You are on page 1of 4

Cisco ISE: Copy Rights 2018

CISCO IDENTITY SERVICES ENGINE ISE


2.3&2.4
__________________________________________________________________________

This course is intended to help individuals to understand Cisco Identity Services Engine
with various topologies, deployments and use cases. This course is mainly to deploy CISE
Enterprise network security on Wireless Environment. Course contains knowledge of
Understanding ISE and it’s architecture, components and personas. Various services such as
giving secure access to corporate and non-corporate devices, Profiling, Guest, BYOD, Posture, psn
failover, wired and wireless differentiation.

WHAT YOU ACHIEVE OUT OF THIS TRAINING


Individuals who attend this training achieve following aspects.

• Understanding architecture and services of ISE.


• Deploying ISE with different personas and topologies.
• Giving secure access to Employee devices (DOT1X).
• Giving guest access with different requirements (GUEST).
• Giving secure access to employee devices (non-corporate) for encouraging bring their
own devices (BYOD).
• Posturing the Devices and Device Admin
• Hands on experience, deploy and troubleshoot Wireless endpoints deployment.

COURSE CONTENT
DAY1
UNDERSTANDING CISE AND IT’S FEATURES

• Overview of Cisco Identity Services Engine.


• Overview of Services/Features and personas of Cisco Identity Services Engine
Cisco ISE: Copy Rights 2018

CISE LICENSING

• Different License Types available


• License vs Feature segregation
• License Consumption and knowing their details.
GETTING TO KNOW CISE MENU ACCESS FOR CONFIGURATION

• CISE Role Based Access Control


• CISE Menus overview w.r.t the features.
LAB exercise:

VARIOUS TOPOLOGIES AND THEIR DEPLOYMENTS

• Topologies and understanding their requirements


• Policy sets and typical use cases.

DAY2
PROVIDING SECURE ACCESS TO EMPLOYEES

• Authentication services and stores.


• Authentication types and configuring their stores accordingly.
• Configuring authentication policies based on store/authentication type/protocol/NAD
type/NAD/user/medium/Location/Deployment.
• Configuring authorization policies – Local/Global exception policies and Authorization
policies.
• Deploying Dot1x with ACLs and giving different access to different type of users.
• Understanding Live Logs/Live Sessions/Reports for above use cases.
• Troubleshooting
Lab Exercise:

Cisco ISE: Copy rights 2018


Cisco ISE: Copy Rights 2018

DAY3
IDENTIFYING DEVICES AND GIVING ACCESS TO THEM ACCORDINGLY (PROFILING)

• What/Why is profiling?
• Different Probes and configuring them to identify profile of a device
• Understanding Profiling components and configuring them.
• Configuring policies for profiled devices and verifying them.
LAB exercise:

PROVIDING ACCESS TO GUEST USERS AND DEVICES (GUEST)

• Understanding Guest access through CWA.


• Understanding Guest types and their typical use cases.
• Understanding different Portals such as guest/sponsor/mydevices/certificate
Provisioning/client provisioning/posturing
• Deploying Self-Registered Guest users.
• Deploying Sponsored guest users.

DAY4
• Deploying hot-spot guest users.
• Troubleshooting guest activity.
Lab Exercise:

PROVIDING ACCESS TO EMPLOYEE NON-CORPORATE DEVICES (BYOD)

• Overview of BYOD -- > Why BYOD


• Different types of BYOD and their security.
• Dual SSID BYOD flow.
• Single SSID BYOD Flow.
• Configuring ISE for BYOD use cases

Cisco ISE: Copy rights 2018


Cisco ISE: Copy Rights 2018

• Managing on-boarded devices by an employee through my-devices portal.


• Validate live logs/Live sessions/Reports/License details for BYOD on-boarded users.
• Troubleshooting ISE for BYOD use cases
Lab exercise:

DAY5
POSTURING DEVICES

• Overview of Posturing devices.


• Posturing conditions and their remediation.
• Posturing Policies, Requirements and conditions.
• Configuring Posture Policies and deploy them.
• Validate live logs/Live sessions/Reports/License details for postured devices

Device Administration

• Overview of TACACS
• How to configure TACACS on a switch/WLC..etc NAD devices.
• How to configure TACACS on ISE.
• How to give different privileges for different users from ISE through TACACS.

Cisco ISE: Copy rights 2018

You might also like