identity management and access control for security ccie...

85

Upload: vantuyen

Post on 17-Mar-2018

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network
Page 2: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Identity Management and Access Control for Security CCIE Candidates

Mark Bernard

BRKCCIE-3222

Page 3: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cisco Spark

Questions? Use Cisco Spark to chat with the speaker after the session

1. Find this session in the Cisco Live Mobile App

2. Click “Join the Discussion”

3. Install Spark or go directly to the space

4. Enter messages/questions in the space

How

Cisco Spark spaces will be available until July 3, 2017.

cs.co/ciscolivebot#BRKCCIE-3222

Page 4: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

cisco16

<response>

22333

Polling

Our Questions for You We will using polling a few times to get some information from attendees

1. Send a text to 22333 with cisco16 as the body

2. Respond to all the polls as we get to them

3. No need to send the cisco16 again

How

pollev.com/cisco16

4

Page 5: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

• Introduction

• CCIE Security Program Overview

• Cisco Identity Services Engine (ISE) Overview

• Configure, Verify & Troubleshoot Profiling Using Device Sensor

• Configure, Verify & Troubleshoot pxGrid with ISE & WSA

• Conclusion

Agenda

Page 6: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

About Me

• Security Consulting Systems Engineer supporting Enterprise South Operation

• Joined Cisco in 2005

• Based out of Tennessee, USA

• CCIE Mentor for Cisco Employees

• Cisco Live Speaker since 2006

• CCIE #23864, CISSP, [email protected]

@bernarmn

6BRKCCIE-3222

Page 7: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

CCIE Security Program Overview

Page 8: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 8BRKCCIE-3222

CCIE Security TopicsDomain Written Exam Lab Exam

1.0 Perimeter Security and Intrusion

Prevention

21% 23%

2.0 Advanced Threat Protection and

Content Security

17% 19%

3.0 Secure Connectivity and

Segmentation

17% 19%

4.0 Identity Management, Information

Exchange, and Access Control

22% 24%

5.0 Infrastructure Security, Virtualization,

and Automation

13% 15%

6.0 Evolving Technologies 10% N/A

For more details, please visit: http://learningnetwork.cisco.com

Questions? Visit the Learning@Cisco Booth

Page 9: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 9BRKCCIE-3222

Identity Management Topics in CCIE Exam4.1 Describe, implement, and troubleshoot various personas of

ISE in a multinode deployment

4.10 Describe, implement, verify, and troubleshoot provisioning of

AnyConnect with ISE and ASA

4.2 Describe, implement, and troubleshoot network access device

(NAD), ISE, and ACS configuration for AAA

4.11 Describe, implement, verify, and troubleshoot posture

assessment with ISE

4.3 Describe, implement, and troubleshoot AAA for administrative

access to Cisco network devices using ISE and ACS

4.12 Describe, implement, verify, and troubleshoot endpoint

profiling using ISE and Cisco network infrastructure including

device sensor

4.4 Describe, implement, verify, and troubleshoot AAA for network

access with 802.1X and MAB using ISE.

4.13 Describe, implement, verify, and troubleshoot integration of

MDM with ISE

4.5 Describe, implement, verify, and troubleshoot cut-through

proxy/auth-proxy using ISE as the AAA server

4.14 Describe, implement, verify, and troubleshoot certificate based

authentication using ISE

4.6 Describe, implement, verify, and troubleshoot guest life cycle

management using ISE and Cisco network infrastructure

4.15 Describe, implement, verify, and troubleshoot authentication

methods such as EAP Chaining and Machine Access Restriction

(MAR)

4.7 Describe, implement, verify, and troubleshoot BYOD on-

boarding and network access flows with an internal or external CA

4.16 Describe, implement, and troubleshoot identity mapping on

ASA, ISE, WSA and FirePOWER

4.8 Describe, implement, verify, and troubleshoot ISE and ACS

integration with external identity sources such as LDAP, AD, and

external RADIUS

4.17 Describe the functions and security implications of AAA

protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-

PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-

GTC), PAP, CHAP, and MS-CHAPv2

4.9 Describe ISE and ACS integration with external identity

sources such as RADIUS Token, RSA SecurID, and SAML

4.18 Describe, implement, and troubleshoot pxGrid between

security devices such as WSA, ISE, and Cisco FMC

Page 10: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 10BRKCCIE-3222

Identity Management Topics in CCIE Exam4.1 Describe, implement, and troubleshoot various personas of

ISE in a multinode deployment

4.10 Describe, implement, verify, and troubleshoot provisioning of

AnyConnect with ISE and ASA

4.2 Describe, implement, and troubleshoot network access device

(NAD), ISE, and ACS configuration for AAA

4.11 Describe, implement, verify, and troubleshoot posture

assessment with ISE

4.3 Describe, implement, and troubleshoot AAA for administrative

access to Cisco network devices using ISE and ACS

4.12 Describe, implement, verify, and troubleshoot endpoint

profiling using ISE and Cisco network infrastructure including

device sensor

4.4 Describe, implement, verify, and troubleshoot AAA for network

access with 802.1X and MAB using ISE.

