View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

aaa

SEC0089 - ACS 5.4 TACACS Device Admin on WLC

The video shows you how to enable Device Admin using TACACS+ on Cisco Wireless LAN Controller (WLC) with ACS 5.4. Since WLC enforces admin access based on roles and not shell privilege, we will need to utilize TACACS+ custom attribute. The configuration will be performed on both WLC and ACS. We will attempt to restrict admin access to each of the configuration tab on the WLC using role assignment.
Topic:
  • Network Device and Network Device Group
  • Device Filter
  • Policy Element
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0088 - ACS 5.4 Shell Privilege and Command Authorization

The video continues from our previous lab on TACACS+ Device Admin on Cisco ACS 5.4 to demonstrate an extended usage of shell privilege, and to support command authorization. We will attempt to enforce various privilege level and allowed command sets to both of our local and AD users. At the end of the lab, we will also look at how privilege level effects ability to configure an ASA on ASDM.
Topic:
  • TACACS+ Shell Privileges and Command Authorization
  • Policy Element
    • Shell Profile
    • Command Set
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0087 - ACS 5.4 TACACS Device Admin on Switch and ASA (Part 2)

The video demonstrates TACACS+ configuration for Device Admin on Cisco ACS 5.4. We will go through the entire process of adding network devices, users, and building authentication and authorization policies. We will also look at basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.
Part 2 of this video shows switch and ASA configuration. The lab finishes with authentication testing.
 
Topic:
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0086 - ACS 5.4 TACACS Device Admin on Switch and ASA (Part 1)

The video demonstrates TACACS+ configuration for Device Admin on Cisco ACS 5.4. We will go through the entire process of adding network devices, users, and building authentication and authorization policies. We will also look at basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Part 1 of this video focuses on configurations on the ACS server.
 

Topic:

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

RS0025 - Nexus 1000V vTracker and AAA with TACACS+

The video focuses on two features on Cisco Nexus 1000V: vTracker, and AAA. We will go through vTracker command outputs, and review the type of information that can be obtained. We will then configure Nexus 1000V to authenticate user through TACACS+ against a Cisco ACS 5.4 server.

Topic includes
  • vTracker
  • AAA with TACACS+
  • Cisco ACS
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0028 - ISE 1.1 VMware Installation

The video walks you through an installation of Cisco Identity Services Engine (ISE) (we use 1.1.1 for our demonstration) on VMware. We will guide you step-by-step through the installation process. At the end of this lab, you should have a working ISE server that you can use for future labs. No configuration, other than the setup process, is performed in this video. The video assumes that you have basic working knowledge of VMware ESXi.

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0010 - ACS 5.3 VMware Installation

The video walks you through an installation of Cisco ACS 5.x (we use 5.3 for our demonstration) VMware version. We will guide you step-by-step through the installation process. At the end of this lab, you should have a working ACS server that you can use for RADIUS and TACACS+ authentication in future labs. No configuration, other than the setup process, is performed in this video. The video assumes that you have basic working knowledge of VMware ESXi.

Rating: 
4
Average: 4 (4 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - aaa