Introduction |
|
xxxvi | |
|
Part I Authentication, Authorization, and Accounting |
|
|
|
Chapter 1 Fundamentals of AAA |
|
|
2 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
3 | (2) |
|
|
5 | (1) |
|
Comparing and Selecting AAA Options |
|
|
5 | (2) |
|
Device Administration AAA |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (5) |
|
TACACS+ Authentication Messages |
|
|
9 | (1) |
|
TACACS+ Authorization and Accounting Messages |
|
|
10 | (2) |
|
|
12 | (4) |
|
|
15 | (1) |
|
Change of Authorization (CoA) |
|
|
16 | (1) |
|
Comparing RADIUS and TACACS+ |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
Chapter 2 Identity Management |
|
|
18 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (14) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Multifactor Authentication |
|
|
26 | (3) |
|
One-Time Password (OTP) Services |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Has the Digital Certificate Been Signed by a Trusted CA? |
|
|
31 | (1) |
|
Has the Certificate Expired? |
|
|
32 | (1) |
|
Has the Certificate Been Revoked? |
|
|
33 | (1) |
|
Identity Source Sequences |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (2) |
|
Chapter 3 Extensible Authentication Protocol (EAP) over LAN: 802.1X |
|
|
38 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
38 | (3) |
|
|
41 | (1) |
|
Extensible Authentication Protocol |
|
|
41 | (1) |
|
|
41 | (9) |
|
|
42 | (1) |
|
Native EAP Types (Non-Tunneled EAP) |
|
|
43 | (1) |
|
|
44 | (3) |
|
|
47 | (2) |
|
EAP Authentication Type Identity Store Comparison |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (23) |
|
Windows Native Supplicant |
|
|
50 | (8) |
|
|
58 | (1) |
|
Machine Authentication (Computer Authentication) |
|
|
58 | (1) |
|
Cisco AnyConnect NAM Supplicant |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (9) |
|
|
71 | (1) |
|
Implementing AnyConnect NAM Profiles |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (2) |
|
Chapter 4 Non-802.1X Authentication |
|
|
76 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
76 | (3) |
|
|
79 | (1) |
|
Devices Without a Supplicant |
|
|
79 | (1) |
|
MAC Authentication Bypass |
|
|
80 | (3) |
|
|
83 | (5) |
|
|
84 | (1) |
|
Local Web Authentication with a Centralized Portal |
|
|
84 | (1) |
|
Centralized Web Authentication |
|
|
85 | (2) |
|
Centralized Web Authentication with Third-Party Network Device Support |
|
|
87 | (1) |
|
Remote-Access Connections |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Chapter 5 Introduction to Advanced Concepts |
|
|
92 | (12) |
|
"Do I Know This Already?" Quiz |
|
|
92 | (3) |
|
|
95 | (1) |
|
|
95 | (1) |
|
Automating MAC Authentication Bypass (MAB) |
|
|
96 | (3) |
|
|
99 | (2) |
|
Mobile Device Management (MDM) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Part II Cisco Identity Services Engine |
|
|
|
Chapter 6 Cisco Identity Services Engine Architecture |
|
|
104 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (2) |
|
|
108 | (3) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Physical or Virtual Appliances |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (2) |
|
|
116 | (4) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (2) |
|
Chapter 7 A Guided Tour of the Cisco ISE Graphical User Interface (GUI) |
|
|
122 | (52) |
|
"Do I Know This Already?" Quiz |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
125 | (17) |
|
|
125 | (7) |
|
|
132 | (5) |
