802.1 X Ise

Posted on  by 



Ise

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 is a 3-day instructor-led training course designed to prepare Cisco Channel Partners, systems engineers, and implementers with the knowledge and hands-on experience to prepare them to configure Cisco TrustSec solutions based on Cisco Identity Services Module, Cisco Catalyst Switches, and Cisco Wireless LAN Controllers.

The goal of the course is to provide you with foundational knowledge in the capabilities and functions of the IEEE 802.1X protocol and the ability to configure the Cisco Identity Services Engine (ISE) for 802.1X operation. The course introduces the architecture, components, and features of a Cisco TrustSec network designed around the IEEE 802.1X and RADIUS protocols.

Cisco Ise 802.1x

You will gain hands-on experience with configuring a network for 802.1X-based network services using the Cisco ISE, Cisco Catalyst switches, and Cisco wireless products.
This course is a prerequisite for Cisco Channel Partners to attend the newly-developed 5-day Implementing Cisco Identity Services Engine Secure Solutions (ISE) v1.0 course. Only certified ATPs (Authorized Technology Partners) can sell ISE/802.1x Cisco solutions at this time.

802.1x And Ise

The first thing that should be understood about 802.1X is that it is not a single thing or protocol. Furthermore, 802.1X itself is a component of an even larger system of network access controls, commonly referred to in the industry as NAC solutions. Cisco ISE is an example of one such NAC system. Now that we have discussed that Cisco ISE does solve a problem (or many problems), I’ll discuss one of the most common use case scenarios of Cisco ISE, some of the challenges that I have encountered in the field and how to resolve them. 802.1x Certificate Based Endpoint Authentication. The video walks you through configuration of wired 802.1X using EAP-TLS and PEAP on Cisco ISE 2.2. We will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR) using Windows Native Supplicant. DACL will be used to restrict network access.





Coments are closed