View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

switch

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 2)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0206 - ISE 2.0 TACACS+ Device Admin with Command Authorization (Part 1)

The video continues from our previous lab on Cisco ISE 2.0 TACACS+. We will demonstrate an extended usage of shell privilege, and support for command authorization. We will attempt to enforce various privilege level and allowed command sets to both local and AD users. We will test our configuration on Cisco switch and ASA.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0205 - ISE 2.0 TACACS+ Device Admin with Shell Profile (Part 2)

The video demonstrates TACACS+ configuration for Device Admin with Shell Profile on Cisco ISE 2.0. We will go through the entire process of adding network devices, users, and building authentication and authorization policies under the new TACACS+ Work Centers. We will configure basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0205 - ISE 2.0 TACACS+ Device Admin with Shell Profile (Part 1)

The video demonstrates TACACS+ configuration for Device Admin with Shell Profile on Cisco ISE 2.0. We will go through the entire process of adding network devices, users, and building authentication and authorization policies under the new TACACS+ Work Centers. We will configure basic AAA configuration on a Cisco switch and ASA firewall. We will use both local and AD users for testing and granting shell privilege 15 in this lab.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

What You Need to Know About Catalyst 6807-XL?

Cisco Catalyst 6500 has been around for almost a decade and has gone through two iterations of switch chassis; the original non-E, and the E Chassis. With growing demands for higher bandwidth in today’s network, the next generation of 6500 chassis, rebranded to 6807-XL, has been released by Cisco to support future linecards with increased throughput (> 80Gbps fabric). This article summarizes what you need to know about this product. 

What You Need to Know About Catalyst 6880-X?

When it comes to user access environment, Cisco has a compressive list of product portfolio for you to choose from including the well-known Catalyst 2K/3K/4K. That portfolio is about to expand with the introduction of Cisco Catalyst 6880-X. 6880-X is a highly scalable and manageable solution for user access offering up to 1008 (FCS) 10/100/1000 ports within a single management system when working with the Catalyst 6800ia remote linecard, while providing the same feature set as a regular 6500 that you might be longing for. This article summarizes what you need to know about this product.

What You Need to Know About Catalyst 6800ia?

If you are familiar with Nexus 2K in datacenter, let’s meet its counterpart for wiring closet. Cisco Catalyst 6800ia Instant Access has been introduced to fulfill the need of those that use 6500/6800 switches for user access, especially the 6500 knowing that all the its PoE linecards (61xx,63xx,65xx) have become End-of-Sale (EoS). Here is some critical information that will help you decide if 6800ia is right for your environment.

Cisco 4500 4500X 6500 VSS Configuration

Virtual Switching System (VSS) is a method to combine two physical switches into one logical switch to achieve physical redundancy, Spanning-Tree blocking elimination, and increased bandwidth. VSS was first available in Cisco 6500 but it has recently been introduced to Cisco 4500 and 4500X. This article provides configuration that will allow you to easily enable VSS on these switches.

What You Need to Know About Cisco IE-3000 Industrial Ethernet Switch

If you are looking for Cisco switch to operate in an extreme environment, one of your options might be Cisco Industrial Ethernet 3000 (IE-3000). I have recently had an opportunity to review this product and quickly realized its differences from regular Cisco Catalyst switches. Since this is a switch that not a lot of people may have come across, I am going to provide a quick summary to highlight important characteristic of the switch and clarify switch hardware configuration so you do not have to spend hours going through Cisco documentations. The same information can be found on the datasheet and hardware install guide of the switch.

Tags: 

SEC0089 - ACS 5.4 TACACS Device Admin on WLC

The video shows you how to enable Device Admin using TACACS+ on Cisco Wireless LAN Controller (WLC) with ACS 5.4. Since WLC enforces admin access based on roles and not shell privilege, we will need to utilize TACACS+ custom attribute. The configuration will be performed on both WLC and ACS. We will attempt to restrict admin access to each of the configuration tab on the WLC using role assignment.
Topic:
  • Network Device and Network Device Group
  • Device Filter
  • Policy Element
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - switch

Poll

Vote for the Next Video Series