|
|
137 | (2) |
|
Global Search for Endpoints |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Organization of the ISE GUI |
|
|
142 | (29) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (2) |
|
Threat-Centric NAC Live Logs |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (6) |
|
|
161 | (2) |
|
|
163 | (3) |
|
|
166 | (3) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Chapter 8 Initial Configuration of Cisco ISE |
|
|
174 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
174 | (3) |
|
|
177 | (1) |
|
Cisco Identity Services Engine Form Factors |
|
|
177 | (1) |
|
|
177 | (15) |
|
Where Are Certificates Used with Cisco Identity Services Engine? |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (10) |
|
|
192 | (2) |
|
|
192 | (1) |
|
|
192 | (2) |
|
|
194 | (10) |
|
Local User Identity Groups |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Prerequisites for Joining an Active Directory Domain |
|
|
196 | (1) |
|
Joining an Active Directory Domain |
|
|
197 | (5) |
|
Certificate Authentication Profile (CAP) |
|
|
202 | (1) |
|
Identity Source Sequences |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Chapter 9 Authentication Policies |
|
|
206 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
207 | (2) |
|
|
209 | (1) |
|
The Relationship Between Authentication and Authorization |
|
|
209 | (1) |
|
|
210 | (1) |
|
Goal 1 Accept Only Allowed Protocols |
|
|
210 | (1) |
|
Goal 2 Select the Correct Identity Store |
|
|
210 | (1) |
|
Goal 3 Validate the Identity |
|
|
211 | (1) |
|
Goal 4 Pass the Request to the Authorization Policy |
|
|
211 | (1) |
|
Understanding Policy Sets |
|
|
211 | (5) |
|
|
213 | (3) |
|
Understanding Authentication Policies |
|
|
216 | (4) |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Common Authentication Policy Examples |
|
|
220 | (7) |
|
|
220 | (3) |
|
|
223 | (1) |
|
Alternative ID Stores Based on EAP Type |
|
|
224 | (3) |
|
|
227 | (2) |
|
Restore the Authentication Policy |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (2) |
|
Chapter 10 Authorization Policies |
|
|
232 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
232 | (3) |
|
|
235 | (1) |
|
Authentication Versus Authorization |
|
|
235 | (1) |
|
|
235 | (14) |
|
Goals of Authorization Policies |
|
|
235 | (1) |
|
Understanding Authorization Policies |
|
|
236 | (5) |
|
Role-Specific Authorization Rules |
|
|
241 | (1) |
|
Authorization Policy Example |
|
|
241 | (1) |
|
Employee Full Access Rule |
|
|
241 | (2) |
|
Internet Only for Smart Devices Rule |
|
|
243 | (3) |
|
Employee Limited Access Rule |
|
|
246 | (3) |
|
Saving Conditions for Reuse |
|
|
249 | (7) |
|
Combining AND with OR Operators |
|
|
252 | (4) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
256 | (2) |
|
Part III Implementing Secure Network Access |
|
|
|
Chapter 11 Implement Wired and Wireless Authentication |
|
|
258 | (48) |
|
"Do I Know This Already?" Quiz |
|
|
259 | (2) |
|
|
261 | (1) |
|
Authentication Configuration on Wired Switches |
|
|
261 | (15) |
|
Global Configuration AAA Commands |
|
|
261 | (1) |
|
Global Configuration RADIUS Commands |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
IOS 12.2.x, 15.x, and IOS XE |
|
|
264 | (2) |
|
|
266 | (1) |
|
Device Tracking in IOS XE 16.x and Later |
|
|
267 | (1) |
|
Creating Local Access Control Lists |
|
|
268 | (1) |
|
Interface Configuration Settings for All Cisco Switches |
