Detailed Course Outline
- Section 1: Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Section 2: Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- TrustSec Configuration
- Easy Connect
- Section 3: Web Auth and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configure Sponsor and Guest Portals
- Section 4: Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Section 5: Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Section 6: Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning
- Section 7: Working with Network Access Devices
- Review AAA
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
Lab Outline:
- Discovery 1: Access the SISE Lab and Install ISE 3.1
- Discovery 2: Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage
- Discovery 3: Integrate Cisco ISE with Active Directory
- Discovery 4: Configure Cisco ISE Policy
- Discovery 5: Configure Access Policy for Easy Connect
- Discovery 6: Configure Guest Access
- Discovery 7: Configure Guest Access Operations
- Discovery 8: Create Guest Reports
- Discovery 9: Configure Profiling
- Discovery 10: Customize the Cisco ISE Profiling Configuration
- Discovery 11: Create Cisco ISE Profiling Reports
- Discovery 12: Configure BYOD
- Discovery 13: Blacklisting a Device
- Discovery 14: Configure Cisco ISE Compliance Services
- Discovery 15: Configure Client Provisioning
- Discovery 16: Configure Posture Policies
- Discovery 17: Test and Monitor Compliance Based Access
- Discovery 18: Test Compliance Policy
- Discovery 19: Configure Cisco ISE for Basic Device Administration
- Discovery 20: Configure TACACS+ Command Authorization