Documente Academic
Documente Profesional
Documente Cultură
Course Objectives
Upon completion of this course, you should be able to: -
Describe the TRUSTSEC 2.0 solution architecture,
components, and deployment methodologies using the ISE
platform. - Create a High-level and Low-level design for the
ISE platform deployment methodology, scaling requirements,
and platform resiliency. - Configure the 802.1X infrastructure
for both wired and wireless 802.1X using Cisco Catalyst
switches, Cisco Nexus Switches, Cisco ISR routers, and
Cisco Wireless LAN Controllers. - Deploy firewall-based
VPN services using the Cisco ASA and NAC appliance. ¡V
Phuong to track down answer for this objective. - Configure
the ISE platform in a network that includes Microsoft Active
Directory. - Configure the ISE platform for high availability.
- Configure the ISE for classification and policy enforcement
- Deploy ISE-based profiling, posture, and guest services. -
Integrate the ISE platform with the TRUSTSEC 2.0 solution
architecture. - Troubleshoot user authentication and policy
enforcement problems based on configuration error or
network issue
Course Outline
1 Introduction to the Cisco TrustSec 2.0 Solution and ISE
Platform Architecture
Introducing the Cisco TrustSec 2.0 Solution and ISE Platform
Architecture
1 Introduction to the Cisco TrustSec 2.0 Solution and ISE
Platform Architecture
Introducing the Cisco TrustSec 2.0 Solution and ISE Platform
Architecture
Page 1
Cisco® Advanced Services Implementing Cisco® Identity Services
Engine Secure Solutions v1.0 (ISE)
2 Cisco Identity Services Engine Deployment
Installing the Cisco ISE Software Integrating Cisco ISE into
Microsoft Active Directory Configuring Cisco ISE for High
Availability
2 Cisco Identity Services Engine Deployment
Installing the Cisco ISE Software Integrating Cisco ISE into
Microsoft Active Directory Configuring Cisco ISE for High
Availability
3 Classification and Policy Enforcement
Using Cisco ISE for Policy Enforcement Configuring Cisco ISE
for MAB Configuring Cisco ISE for Wired and Wireless 802.1X
Authentication Deploying VPN-Based Services Using the
Cisco ASA and Inline Posture Configuring Web Authentication
Using Cisco ISE
3 Classification and Policy Enforcement
Using Cisco ISE for Policy Enforcement Configuring Cisco ISE
for MAB Configuring Cisco ISE for Wired and Wireless 802.1X
Authentication Deploying VPN-Based Services Using the
Cisco ASA and Inline Posture Configuring Web Authentication
Using Cisco ISE
4 Guest, Profiler, and Posture Service Configuration
Introducing the Cisco ISE Guest Service Introducing the Cisco
ISE Profiler Service Introducing the Cisco ISE Posture Service
4 Guest, Profiler, and Posture Service Configuration
Introducing the Cisco ISE Guest Service Introducing the Cisco
ISE Profiler Service Introducing the Cisco ISE Posture Service
5 Cisco TrustSec 2.0 Architecture Design for the ISE
Appliance
Designing the Cisco TrustSec 2.0 Solution Architecture for the
ISE Appliance
5 Cisco TrustSec 2.0 Architecture Design for the ISE
Appliance
Designing the Cisco TrustSec 2.0 Solution Architecture for the
ISE Appliance
Page 2