View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

ldap

WL0057 - 9800 WLC L2 Security Local EAP (Part 2)

The video looks into a configuration of Local EAP on Cisco 9800 WLC, and how it can be used when an external RADIUS server is not available. We will be testing various EAP protocols with local user database and LDAP, and discussing some limitations and caveats of Local EAP.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

WL0057 - 9800 WLC L2 Security Local EAP (Part 1)

The video looks into a configuration of Local EAP on Cisco 9800 WLC, and how it can be used when an external RADIUS server is not available. We will be testing various EAP protocols with local user database and LDAP, and discussing some limitations and caveats of Local EAP.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 1)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

WL0014 - WLC L2 Security Local EAP (Part 2)

The video shows you how to configure Cisco Wireless LAN Controller to act as a RADIUS server and provide 802.1X authentication to wireless client using Local EAP feature. We will use OpenSSL to generate CSR and have it signed for controller identity certificate. Authentication tested includes PEAP, EAP-TLS, and EAP-FAST. We will primarily use controller local user database but will also discuss and demonstrate limitation of using LDAP. 

Rating: 
4.5
Average: 4.5 (2 votes)
Difficulty Level: 
0

WL0014 - WLC L2 Security Local EAP (Part 1)

The video shows you how to configure Cisco Wireless LAN Controller to act as a RADIUS server and provide 802.1X authentication to wireless client using Local EAP feature. We will use OpenSSL to generate CSR and have it signed for controller identity certificate. Authentication tested includes PEAP, EAP-TLS, and EAP-FAST. We will primarily use controller local user database but will also discuss and demonstrate limitation of using LDAP. 

Rating: 
4.5
Average: 4.5 (2 votes)
Difficulty Level: 
0

SEC0179 - ASA FirePower External User Authentication

The video shows you how to leverage an existing Active Directory database for administrative user login on Cisco ASA FireSight System. We will go through configuration of LDAP integration, and usergroup-to-role mapping. You will be able to limit access to FireSight web interface based on your user job function.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0165 - ASA FirePower Network Discovery (User with AD User Agent) (Part 2)

The video demonstrates how you can leverage user identity information within Cisco ASA FirePower and FireSight System as part of User Network Discovery. We will utilize AD User Agent to obtain user-to-IP mapping, and integrate to Active Directory to obtain user and group information. This information can be used to tie user identity to network traffic as well as including them in Access Control rules for access enforcement

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0165 - ASA FirePower Network Discovery (User with AD User Agent) (Part 1)

The video demonstrates how you can leverage user identity information within Cisco ASA FirePower and FireSight System as part of User Network Discovery. We will utilize AD User Agent to obtain user-to-IP mapping, and integrate to Active Directory to obtain user and group information. This information can be used to tie user identity to network traffic as well as including them in Access Control rules for access enforcement

Rating: 
5
Average: 5 (6 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - ldap