4.13 Describe, implement, verify, and troubleshoot integration of

MDM with ISE

4.5 Describe, implement, verify, and troubleshoot cut-through

proxy/auth-proxy using ISE as the AAA server

4.14 Describe, implement, verify, and troubleshoot certificate based

authentication using ISE

4.6 Describe, implement, verify, and troubleshoot guest life cycle

management using ISE and Cisco network infrastructure

4.15 Describe, implement, verify, and troubleshoot authentication

methods such as EAP Chaining and Machine Access Restriction

(MAR)

4.7 Describe, implement, verify, and troubleshoot BYOD on-

boarding and network access flows with an internal or external CA

4.16 Describe, implement, and troubleshoot identity mapping on

ASA, ISE, WSA and FirePOWER

4.8 Describe, implement, verify, and troubleshoot ISE and ACS

integration with external identity sources such as LDAP, AD, and

external RADIUS

4.17 Describe the functions and security implications of AAA

protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-

PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-

GTC), PAP, CHAP, and MS-CHAPv2

4.9 Describe ISE and ACS integration with external identity

sources such as RADIUS Token, RSA SecurID, and SAML

4.18 Describe, implement, and troubleshoot pxGrid between

security devices such as WSA, ISE, and Cisco FMC

Page 11: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Security Appliances Core Devices Others Physical Machines

Cisco Identity Services

Engine (ISE): 2.1.0

IOSv L2: 15.2 Test PC: Microsoft

Windows 7

Cisco Catalyst Switch

C3850-12S: 16.2.1

Cisco Secure Access

Control System (ACS):

5.8.0.32

IOSv L3: 15.5(2)T Active Directory:

Microsoft Windows

Server 2008

Cisco ASA 5512-X:

9.6.1

Cisco Web Security

Appliance (WSA): 9.2.0

Cisco CSR 1000V Series Cloud

Services Router: 3.16.02.S

Cisco Application Policy

Infrastructure Controller

Enterprise Module : 1.2

Cisco 2504 WLC 2504:

8.0.133.0

Cisco Email Security

Appliance (ESA): 9.7.1

Cisco Adaptive Security

Virtual Appliance (ASAv): 9.6.1

Cisco Unified

Communications

Manager: 8.6.(1)

Cisco Aironet 1602E:

15.3.3-JC

Cisco Wireless Controller

(WLC): 8.0.133

FireAMP Private Cloud Cisco Unified IP Phone

7965: 9.2(3)

Cisco Firepower

Management Center Virtual

Appliance: 6.0.1 and/or 6.1

AnyConnect: 4.2

Cisco Firepower NGIPSv:

6.0.1

Cisco Firepower Threat

Defense: 6.0.1

11BRKCCIE-3222

Cisco Gear Used on CCIE Security

*Device Authentication only, provisioning of IP phones is NOT

required.

Page 12: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 12BRKCCIE-3222

CCIE Security Exam Changes

Page 13: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 13BRKCCIE-3222

CCIE Security v5.0 Lab Exam Format

The 5.0 Lab is now comprised of three modules:1.Troubleshooting Module

2.Diagnostic Module

3.Configuration Module

Page 14: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCCIE-3222 14

Page 15: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

ISE Overview

Page 16: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Role-Based Access

BRKCCIE-3222

Introducing Cisco Identity Services Engine

A centralized security solution that automates context-aware access to

network resources and shares contextual data

Network

Door

Identity Profiling

and Posture

Who

What

When

Where

How

Compliant

Context

Traditional Cisco TrustSec®

Role-Based Policy Access

Guest Access

BYOD Access

Secure Access

16

Page 17: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Deploying ISE

pXGrid Controller

- Facilitates sharing of context

Policy Services Node (PSN)

- Makes policy decisions

- RADIUS / TACACS+ Servers

Policy Administration Node (PAN)

- Single plane of glass for ISE admin

- Replication hub for all database config changes

Monitoring and Troubleshooting Node (MnT)

- Reporting and logging node

- Syslog collector from ISE Nodes

Single Node (Virtual / Appliance)