|
|
269 | (1) |
|
Configure Interfaces as Switch Ports |
|
|
269 | (1) |
|
Configure Flexible Authentication and High Availability |
|
|
269 | (3) |
|
Host Mode of the Switch Port |
|
|
272 | (2) |
|
Configure Authentication Settings |
|
|
274 | (1) |
|
Configure Authentication Timers |
|
|
275 | (1) |
|
Apply the Initial ACL to the Port and Enable Authentication |
|
|
275 | (1) |
|
Authentication Configuration on WLCs |
|
|
276 | (19) |
|
Configure the AAA Servers |
|
|
276 | (1) |
|
Add the RADIUS Authentication Servers |
|
|
277 | (1) |
|
Add the RADIUS Accounting Servers |
|
|
278 | (1) |
|
Configure RADIUS Fallback (High Availability) |
|
|
279 | (1) |
|
Configure the Airespace ACLs |
|
|
280 | (1) |
|
Create the Web Authentication Redirection ACL |
|
|
280 | (2) |
|
Add Google URLs for ACL Bypass |
|
|
282 | (1) |
|
Create the Posture Agent Redirection ACL |
|
|
283 | (1) |
|
Create the Dynamic Interfaces for the Client VLANs |
|
|
284 | (1) |
|
Create the Employee Dynamic Interface |
|
|
284 | (1) |
|
Create the Guest Dynamic Interface |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (4) |
|
Create the Corporate WLAN |
|
|
291 | (4) |
|
|
295 | (8) |
|
Endpoint Supplicant Verification |
|
|
295 | (1) |
|
Network Access Device Verification |
|
|
296 | (1) |
|
Verifying Authentications with Cisco Switches |
|
|
296 | (3) |
|
|
299 | (1) |
|
Verifying Authentications with Cisco WLCs |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (2) |
|
Chapter 12 Web Authentication |
|
|
306 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
306 | (3) |
|
|
309 | (1) |
|
Web Authentication Scenarios |
|
|
309 | (4) |
|
Local Web Authentication (LWA) |
|
|
310 | (1) |
|
Centralized Web Authentication (CWA) |
|
|
311 | (2) |
|
Configuring Centralized Web Authentication |
|
|
313 | (9) |
|
Cisco Switch Configuration |
|
|
313 | (1) |
|
Configure Certificates on the Switch |
|
|
313 | (1) |
|
Enable the Switch HTTP/HTTPS Server |
|
|
314 | (1) |
|
Verify the URL-Redirect ACL |
|
|
314 | (1) |
|
|
315 | (1) |
|
Validate That MAC Filtering Is Enabled on the WLAN |
|
|
315 | (1) |
|
Validate That ISE NAC Is Enabled on the WLAN |
|
|
315 | (1) |
|
Validate That the URL-Redirection ACL Is Configured |
|
|
316 | (1) |
|
Configure ISE for Centralized Web Authentication |
|
|
317 | (1) |
|
Configure MAB Continue for the Authentication |
|
|
318 | (1) |
|
Verify the Web Authentication Identity Source Sequence |
|
|
319 | (1) |
|
Configure a dACL for Pre-WebAuth Authorization |
|
|
319 | (1) |
|
Configure an Authorization Profile |
|
|
320 | (2) |
|
Building CWA Authorization Policies |
|
|
322 | (2) |
|
Create the Rule to Redirect Users to the CWA Portal |
|
|
323 | (1) |
|
Create the Rules to Authorize Users Who Authenticate via CWA |
|
|
323 | (1) |
|
Verifying Centralized Web Authentication |
|
|
324 | (7) |
|
Check the Experience from the Client |
|
|
324 | (3) |
|
Verify CWA Through the ISE UI |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Show Commands on the Wired Switch |
|
|
328 | (1) |
|
Viewing the Client Details on the WLC |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (2) |
|
Chapter 13 Guest Services |
|
|
334 | (68) |
|
"Do I Know This Already?" Quiz |
|
|
334 | (3) |
|
|
337 | (1) |
|
|
337 | (4) |
|
Portals, Portals, and More Portals! |
|
|
341 | (10) |
|
|
341 | (1) |
|
|
342 | (1) |
|
