View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

aaa

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 3)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 2)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 1)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0095 - Prime 3.1 User Group and Virtual Domain (Part 2)

The video looks at user and group management for administering Cisco Prime Infrastructure 3.1. We will be assigning different user roles to local users, and remote users on AAA servers using both RADIUS and TACACS+. We will then look at virtualizing management domain using virtual domain feature.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0095 - Prime 3.1 User Group and Virtual Domain (Part 1)

The video looks at user and group management for administering Cisco Prime Infrastructure 3.1. We will be assigning different user roles to local users, and remote users on AAA servers using both RADIUS and TACACS+. We will then look at virtualizing management domain using virtual domain feature.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0208 - ISE 2.0 802.1X Switch Config with Identity Control Policy (Part 2)

The video walks you through 802.1X switch configuration using Cisco Identity Control Policy. We will go over switch general configurations before diving into detail on the structure of Cisco Common Classification Policy Language (C3PL) and perform command conversion from the legacy 'authentication' syntax. We will also look at the concept of Service Template and a support for Per-MAC VLAN Assignment.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0208 - ISE 2.0 802.1X Switch Config with Identity Control Policy (Part 1)

The video walks you through 802.1X switch configuration using Cisco Identity Control Policy. We will go over switch general configurations before diving into detail on the structure of Cisco Common Classification Policy Language (C3PL) and perform command conversion from the legacy 'authentication' syntax. We will also look at the concept of Service Template and a support for Per-MAC VLAN Assignment.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 2)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 1)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0205 - ISE 2.0 TACACS+ Device Admin with Shell Profile (Part 2)

The video demonstrates TACACS+ configuration for Device Admin with Shell Profile on Cisco ISE 2.0. We will go through the entire process of adding network devices, users, and building authentication and authorization policies under the new TACACS+ Work Centers. We will configure basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - aaa

Lab Minutes Classifieds

Poll

Vote for the Next Video Series
SD-Access (DNA)
48%
SD-WAN (Viptela)
35%
Stealthwatch
10%
Network Programability
6%
Total votes: 31