View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

sgt

SEC0222 - ISE 2.0 pxGrid with ASA Firepower (Part 2)

The video shows a functional integration of ASA Firepower with ISE 2.0 pxGrid service. We will have the Firepower join pxGrid using certificate-based authentication and subscribe for user contextual information. We will create and test Firepower access policies to restrict user traffic based on their AD group membership and assigned Security Group Tag. 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0222 - ISE 2.0 pxGrid with ASA Firepower (Part 1)

The video shows a functional integration of ASA Firepower with ISE 2.0 pxGrid service. We will have the Firepower join pxGrid using certificate-based authentication and subscribe for user contextual information. We will create and test Firepower access policies to restrict user traffic based on their AD group membership and assigned Security Group Tag. 
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0220 - ISE 2.0 TrustSec - SXP (Part 3)

The video demonstrates SXP capability on Cisco ISE 2.0 to relay SGT between SXP-capable network devices. We will use WLC as SXP speaker, while ASA and switch as listeners and enforcers. The switch has SGACL implemented from the previous video and the ASA will leverage SGT in its ACL. We will also look at Static SXP Mapping.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0220 - ISE 2.0 TrustSec - SXP (Part 2)

The video demonstrates SXP capability on Cisco ISE 2.0 to relay SGT between SXP-capable network devices. We will use WLC as SXP speaker, while ASA and switch as listeners and enforcers. The switch has SGACL implemented from the previous video and the ASA will leverage SGT in its ACL. We will also look at Static SXP Mapping.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0220 - ISE 2.0 TrustSec - SXP (Part 1)

The video demonstrates SXP capability on Cisco ISE 2.0 to relay SGT between SXP-capable network devices. We will use WLC as SXP speaker, while ASA and switch as listeners and enforcers. The switch has SGACL implemented from the previous video and the ASA will leverage SGT in its ACL. We will also look at Static SXP Mapping.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0219 - ISE 2.0 TrustSec - FlexVPN and ZBFW (Part 3)

The video attempts to implement SGT propagation across a WAN over FlexVPN. We will demonstrate capability of Cisco router in participating Cisco TrustSec including joining SGT trust domain, Network Device Authorization, SGT propagation, and enforcement. We will configure ZBFW to utilize source SGT in conjunction with ACL to restrict network access.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0219 - ISE 2.0 TrustSec - FlexVPN and ZBFW (Part 2)

The video attempts to implement SGT propagation across a WAN over FlexVPN. We will demonstrate capability of Cisco router in participating Cisco TrustSec including joining SGT trust domain, Network Device Authorization, SGT propagation, and enforcement. We will configure ZBFW to utilize source SGT in conjunction with ACL to restrict network access.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0219 - ISE 2.0 TrustSec - FlexVPN and ZBFW (Part 1)

The video attempts to implement SGT propagation across a WAN over FlexVPN. We will demonstrate capability of Cisco router in participating Cisco TrustSec including joining SGT trust domain, Network Device Authorization, SGT propagation, and enforcement. We will configure ZBFW to utilize source SGT in conjunction with ACL to restrict network access.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0218 - ISE 2.0 TrustSec - SGACL (Part 3)

The video walks you through configuration of SGACL on Cisco ISE 2.0. Using the SGT created in the previous video, we will map them into SGACL matrix and apply appropriate access policy. We will configure a switch to download SGACL from ISE and have it act as our enforcement point (Network as a Enforcer). 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0218 - ISE 2.0 TrustSec - SGACL (Part 2)

The video walks you through configuration of SGACL on Cisco ISE 2.0. Using the SGT created in the previous video, we will map them into SGACL matrix and apply appropriate access policy. We will configure a switch to download SGACL from ISE and have it act as our enforcement point (Network as a Enforcer). 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - sgt

Poll

Vote for the Next Video Series