Self-Registered Guest Portal |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Guest Portals and Authorization Policy Rules |
|
|
348 | (3) |
|
Configuring Guest Portals and Authorization Rules |
|
|
351 | (30) |
|
Configuring a Hotspot Guest Portal |
|
|
351 | (1) |
|
Portal Behavior and Flow' Settings |
|
|
351 | (7) |
|
Portal Page Customization |
|
|
358 | (4) |
|
Authorization Rule Configuration |
|
|
362 | (3) |
|
Configuring a Self-Registered Guest Portal |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
Registration Form Settings |
|
|
368 | (3) |
|
Self-Registration Success |
|
|
371 | (1) |
|
Guest Change Password Settings and Guest Device Registration Settings |
|
|
371 | (1) |
|
|
372 | (1) |
|
Guest Device Compliance Settings |
|
|
373 | (1) |
|
Authorization Rule Configuration |
|
|
373 | (7) |
|
Configuring a Sponsored Guest Portal |
|
|
380 | (1) |
|
|
381 | (13) |
|
|
381 | (3) |
|
|
384 | (1) |
|
|
385 | (1) |
|
Login Settings and AUP Page Settings |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Provisioning Guest Accounts from a Sponsor Portal |
|
|
389 | (5) |
|
|
394 | (6) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (58) |
|
"Do I Know This Already?" Quiz |
|
|
402 | (2) |
|
|
404 | (1) |
|
|
404 | (20) |
|
|
406 | (3) |
|
|
409 | (1) |
|
|
409 | (2) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
423 | (1) |
|
Infrastructure Configuration |
|
|
424 | (5) |
|
|
424 | (1) |
|
|
424 | (1) |
|
VLAN Access Control Lists (VACLs) |
|
|
425 | (1) |
|
|
426 | (1) |
|
VMware Configurations to Allow Promiscuous Mode |
|
|
427 | (2) |
|
|
429 | (13) |
|
|
429 | (1) |
|
Configuring the Profiler Feed Service |
|
|
429 | (1) |
|
Verifying the Profiler Feed Service |
|
|
429 | (2) |
|
Endpoint Profile Policies |
|
|
431 | (10) |
|
|
441 | (1) |
|
|
442 | (8) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Configure SNMP Settings for Probes |
|
|
444 | (1) |
|
Endpoint Attribute Filtering |
|
|
444 | (1) |
|
Custom Attributes for Profiling |
|
|
445 | (5) |
|
Publishing Endpoint Probe Data on pxGrid |
|
|
450 | (1) |
|
Profiles in Authorization Policies |
|
|
450 | (4) |
|
|
450 | (3) |
|
|
453 | (1) |
|
|
454 | (4) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (2) |
|
Device Sensor show Commands |
|
|
457 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
458 | (2) |
|
Part IV Advanced Secure Network Access |
|
|
|
Chapter 15 Certificate-Based Authentication |
|
|
460 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
460 | (3) |
|
|
463 | (1) |
|
Certificate Authentication Primer |
|
|
463 | (6) |
|
Determine If a Trusted Authority Has Signed the Digital Certificate |
|
|
463 | (2) |
|
Examine Both the Start and End Dates to Determine If the Certificate Has Expired |
|
|
465 | (1) |
|
Verify If the Certificate Has Been Revoked |
|
|
466 | (2) |
|
Validate That the Client Has Provided Proof of Possession |
|
|
468 | (1) |
|
A Common Misconception About Active Directory |
|
|
469 | (1) |
|
|
470 | (1) |
|
Configuring ISE for Certificate-Based Authentications |
|
|
470 | (9) |
|
Validate Allowed Protocols |
|
|
470 | (1) |
|
Certificate Authentication Profile |
|
|
471 | (1) |
|
Verify the Authentication Policy Is Using the CAP |
|
|
472 | (2) |
|
|
474 | (1) |
|
Ensure the Client Certificates Are Trusted |
|
|
475 | (1) |
|
Import the Certificate Authority's Public Certificate |
|
|
476 | (2) |
|
