View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

wireless

SEC0048 - ISE 1.1 User and Machine Authentication with EAP Chaining (Part 1)

The video demonstrate how Cisco ISE EAP Chaining can solve caveats on user and machine authentication inherent to Windows native supplicant. In part 1 of this video, we will steps through necessary authentication and authorization policies configurations to support EAP Chaining for both wired and wireless. In part 2, we will go through configuration on NAM Profile Editor to create a .xml file that will be used by the NAM module to gain network access. The video ends with wired and wireless testing and seeing how EAP Chaining appears in authentication log on Cisco ISE.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0047 - ISE 1.1 iPhone SCEP Certificate Install with EAP-TLS

The video presents one of possible methods to tag an iDevice (eg. iPhone, iPad) as a corporate asset using a certificate. We will walk through a profile creation using an iPhone Configuration Utility and installation on an iDevice. We will be observing a device requesting a certificate through SCEP, and, once obtained, perform wireless authentication using EAP-TLS against Cisco ISE. Authorization conditions will be constructed to look for a specific Common Name (CN) on the certificate, and appropriate access will be granted upon a match. iPhone will be used for testing in this video.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0046 - ISE 1.1 Wireless 802.1X and Machine Authentication with EAP-TLS

The video walks you through configuration of wireless 802.1X using EAP-TLS on Cisco ISE. We will look how to configure authentication and authorization policies to support both user and machine authentication, how to restrict network access with DACL, and how to use Machine Access Restriction (MAR) to correlate user and machine sessions to ensure a user can access the network only from a domain (corporate) computer. We will perform testing from both domain, non-domain computers, and iPhone, and observe the authentication results.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0044 - ISE 1.1 Wireless 802.1X and Machine Authentication with PEAP

The video walks you through configuration of wireless 802.1X using PEAP on Cisco ISE. We will look how to configure authentication and authorization policies to support both user and machine authentication, how to restrict network access with DACL, and how to use Machine Access Restriction (MAR) to correlate user and machine sessions to ensure a user can access the network only from a domain (corporate) computer. We will perform testing from domain, non-domain computers, and iPhone and observe the authentication results.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0042 - Windows 2008 Wired and Wireless Setting Deployment with GPO

The video demonstrates how to selectively distribute wired and wireless network settings to Windows domain computers based on Computer security group. This is very useful if you need to deploy or update network settings in a large Windows environment.

Topic:
  • Windows Wired Setting in GPO
  • Windows Wireless Setting GPO
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

WL0001 - vWLC 7.3 VMware Installation

The video demonstrates installation of a virtual Wireless LAN Controller (vWLC). We will step through the configuration starting from the creation of a virtual machine all the way to enabling evaluation license,  having an access point join the controller and a user connects to a SSID. There will be mentions of certain requirements needed for successful configuration. We recommend basic knowledge of VMware ESXi before viewing this video. 

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

Cisco Virtual Wireless LAN Controller (vWLC) 7.3 Installation Caveats

Cisco has released a Virtual Wireless LAN Controller (vWLC), a VM version of a controller that has always been an appliance or hardware module, with 60-day evaluation at installation. Your first thought might be less hardware cost and a WLC can take all the advantages of being a VM. For those of you who like to lab, like myself, but always have difficulty getting your hands on a WLC, this may seems like a great news that you can now have a WLC readily available for testing. Well, this is very true as long as you have thoroughly reviewed the vWLC Deployment Guide and understand all the requirements and limitations, otherwise, you may find out the hard way that things may not work the way you expected them to. In this article, we will point out two important caveats that you need to be aware of in order to have a vWLC setup and functioning correctly. Please refer to the vWLC Deployment Guide for pre-requisites and detail installation steps.

Pages

Subscribe to RSS - wireless

Poll

Vote for the Next Video Series