View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

radius

Cisco SDA Device Admin (Part 2)

The video shows configuration of device administration functionalities on Cisco DNAC. First part of the lab deals with DNAC user roles of local and external RADIUS users. The second half gets into TACACS+ configuration on DNAC managed devices. We will use Cisco ISE as our AAA server for both RADIUS and TACACS+. 
Rating: 
0
No votes yet
Difficulty Level: 
2

RS0134 - SDA Device Admin (Part 1)

The video shows configuration of device administration functionalities on Cisco DNAC. First part of the lab deals with DNAC user roles of local and external RADIUS users. The second half gets into TACACS+ configuration on DNAC managed devices. We will use Cisco ISE as our AAA server for both RADIUS and TACACS+. 
Rating: 
0
No votes yet
Difficulty Level: 
2

RS0125 - SDA Identity Policy with ISE (Part 3)

The video shows how to integration Cisco Identity Services Engine (ISE) with Cisco DNAC and looks at the Security Policy aspects of SDA. We will used DNAC to push AAA configuration to network devices and perform testing with wired 802.1X and guest access. Coupled with SDA fabric, the power of identity-based network access will be demonstrated.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

RS0125 - SDA Identity Policy with ISE (Part 2)

The video shows how to integration Cisco Identity Services Engine (ISE) with Cisco DNAC and looks at the Security Policy aspects of SDA. We will used DNAC to push AAA configuration to network devices and perform testing with wired 802.1X and guest access. Coupled with SDA fabric, the power of identity-based network access will be demonstrated.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

RS0125 - SDA Identity Policy with ISE (Part 1)

The video shows how to integration Cisco Identity Services Engine (ISE) with Cisco DNAC and looks at the Security Policy aspects of SDA. We will used DNAC to push AAA configuration to network devices and perform testing with wired 802.1X and guest access. Coupled with SDA fabric, the power of identity-based network access will be demonstrated.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0264 - FlexVPN with FVRF and IVRF (Part 3)

The video introduces you to the concept of Frontdoor and Inside VRF on Cisco FlexVPN. Using FVRF and IVRF, you will be able to isolate both tunnel termination interface and decapsulated tunneled traffic for enhanced security and simplified WAN routing. We will shows you two different way for assigning IVRF: statically and via RADIUS attribute. 
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0264 - FlexVPN with FVRF and IVRF (Part 2)

The video introduces you to the concept of Frontdoor and Inside VRF on Cisco FlexVPN. Using FVRF and IVRF, you will be able to isolate both tunnel termination interface and decapsulated tunneled traffic for enhanced security and simplified WAN routing. We will shows you two different way for assigning IVRF: statically and via RADIUS attribute. 
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0264 - FlexVPN with FVRF and IVRF (Part 1)

The video introduces you to the concept of Frontdoor and Inside VRF on Cisco FlexVPN. Using FVRF and IVRF, you will be able to isolate both tunnel termination interface and decapsulated tunneled traffic for enhanced security and simplified WAN routing. We will shows you two different way for assigning IVRF: statically and via RADIUS attribute. 
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0263 - FlexVPN Server with Local and External Authorization (Part 3)

The video shows you different ways to apply authorization attributes to Cisco AnyConnect VPN user that connect to FlexVPN server. We will be demonstrating the use of name mangler to match username or certificate to an authorization group locally and externally on ISE RADIUS server. We will look at Implicit Authorization to apply per-user attributed to a VPN session.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0263 - FlexVPN Server with Local and External Authorization (Part 2)

The video shows you different ways to apply authorization attributes to Cisco AnyConnect VPN user that connect to FlexVPN server. We will be demonstrating the use of name mangler to match username or certificate to an authorization group locally and externally on ISE RADIUS server. We will look at Implicit Authorization to apply per-user attributed to a VPN session.
Rating: 
0
No votes yet
Difficulty Level: 
4

Pages

Subscribe to RSS - radius

Lab Minutes Classifieds