Configure Certificate Status Verification (Optional) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (2) |
|
Chapter 16 Bring Your Own Device |
|
|
482 | (66) |
|
"Do I Know This Already?" Quiz |
|
|
483 | (2) |
|
|
485 | (1) |
|
|
485 | (2) |
|
|
487 | (2) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
Configuring NADs for Onboarding |
|
|
489 | (6) |
|
Configuring a WLC for Dual SSID Onboarding |
|
|
489 | (1) |
|
Review of the WLAN Configuration |
|
|
490 | (2) |
|
|
492 | (3) |
|
ISE Configuration for Onboarding |
|
|
495 | (28) |
|
|
496 | (1) |
|
Single SSID with Apple iOS Example |
|
|
496 | (7) |
|
Dual SSID with Android Example |
|
|
503 | (5) |
|
Unsupported Mobile Device: BlackBerry Example |
|
|
508 | (2) |
|
Configuring ISE for Onboarding |
|
|
510 | (1) |
|
Creating the Native Supplicant Profile |
|
|
510 | (2) |
|
Configure the Client Provisioning Policy |
|
|
512 | (2) |
|
|
514 | (1) |
|
Verify Default Unavailable Client Provisioning Policy Action |
|
|
515 | (1) |
|
Create the Authorization Profiles |
|
|
516 | (1) |
|
Create the Authorization Rules for Onboarding |
|
|
517 | (1) |
|
Create the Authorization Rules for the EAP-TLS Authentications |
|
|
518 | (1) |
|
ISE as a Certificate Authority |
|
|
519 | (1) |
|
|
520 | (1) |
|
Configuring ISE as an Intermediate CA |
|
|
521 | (2) |
|
BYOD Onboarding Process Detailed |
|
|
523 | (11) |
|
|
523 | (1) |
|
Phase 1 Device Registration |
|
|
523 | (2) |
|
Phase 2 Device Enrollment |
|
|
525 | (1) |
|
Phase 3 Device Provisioning |
|
|
526 | (1) |
|
|
526 | (1) |
|
Phase 1 Device Registration |
|
|
526 | (2) |
|
Phase 2 NSP App Download App |
|
|
528 | (1) |
|
Phase 3 Device Provisioning |
|
|
529 | (2) |
|
|
531 | (1) |
|
Phase 1 Device Registration |
|
|
531 | (1) |
|
Phase 2 Device Provisioning |
|
|
532 | (2) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (7) |
|
|
536 | (1) |
|
Configuring MDM Integration |
|
|
537 | (2) |
|
Configuring MDM Onboarding Rules |
|
|
539 | (1) |
|
Create the Authorization Profile |
|
|
539 | (1) |
|
Create the Authorization Rules |
|
|
540 | (2) |
|
|
542 | (3) |
|
|
543 | (2) |
|
Administrative Management |
|
|
545 | (1) |
|
The Opposite of BYOD: Identify Corporate Systems |
|
|
545 | (1) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
Chapter 17 TrustSec and MACsec |
|
|
548 | (78) |
|
"Do I Know This Already?" Quiz |
|
|
548 | (3) |
|
|
551 | (1) |
|
Ingress Access Control Challenges |
|
|
551 | (4) |
|
|
551 | (2) |
|
Ingress Access Control Lists |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
What Is a Security Group Tag? |
|
|
556 | (1) |
|
What Is the TrustSec Architecture? |
|
|
557 | (1) |
|
TrustSec-Enabled Network Access Devices |
|
|
558 | (8) |
|
Defining the TrustSec Settings for a Network Access Device |
|
|
559 | (1) |
|
Configuring an IOS XE Switch for TrustSec |
|
|
560 | (4) |
|
Configuring an ASA for TrustSec |
|
|
564 | (2) |
|
Network Device Admission Control (NDAC) |
|
|
566 | (6) |
|
Configuring the Seed Device |
|
|
566 | (1) |
|
Configuring the Non-Seed Device |
|
|
567 | (5) |
|
|
572 | (3) |
|
|
575 | (6) |
|
Dynamically Assigning SGT via 802.1X |
|
|
577 | (1) |
|
Manually Assigning SGTs to a Port |
|
|
577 | (1) |
|
Manually Binding IP Addresses to SGTs in ISE |
|
|
578 | (2) |
|
Access-Layer Devices That Do Not Support SGTs |
|
|
580 | (1) |
|
Mapping a Subnet to an SGT |
|
|
580 | (1) |
|
|
580 | (1) |
|
Transport: SGT Exchange Protocol (SXP) |
|
