Implementing and Configuring Cisco Identity Services Engine (SISE) – Outline

Detailed Course Outline

  • Section 1: Introducing Cisco ISE Architecture and Deployment
    • Using Cisco ISE as a Network Access Policy Engine
    • Cisco ISE Use Cases
    • Describing Cisco ISE Functions
    • Cisco ISE Deployment Models
    • Context Visibility
  • Section 2: Cisco ISE Policy Enforcement
    • Using 802.1X for Wired and Wireless Access
    • Using MAC Authentication Bypass for Wired and Wireless Access
    • Introducing Identity Management
    • Configuring Certificate Services
    • Introducing Cisco ISE Policy
    • Implementing Third-Party Network Access Device Support
    • Introducing Cisco TrustSec
    • TrustSec Configuration
    • Easy Connect
  • Section 3: Web Auth and Guest Services
    • Introducing Web Access with Cisco ISE
    • Introducing Guest Access Components
    • Configuring Guest Access Settings
    • Configure Sponsor and Guest Portals
  • Section 4: Cisco ISE Profiler
    • Introducing Cisco ISE Profiler
    • Profiling Deployment and Best Practices
  • Section 5: Cisco ISE BYOD
    • Introducing the Cisco ISE BYOD Process
    • Describing BYOD Flow
    • Configuring the My Devices Portal
    • Configuring Certificates in BYOD Scenarios
  • Section 6: Cisco ISE Endpoint Compliance Services
    • Introducing Endpoint Compliance Services
    • Configuring Client Posture Services and Provisioning
  • Section 7: Working with Network Access Devices
    • Review AAA
    • Cisco ISE TACACS+ Device Administration
    • Configure TACACS+ Device Administration
    • TACACS+ Device Administration Guidelines and Best Practices
    • Migrating from Cisco ACS to Cisco ISE

Lab Outline:

  • Discovery 1: Access the SISE Lab and Install ISE 3.1
  • Discovery 2: Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage
  • Discovery 3: Integrate Cisco ISE with Active Directory
  • Discovery 4: Configure Cisco ISE Policy
  • Discovery 5: Configure Access Policy for Easy Connect
  • Discovery 6: Configure Guest Access
  • Discovery 7: Configure Guest Access Operations
  • Discovery 8: Create Guest Reports
  • Discovery 9: Configure Profiling
  • Discovery 10: Customize the Cisco ISE Profiling Configuration
  • Discovery 11: Create Cisco ISE Profiling Reports
  • Discovery 12: Configure BYOD
  • Discovery 13: Blacklisting a Device
  • Discovery 14: Configure Cisco ISE Compliance Services
  • Discovery 15: Configure Client Provisioning
  • Discovery 16: Configure Posture Policies
  • Discovery 17: Test and Monitor Compliance Based Access
  • Discovery 18: Test Compliance Policy
  • Discovery 19: Configure Cisco ISE for Basic Device Administration
  • Discovery 20: Configure TACACS+ Command Authorization