Up to 20,000 concurrent endpoints

STANDALONE ISE

Multiple Nodes (Virtual / Appliance)

Up to 500,000 concurrent endpoints

Network

MULTI-NODE ISE

17BRKCCIE-3222

Page 18: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCCIE-3222 18

Page 19: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Endpoint Profiling &

Device Sensor

Page 20: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

How Does ISE Get All That Information ?Cisco ISE Profiling

Feed Service

(Online/Offline)

Netflow DHCP DNS HTTP RADIUS NMAP SNMP

CDP LLDP DHCP HTTP H323 SIP MDNS

ACTIVE PROBES

DEVICE SENSOR

1.5 million

550+

250+

devices with ‘50’ attributes

each can be stored

High-level canned

profiles. +Periodic feeds

Medical device profiles

Cisco ISE

Cisco Network

ACIDEX AD

ACIDex

DS

DS

AnyConnect Identity Extensions (ACIDex) | Device Sensor (DS)20BRKCCIE-3222

Page 21: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

• Distributed collection on Network Devices. Cache, CDP, LLDP, DHCP, HTTP (Wireless only), etc.

• Centralized collection over RADIUS protocol

ISE

Profile Conditions PROFILED+ =

Example:MAC OUI + Lexmark

If DHCP Class ID

Contains E260dn

It’s a Lexmark

E260n Printer

Data From Device Sensor

RADIUS Accounting

CDPLLDPDHCPMAC

CDPLLDPDHCPMAC

HTTPDHCPMAC

Just One Type of Probe

BRKCCIE-3222

Profiling with ‘Device Sensor’ Doesn’t require packet

redirections (DHCP Helper)

and SPAN sessions

for profiling

Highly scalable and efficient

ISE runs only “RADIUS”

probe

Profiling based on:

• CDP/LLDP

• DHCP

• HTTP (WLC only)

• mDNS,

• H323,

• MSI-Proxy (4k only)

21

Page 22: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

ISE Construction of Profiles

Create conditions

based on data sent by

Cat3K switches

Link one or more conditions

together to identify a new

device

22BRKCCIE-3222

Page 23: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCCIE-3222

Certainty Factors

We Must Meet This Threshold

Before Assigning Profile

Multiple Conditions May

Be Required

23

Page 24: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Device Sensor for WirelessRADIUS Accounting

ISE

Per WLAN Enable/Disable

device profiling

DHCP (WLC 7.2.110.0)

– Hostname, Class ID

HTTP / Both (WLC 7.3)

– User Agent

FlexConnect with Central

Switching supported

DHCP

WLC

DHCPHTTP

BRKCCIE-3222 24

Page 25: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Lets Configure Device Sensor & Profiling

Page 26: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure ISE

Add Device Name

Add IP Address

Add the Shared

Secret Key

26BRKCCIE-3222

Page 27: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure ISE – Turn on Radius Profiling

Edit PSN

Enable Radius Profiling* After this Step, you may want to go to switch & ping & aaa test the ISE Server to ensure connectivity

27BRKCCIE-3222

Page 28: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 28BRKCCIE-3222

Verify the endpoint is profiled & view attributes

Click on Endpoint

Select Endpoint

Classification

Page 29: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Verify endpoint is profiled & view attributes (cont.)

Endpoint Profile

Endpoint Source

29BRKCCIE-3222

Page 30: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Lets Configure the Switch Branch3-3650(config)#aaa new-model Branch3-3650(config)#aaa authentication dot1x default radius Branch3-3650(config)#aaa accounting dot1x default start-stop group radius

Branch3-3650(config)#radius server ISEBranch3-3650(config-radius-server)# address ?

address ? ipv4 IPv4 Addressipv6 IPv6 Address

Branch3-3650Branch3-3650(config-radius-server)# address 172.16.110.140Branch3-3650Branch3-3650(config-radius-server)# key Cisco123Branch3-3650(config)# dot1x system-auth-control

Branch3-3650(config)# int g1/1/24 Branch3-3650(config-if)# switchport mode accessBranch3-3650(config-if)# switchport voice vlan 25 Branch3-3650(config-if)# authentication order mabBranch3-3650(config-if)# authentication port-control autoBranch3-3650(config-if)# mabBranch3-3650(config-if)# dot1x pae authenticatorBranch3-3650(config-if)#authen host-mode multi-auth // if 2 devices on port

Configure the AAA Framework

Configure the Radius Settings &

Enable dot1x framework globally

Configure the interface

30BRKCCIE-3222

Page 31: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Device Sensor on the SwitchBranch3-3650(config)#device-sensor accounting Branch3-3650(config)#device-sensor notify ?

