ACS 5.2 – Implementing Cisco Secure Access Control System

X

Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

ACS 5.2 – Implementing Cisco Secure Access Control System
  • ACS 5.2 – Implementing Cisco Secure Access Control System

    3 Dages
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    SEK26800 (exkl. moms)
    Registrera

    Course Details

    Sammanfattning

    This course teaches you how to provide secure access to your network using the Cisco® Secure Access Control Server (ACS) 5.2, interoperating with security features in Cisco IOS® Software. You will gain a thorough understanding of the operation of the Cisco Secure ACS to control access to network services and devices. Course subjects include the principles of authentication, to restrict user access to networks, services, and devices; authorization, to restrict the functions users can perform on services and devices; and accounting, to track the activities of users.

     

    The RADIUS, TACACS+, Extensible Authentication Protocol (EAP), and 802.1x protocols are discussed in theory and practice as the basis of network security. Specific methods and configurations are shown that can be used in your production networks to achieve targeted and detailed restrictions. The course includes hands-on labs to provide personal experience in configuring Cisco ACS and Cisco network devices.

    InnehĂĄll

    Introduction

    • What is RADIUS: TLV, RADIUS packets, differentiation to TACACS+
    • The portfolio: ACS versions, licenses, ACS View​

    Installation

    • Installation steps
    • Overview of the GUI and CLI​

    Basic configuration

    • Setup of devices, groups and user
    • AAA configuration (Switch, Access Point, ASA)​

    Authentication and Authorization

    • Behind the scenes: internal Authentication Flow
    • External databases: LDAP, AD, NAC Server
    • Proxy Authentication​

    Operation and Maintenance

    • Software Upgrade
    • Logging, Logging Relay
    • Reports / Reporting / MARS
    • Cluster
    • CLI​

    Scenarios

    • IP Phones
    • WLAN (AP, Controller)
    • VPN Group / Policy Mapping
    • Downloadable ACLs
    • DOT1X

    ​Labs

    • ACS basic configuration
    • Updating ACS from 5.1 to 5.2
    • Creating AAA clients and Device Groups
    • Administrating internal and external application database
    • Creating Policies for Authentication and Authorization
    • Create and use monitoring, reporting and logging functions
    • Implementation of IEEE 802.1X Solutions: Switches, IP Phones, WLAN (AP, Controller), MARS, NAC Server, Access Point
    • Supporting the WLAN Security
    • LDAP Integration
    • Identity and Authorization Policies
    • Example: Command Authorization

    Förkunskaper

    Certifications: None/Specialization

    CCNA certification or equivalent knowledge

    Schema

      Mar 26 - Mar 28, 2019
    Stockholm
      May 15 - May 17, 2019
    Stockholm
      Aug 28 - Aug 30, 2019
    Stockholm
      Oct 23 - Oct 25, 2019
    Stockholm