0345 4506120

Implementing Cisco Secure Access Control System

Cisco channel partners who sell, implement, and maintain Cisco ACS solutions and Security professionals, architects, engineers and network administrators responsible for securing their networks to insureaccess is only by authenticated authorized users, with recordsof their activities.

We don't currently have any courses listed for Implementing Cisco Secure Access Control System, would you like to view all courses for CISCO?

Learning Objectives

After you complete this course you will be able to:

  • Understand how the RADIUS and TACACS+ protocols operate and what purpose they serve.
  • Understand the current ACS solution offering, including ACS Express, ACS Enterprise, ACS on VMware, and appliances such as the CSACS-1120 Series and CSACS-1121 Series
  • Describe the major components of ACS
  • Determine the best installation practices for ACS 5.2
  • Configure the ACS from a default install
  • Understand the Licensing requirements of ACS and how licensing works.
  • Understand how attributes, value types, and predefined values are used
  • Describethe Types of Authentication, Authorization, and Accounting (AAA) clients availalbeand how they access network resources and other AAA clients
  • Work with a local identity store and identity store sequence
  • Understand users and identity stores
  • Configure an external identity store with LDAP
  • Understand the Fundamentals of LDAP
  • Set up LDAP SSL
  • Set up an external identity store with Active Directory
  • Perform AAA with TACACS+
  • Monitor and troubleshoot ACS (AAA with TACACS+)
  • Use a local certificate authority to replace digital certificates self-signed by ACS
  • Introduction to IEEE 802.1x and EAP
  • 802.1x using Windows XP, Windows 7, and AnyConnect 3.x supplicants
  • 802.1x single host authentication
  • 802.1x troubleshooting

Pre-Requisites

Attendees should meet the following prerequisites:

  • CCNA Certification ICND1plus ICND2or CCNABC recommended
  • CCNA Security Certification IINS recommended but not mandatory
  • Working Knowledge of the Microsoft windows operating system

Course Content

In this course, you will learn to provide secure access to network resources using the Cisco Secure Access Control System (ACS) 5.2. You'll examine how the ACS has grown by leaps and bounds since 4.x., discover new features, and learn how the 4.x configurations map to 5.x configurations. You will also get a look into future ACS technologies.

You will learn about the role and importance of ACS in Cisco TrustSec, whether TrustSec is deployed as an appliance-based overlay solution or as a network-integrated 802.1x solution. You will learn about user authentication and authorization, posture assessment, device profiling, guest access, data integrity and confidentiality, centralized policy, collaborative monitoring, troubleshooting, and reporting in Cisco TrustSec solutions.

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Our Customers Include