Implementing and Configuring Cisco Identity Services Engine v2.1 (SISE) – Outline

Detailed Course Outline

Introducing the Cisco Secure Access Solution and ISE Platform Architecture

  • The Cisco Secure Access Solution
  • Cisco ISE as a Network Access Policy Engine
  • Cisco ISE Policy Security Mechanisms
  • Cisco TrustSec
  • Installing Cisco ISE
  • Cisco ISE GUI Orientation

Cisco ISE Policy Enforcement

  • 802.1X and MAB Wired and Wireless
  • Identity Management
  • Cisco ISE Policy Overview
  • Cisco ISE Policy Sets

Web Authentication

  • Web Access with Cisco ISE
  • WebAuth Configuration

Cisco ISE Guest Services

  • Cisco ISE Guest Access Components
  • Guest Access Settings
  • Sponsors and Sponsor Portals
  • Cisco ISE Guest Portal Overview
  • Cisco ISE Guest Operations and Reports

Cisco ISE Profiler

  • Introduction to Profiling
  • Profiling Configuration on Cisco ISE

Cisco ISE BYOD and MDM

  • Cisco ISE BYOD Process Overview
  • BYOD Portal Selection
  • My Devices Portal Settings
  • Certificates in BYOD Scenarios
  • Describe MDM and ISE

Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance – Posture Service Overview
  • Client Provisioning in Cisco ISE
  • Mobile Client Provisioning in Cisco ISE
  • Configuring Cisco ISE for Posture Compliance

Using Cisco ISE for VPN-Based Services

  • VPN Access Overview
  • Configuring Cisco ASA v9.2+ for VPN Access
  • Using Inline Posture Node for NADs without CoA Support

Cisco TrustSec

  • Cisco TrustSec

Cisco ISE Design

  • Node Capabilities
  • Failover and High Availability

Cisco ISE Best Practices

  • Best Practices

Labs

  • Lab 1-1: Initial Configuration of Cisco ISE
  • Lab 2-1: Integrate Cisco ISE with Active Directory
  • Lab 2-2: Integrating Cisco ISE with a second Microsoft Active Directory
  • Lab 2-3: Basic Policy Configuration
  • Lab 2-4: Conversion to Policy Sets
  • Lab 4-1: Configure Guest Access
  • Lab 4-2: Guest Access Operations
  • Lab 4-3: Guest Reports
  • Lab 5-1: Configuring Profiling
  • Lab 5-2: Customizing the Cisco ISE Profiling Configuration
  • Lab 5-3: ISE Profiling Reports
  • Lab 6-1: BYOD Configuration
  • Lab 6-2: Device Blacklisting
  • Lab 7-1: Compliance
  • Lab 7-2: Configuring Client Provisioning
  • Lab 7-3: Configuring Posture Policies
  • Lab 7-4: Testing and Monitoring Compliance Based Access
  • Lab 7-5: Compliance Policy Testing
  • Lab 7-6: MDM Integration with Cisco ISE
  • Lab 7-7: MDM Access and Configuration
  • Lab 7-8: Client Access with MDM
  • Lab 8-1: Using Cisco ISE for VPN Access