|
581 | (12) |
|
|
582 | (2) |
|
|
584 | (3) |
|
Configuring SXP on IOS Devices |
|
|
587 | (3) |
|
Configuring SXP on Wireless LAN Controllers |
|
|
590 | (1) |
|
Configuring SXP on Cisco ASA |
|
|
591 | (1) |
|
Verifying SXP Connections in ASDM |
|
|
592 | (1) |
|
Transport: Native Tagging |
|
|
593 | (4) |
|
Configuring Native SGT Propagation (Tagging) |
|
|
594 | (1) |
|
Configuring Manual SGT Propagation on Cisco IOS XE Switches |
|
|
595 | (2) |
|
|
597 | (16) |
|
|
597 | (4) |
|
Configuring Security Group ACLs |
|
|
601 | (3) |
|
|
604 | (1) |
|
Configuring the TrustSec Policy Matrix |
|
|
605 | (6) |
|
|
611 | (1) |
|
Security Group Firewall on the ASA |
|
|
612 | (1) |
|
Security Group Firewall on the Firepower |
|
|
612 | (1) |
|
Security Group Firewall on the ISR and ASR |
|
|
613 | (1) |
|
Software-Defined Access (SD-Access) |
|
|
613 | (1) |
|
|
614 | (9) |
|
|
616 | (2) |
|
Switch Configuration Modes |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Manually Configuring Uplink MACsec |
|
|
620 | (2) |
|
Verifying the Manual Configuration |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
623 | (1) |
|
|
623 | (1) |
|
|
624 | (2) |
|
Chapter 18 Posture Assessment |
|
|
626 | (88) |
|
"Do I Know This Already?" Quiz |
|
|
626 | (3) |
|
|
629 | (1) |
|
Posture Assessment with ISE |
|
|
629 | (7) |
|
A Bit of a History Lesson |
|
|
629 | (4) |
|
|
633 | (3) |
|
|
636 | (59) |
|
Update the Compliance Modules |
|
|
637 | (1) |
|
Configure Client Provisioning |
|
|
638 | (1) |
|
|
638 | (2) |
|
|
640 | (2) |
|
Upload AnyConnect Headend Deployment Packages to ISE |
|
|
642 | (8) |
|
Configure the Client Provisioning Portal |
|
|
650 | (2) |
|
Configure the Client Provisioning Policy |
|
|
652 | (1) |
|
Configuring Posture Policy Elements |
|
|
653 | (1) |
|
|
654 | (25) |
|
|
679 | (8) |
|
|
687 | (1) |
|
Configure Posture Policies |
|
|
688 | (2) |
|
Other Important Posture Settings |
|
|
690 | (1) |
|
|
691 | (1) |
|
Cache Last Known Posture Compliant Status |
|
|
691 | (1) |
|
Reassessment Configurations |
|
|
691 | (2) |
|
|
693 | (1) |
|
Create an Authorization Profile for Redirection |
|
|
693 | (1) |
|
Create the Authorization Rules |
|
|
694 | (1) |
|
|
695 | (12) |
|
Scenario 1 AnyConnect Not Installed on Endpoint Yet |
|
|
696 | (4) |
|
Scenario 2 AnyConnect Already Installed, Endpoint Not Compliant |
|
|
700 | (3) |
|
|
703 | (2) |
|
Scenario 4 Temporal Agent and Posture Compliant |
|
|
705 | (2) |
|
|
707 | (6) |
|
Create Mobile Posture Authorization Conditions |
|
|
709 | (1) |
|
Create Mobile Posture Authorization Rules |
|
|
710 | (3) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
Part V Safely Deploying in the Enterprise |
|
|
|
Chapter 19 Deploying Safely |
|
|
714 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
714 | (3) |
|
|
717 | (1) |
|
Why Use a Phased Approach? |
|
|
717 | (2) |
|
Comparing authentication open to Standard 802.1X |
|
|
719 | (1) |
|
Prepare ISE for a Staged Deployment |
|
|
720 | (2) |
|
|
722 | (3) |
|
|
725 | (3) |
|
|
728 | (2) |
|
Transitioning from Monitor Mode to Your End State |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
732 | (2) |
|
Chapter 20 ISE Scale and High Availability |
|
|
734 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
734 | (3) |
|
|
737 | (1) |
|
Configuring ISE Nodes in a Distributed Environment |
|
|
737 | (6) |
|
Make the First Node a Primary Device |
