+ Device Administration
    • Configure TACACS+ Device Administration
    • TACACS+ Device Administration Guidelines and Best Practices
    • Migrating from Cisco ACS to Cisco ISE
    • Discovery 19: Configure Cisco ISE for Basic Device Administration
    • Discovery 20: Configure TACACS+ Command Authorization