View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

asa

SEC0222 - ISE 2.0 pxGrid with ASA Firepower (Part 1)

The video shows a functional integration of ASA Firepower with ISE 2.0 pxGrid service. We will have the Firepower join pxGrid using certificate-based authentication and subscribe for user contextual information. We will create and test Firepower access policies to restrict user traffic based on their AD group membership and assigned Security Group Tag. 
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0213 - ISE 2.0 Internal CA SCEP with AnyConnect VPN (Part 2)

The video shows you how to configure Cisco ISE 2.0 internal CA as a SCEP server for AnyConnect VPN client to obtain a certificate. We will go through basic configuration of ASA AnyConnect VPN to enable SCEP proxy. A test certificate request will be performed over VPN. Afterwards, we will configure the ASA to perform client certificate validity check using OCSP.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0213 - ISE 2.0 Internal CA SCEP with AnyConnect VPN (Part 1)

The video shows you how to configure Cisco ISE 2.0 internal CA as a SCEP server for AnyConnect VPN client to obtain a certificate. We will go through basic configuration of ASA AnyConnect VPN to enable SCEP proxy. A test certificate request will be performed over VPN. Afterwards, we will configure the ASA to perform client certificate validity check using OCSP.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 2)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 1)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0205 - ISE 2.0 TACACS+ Device Admin with Shell Profile (Part 2)

The video demonstrates TACACS+ configuration for Device Admin with Shell Profile on Cisco ISE 2.0. We will go through the entire process of adding network devices, users, and building authentication and authorization policies under the new TACACS+ Work Centers. We will configure basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0205 - ISE 2.0 TACACS+ Device Admin with Shell Profile (Part 1)

The video demonstrates TACACS+ configuration for Device Admin with Shell Profile on Cisco ISE 2.0. We will go through the entire process of adding network devices, users, and building authentication and authorization policies under the new TACACS+ Work Centers. We will configure basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

WL0033 - WLC Mobility Anchor (Part 2)

The video demonstrates the concept of Mobility Anchor for guest users on Cisco Wireless LAN Controller. We will extend our knowledge of mobility tunnel, foreign and anchor controllers, from the last video to securely segregate guest traffic into DMZ. The second half of the video shows you how to configure Cisco ISE to operate with the anchor WLC in the DMZ to provide guest login portal without allowing guest traffic into internal network.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

WL0033 - WLC Mobility Anchor (Part 1)

The video demonstrates the concept of Mobility Anchor for guest users on Cisco Wireless LAN Controller. We will extend our knowledge of mobility tunnel, foreign and anchor controllers, from the last video to securely segregate guest traffic into DMZ. The second half of the video shows you how to configure Cisco ISE to operate with the anchor WLC in the DMZ to provide guest login portal without allowing guest traffic into internal network.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0196 - ISE 1.3 Guest Access with Hotspot (Part 2)

The video demonstrates the first guest access deployment model on Cisco ISE 1.3 called Hotspot. We will be configuring ISE to allow our guest users to perform a single-click type of login to access internet, including an access code enforcement. We will also show how to provide better user experience by not having user encountering login portal after first login using automatic device registration, or if desired control how often users should be redirected back to the login page using Endpoint Purge.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - asa

Poll

Vote for the Next Video Series