|
|
738 | (1) |
|
Registering an ISE Node to the Deployment |
|
|
739 | (3) |
|
Ensure That the Persona of Each Node Is Accurate |
|
|
742 | (1) |
|
Understanding the High Availability Options Available |
|
|
743 | (8) |
|
Primary and Secondary Nodes |
|
|
743 | (1) |
|
Monitoring and Troubleshooting Nodes |
|
|
743 | (2) |
|
Policy Administration Nodes |
|
|
745 | (1) |
|
Promoting the Secondary PAN to Primary |
|
|
745 | (1) |
|
|
745 | (1) |
|
Configuring Automatic Failover for the Primary PAN |
|
|
746 | (1) |
|
Licensing in a Multi-Node ISE Cube |
|
|
747 | (1) |
|
|
748 | (2) |
|
Add the Policy Services Nodes to the Node Group |
|
|
750 | (1) |
|
|
751 | (6) |
|
|
752 | (1) |
|
|
753 | (1) |
|
Anycast High Availability for ISE PSNs |
|
|
753 | (3) |
|
|
756 | (1) |
|
Maintaining ISE Deployments |
|
|
757 | (4) |
|
|
757 | (2) |
|
|
759 | (2) |
|
|
761 | (1) |
|
|
761 | (1) |
|
|
761 | (1) |
|
|
762 | (2) |
|
Chapter 21 Troubleshooting Tools |
|
|
764 | (54) |
|
"Do I Know This Already?" Quiz |
|
|
764 | (2) |
|
|
766 | (1) |
|
|
766 | (19) |
|
|
766 | (5) |
|
|
771 | (1) |
|
Authentication Details Report |
|
|
771 | (3) |
|
|
774 | (2) |
|
|
776 | (1) |
|
Logging and Remote Logging |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
779 | (1) |
|
Downloading Debug Logs from the GUI |
|
|
780 | (1) |
|
Viewing Log Files from the CLI |
|
|
781 | (1) |
|
|
782 | (3) |
|
|
785 | (19) |
|
RADIUS Authentication Troubleshooting Tool |
|
|
785 | (2) |
|
Execute Network Device Command |
|
|
787 | (1) |
|
Evaluate Configuration Validator |
|
|
788 | (6) |
|
|
794 | (2) |
|
|
796 | (2) |
|
|
798 | (3) |
|
|
801 | (3) |
|
Troubleshooting Methodology |
|
|
804 | (4) |
|
|
805 | (2) |
|
|
807 | (1) |
|
Troubleshooting Outside of ISE |
|
|
808 | (7) |
|
|
809 | (1) |
|
Cisco AnyConnect Diagnostics and Reporting Tool (DART) |
|
|
809 | (3) |
|
Supplicant Provisioning Logs |
|
|
812 | (1) |
|
Network Device Troubleshooting |
|
|
812 | (1) |
|
Show Authentication Session Interface |
|
|
812 | (1) |
|
Viewing Client Details on the WLC |
|
|
813 | (2) |
|
|
815 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
|
816 | (2) |
|
Part VI Extending Secure Access Control |
|
|
|
Chapter 22 ISE Context Sharing and Remediation |
|
|
818 | (50) |
|
"Do I Know This Already?" Quiz |
|
|
818 | (2) |
|
|
820 | (1) |
|
Integration Types in the ISE Ecosystem |
|
|
820 | (5) |
|
|
820 | (1) |
|
|
821 | (3) |
|
|
824 | (1) |
|
|
825 | (42) |
|
|
826 | (1) |
|
|
827 | (1) |
|
Configuring ISE for pxGrid |
|
|
828 | (3) |
|
Configuring pxGrid Participants |
|
|
831 | (1) |
|
Configuring Firepower Management Center for Identity with pxGrid |
|
|
831 | (19) |
|
Configuring the Web Security Appliance |
|
|
850 | (7) |
|
Integrating Stealthwatch and ISE |
|
|
857 | (10) |
|
|
867 | (1) |
|
|
867 | (1) |
|
|
867 | (1) |
|
|
867 | (1) |
|
Chapter 23 Threat Centric NAC |
|
|
868 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
868 | (3) |
|
|
871 | (1) |
|
Vulnerabilities and Threats, Oh My! |
|
|
871 | (1) |
|
Integrating Vulnerability Assessment Sources |
|
|
872 | (18) |
|
|
873 | (1) |
|
|
874 | (4) |
|
Configure the Integration with a Vulnerability Assessment Vendor |
|
|
878 | (6) |
|
Authorization Profile and Authorization Rules |
|
|
884 | (3) |
|
Seeing TC-NAC with Vulnerability Scanners in Action |
|
|
887 | (1) |
|
|
888 | (2) |
|
Integrating with Threat Sources |
|
|
