Duration
5 Days
Course Overview
SISE – Implementing and Configuring Cisco Identity Services Engine v3.0 is an intensive experience with enhanced hands-on labs that cover all facets of Cisco Identity Services Engine (ISE) version 2.4. The training provides learners with the knowledge and skills to enforce security compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE.
In this course, you will learn about the Cisco ISE, a next-generation identity and access control policy platform that provides a single policy plane across the entire organization. The ISE combines multiple services including authentication, authorization, and accounting (AAA) using 802.1x, MAB, web authentication, posture, profiling, device on-boarding, guest services, and VPN access into a single context-aware identity-based platform.
This course will enable you to:
- Configure fundamental elements of ISE
- Secure identity-based networks using 802.1X for both wired and wireless clients using Windows 10 and Apple iPad endpoints
- Integrate the Cisco Virtual Wireless LAN Controller (vWLC) with advanced ISE features
- Use the following advanced features of Cisco ISE:
- Active Directory Integration
- Policy Sets
- EasyConnect
- EAP-FAST with EAP Chaining
- BYOD
- AnyConnect 4.x Posture Module for LAN and VPN compliance
- TACACS+ Device Management
- TrustSec Security Group Access
Audience
Employees of federal, state and local governments; and businesses working with the government.
Prerequisites
The learner is expected to have the following skills and knowledge before attending this course:
- CCNA Security or equivalent level of experience with Cisco devices
- Foundation-level wireless knowledge and skills
- Familiarity with Microsoft Windows and Microsoft Active Directory
- Familiarity with 802.1X
- Familiarity with Cisco ASA
What You’ll Learn
- ISE deployment options including node types, personas, and licensing
- Install certificates into ISE using a Windows 2012 Certificate Authority (CA)
- Configure the Local and Active Directory Based Identity Store and use of Identity Source Sequences
- Configure AAA clients and network device groups
- Implement Policy Sets to streamline Authentication and Authorization in the organization
- Deploy EasyConnect as an alternative to 802.1X port-based authentication
- Implement 802.1X for wired and wireless networks using the AnyConnect 4.x NAM module, the latest dot1x commands on a catalyst switch, and version 8.4 of the vWLC
- Configure policies to allow MAC Authentication Bypass (MAB) of endpoints
- Use central web authentication (CWA) for redirection of legitimate domain users who need to register devices on the network using MAC addresses (device registration)
- Configure hotspot guest access, self-registration guest access, and sponsored guest access
- Configure profiler services in ISE and use newer probes available in IOS switch code 15.x as well as vWLC 8.4 code
- Work with profiling feeds, logical profiles, and building profiling conditions to match network endpoints
- Configure posture assessments using the new Cisco AnyConnect Secure Mobility 4.x posture module
- Configure Cisco ISE as a TACACS+ Server for Device Administration with Command Authorization
- Configure Cisco ISE to integrate with a 5500-X ASA and a Catalyst Switch for TrustSec and implement end-to-end Security Group Tagging (SGT) and Security Group Access Control (SGACL)
- Maintenance, best practices, and logging
Outline
Module 1: Introducing Cisco ISE Architecture and Deployment
- Cisco ISE Features and Services
- Cisco ISE Deployment Models
Module 2: Cisco ISE Policy Enforcement
- Introducing 802.1X and MAB Access: Wired and Wireless
- Introducing Cisco ISE Identity Management
- Configuring Cisco ISE Certificate Services
- Introducing Cisco ISE Policy Sets
- Configuring Cisco ISE Authentication and Authorization Policy
- Implementing Third-Party Network Access Device Support
- Overview of Cisco TrustSec using Cisco ISE
- Introducing Cisco ISE EasyConnect
Module 3: Web Auth and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Cisco ISE Guest Access Components
- Configuring Guest Access Settings
- Configuring Portals: Sponsors and Guests
Module 4: Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Configuring Cisco ISE Profiling
Module 5: Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring My Devices Portal Settings
- Configuring Certificates in BYOD Scenarios
Module 6: Cisco ISE Endpoint Compliance
- Introducing Cisco ISE Endpoint Compliance
- Configuring Client Posture Services and Provisioning in Cisco ISE
Module 7: Working with Network Access Devices
- Configuring TACACS+ for Cisco ISE Device Administration
Labs
- ISE Familiarization and Certificate Usage
- Active Directory and Identity Source Sequences
- Policy Sets, Conditions Studio, and Network Devices
- Passive Identity
- 802.1X-Wired Networks – PEAP
- 802.1X-Wired Networks – EAP-FAST
- 802.1X-Wireless Networks
- 802.1X-MAC Authentication Bypass (MAB)
- Centralized Web Authentication (CWA)
- Guest Access and Reports
- Endpoint Profiling and Reports
- BYOD and My Devices Portal
- Posture Compliance and Reports
- Compliance Based VPN Access
- TACACS+ Device Administration
- Additional Guest Scenarios
- Posture Compliance Using the Temporal Agent
- pxGrid Integration with Firepower
- TrustSec Security Group Access
- ISE Distributed Deployment
- pxGrid Integration with Stealthwatch