890 | (14) |
|
Cognitive Threat Analytics (CTA) |
|
|
890 | (2) |
|
Create a CTA STIX/TAXII API Account |
|
|
892 | (2) |
|
Create a CTA Integration for TC-NAC |
|
|
894 | (2) |
|
Using CTA with Authorization |
|
|
896 | (1) |
|
|
897 | (2) |
|
|
899 | (1) |
|
Configuring the AMP Adapter |
|
|
900 | (4) |
|
|
904 | (1) |
|
|
904 | (1) |
|
|
905 | (1) |
|
|
905 | (1) |
|
Part VII Device Administration AAA |
|
|
|
Chapter 24 Device Administration AAA with ISE |
|
|
906 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
906 | (3) |
|
|
909 | (1) |
|
Device Administration AAA Refresher |
|
|
909 | (1) |
|
Device Administration in ISE |
|
|
910 | (7) |
|
Device Administration Design |
|
|
911 | (1) |
|
|
912 | (1) |
|
|
913 | (1) |
|
|
913 | (1) |
|
|
914 | (2) |
|
|
916 | (1) |
|
Device Administration Global Settings |
|
|
917 | (2) |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
918 | (1) |
|
Device Administration Work Center |
|
|
919 | (9) |
|
|
920 | (1) |
|
|
921 | (1) |
|
|
922 | (1) |
|
|
922 | (1) |
|
|
923 | (2) |
|
|
925 | (2) |
|
|
927 | (1) |
|
|
928 | (1) |
|
|
928 | (1) |
|
|
928 | (2) |
|
Chapter 25 Configuring Device Administration AAA with Cisco IOS |
|
|
930 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
930 | (2) |
|
|
932 | (1) |
|
Overview of IOS Device Administration AAA |
|
|
932 | (4) |
|
|
932 | (2) |
|
|
934 | (2) |
|
Configure ISE and an IOS Device for Device Administration AAA |
|
|
936 | (15) |
|
Prepare ISE for IOS Device Administration AAA |
|
|
937 | (1) |
|
Ensure That the Device Administration Service Is Enabled |
|
|
937 | (1) |
|
Prepare the Network Device |
|
|
937 | (2) |
|
|
939 | (1) |
|
Configure the TACACS Profiles |
|
|
939 | (2) |
|
Configure the TACACS Command Sets |
|
|
941 | (2) |
|
|
943 | (3) |
|
IOS Configuration for TACACS+ |
|
|
946 | (1) |
|
Configure TACACS+ Authentication and Fallback |
|
|
946 | (2) |
|
Configure TACACS+ Command Authorization |
|
|
948 | (3) |
|
Configure TACACS+ Command Accountings |
|
|
951 | (1) |
|
Testing and Troubleshooting |
|
|
951 | (15) |
|
Testing and Troubleshooting in ISE |
|
|
952 | (2) |
|
Troubleshooting at the IOS Command Line |
|
|
954 | (12) |
|
|
966 | (1) |
|
|
966 | (1) |
|
|
967 | (1) |
|
|
967 | (1) |
|
Chapter 26 Configuring Device Admin AAA with the Cisco WLC |
|
|
968 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
968 | (3) |
|
|
971 | (1) |
|
Overview of WLC Device Administration AAA |
|
|
971 | (1) |
|
Configure ISE and the WLC for Device Administration AAA |
|
|
972 | (9) |
|
Prepare ISE for WLC Device Administration AAA |
|
|
972 | (1) |
|
Prepare the Network Device |
|
|
972 | (2) |
|
Prepare the Policy Results |
|
|
974 | (3) |
|
|
977 | (2) |
|
Adding ISE to the WLC TACACS+ Servers |
|
|
979 | (2) |
|
Testing and Troubleshooting |
|
|
981 | (5) |
|
|
986 | (1) |
|
|
986 | (1) |
|
|
987 | (1) |
|
Part VIII Final Preparation |
|
|
|
Chapter 27 Final Preparation |
|
|
988 | (3) |
|
|
988 | (1) |
|
Suggested Plan for Final Review and Study |
|
|
988 | (1) |
|
|
989 | (2) |
|
|
|
|
991 | (11) |
Appendix A Answers to the "Do I Know This Already?" Quizzes and Q&A Sections |
|
1002 | (30) |
Appendix B CCNP Security Implementing and Configuring Cisco Identity Services Engine (SISE 300-715) Exam Updates |
|
1032 | (2) |
Appendix C Sample Switch Configurations |
|
1034 | (28) |
Index |
|
1062 | |
Online Element |
|
Appendix D Study Planner |
|