all-changes Trigger identity update when TLVs are added/modified/removednew-tlvs Trigger identity update only when TLVs are added

Branch3-3650(config)#device-sensor notify all-changes Branch3-3650(config)#radius-server vsa send accounting //(VSA)vendor specific attribute

Branch3-3650#sh device-sensor cache ?all Shows All dsensor cacheinterface Client interfacemac Shows dsensor cache details by MAC

Branch3-3650#sh device-sensor cache all

Branch3-3650# debug radius accounting packetsBranch3-3650# conf tBrandch3-3560# (config) int g2/1/1Brandch3-3560# (conf-if)shutBrandch3-3560# (conf-if) no shut

Configure the

device sensor

feature

Verify that you are getting

Device sensor information

verify what is being sent to ISE

31BRKCCIE-3222

Page 32: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Device Sensor Information ElementsExamples

Branch3-3650(config)#device-sensor filter-list ?cdp CDP Filter Listdhcp DHCP Filter Listh323 H323 Filter Listlldp LLDP Filter Listmdns MDNS Filter Listsip SIP Filter List

Branch3-3650(config)#device-sensor filter-list mdns list APPLEBranch3-3650(config-sensor-mdnslist)#tlv name ?

device-version MDNS Device Versionpointer-records MDNS PTR Recordssrv-records MDNS SRV Recordstext-records MDNS TXT Records

Branch3-3650(config)#device-sensor filter-list h323 list PHONEBranch3-3650(config-sensor-h323list)#tlv name ?

device-name H323 device namedevice-vendor H323 device vendordevice-version H323 device version

Branch3-3650(config)#device-sensor filter-list dhcp list Branch3-3650(config-sensor-dhcplist)#option name ?

all-subnets-local All Subnets Localarp-cache-timeout ARP Cache Timeoutauthentication Authenticationauto-configure Autoconfigurationbcmcs-servers-a BCMCS Controller IPv4 address listbcmcs-servers-d BCMCS Controller Domain Name listboot-file Boot File Nameboot-size Boot Size

[clip]

Example records and options for

protocol sensors

100+ option fields for

DHCP including vendor

specific attributes

32BRKCCIE-3222

Page 33: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Test and Debug AAA on the SwitchBranch3-3650 #sh run | inc aaaaaa new-modelaaa authentication dot1x default group radiusaaa accounting dot1x default group radiusaaa session-id common

Branch3-3650#sh run | sect radiusaaa authentication dot1x default group radiusaaa accounting dot1x default start-stop group radiusradius server ISEaddress IPV4 172.16.110.140 auth-port 1645 acct-port 1646key Cisco123

Branch3-3650#sh run int g1/1/24 interface GigabitEthernet1/1/4switchport access vlan 20switchport mode accessswitchport voice vlan 25shutdownauthentication order mabauthentication port-control automabdot1x pae authenticatorspanning-tree portfastend

// sample Test and Debug commandsBranch3-3650# ping 172.16.110.140Branch3-3650# show IP interface BriefBranch3-3650# test AAA group radius blahuser blahpassword legacy Attempting authentication test to server-group radius using radiusUser authentication request was rejected by server.Branch3-3650# debug radius accounting packetsBranch3-3650# debug device-sensor {errors | events}

Verify the AAA Framework

Test ISE connectivity (Do this after

configuring the device in ISE)

Verify the Radius Settings

Verify the interface Settings

* don’t forget to bring up the access port interface33BRKCCIE-3222

Page 34: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Verify Device Attributes (cont)

Verify Endpoint

Source

Navigate to

Attributes

BRKCCIE-3222 34

Page 35: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure The Authorization Policy in ISE

35BRKCCIE-3222

Page 36: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the Authorization Policy (Cont)

Rule added in Authorization Policy

Choose a

Rule Name

Choose Condition

Based on Profiles and

Connectivity Attributes

Assign

Appropriate

Policy

BRKCCIE-3222 36

Page 37: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

You Have Completed Profiling with Device Sensor

37BRKCCIE-3222

Page 38: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

PxGrid Deployment

Page 39: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

n

Cisco Platform Exchange Grid (PxGrid)Enable Unified Threat Response by Sharing Contextual Data

Cisco® ISE collects

contextual data from network1

Context is shared via

pxGrid technology2

Context improves visibility to

detect threats3

Devices can direct ISE to rapidly

contain threats or apply policy4

ISE uses partner data to update

context and refine access policy5

When

Where

Who

How

What

Cisco and Partner

Ecosystem

ISE

pxGrid

Controller

Context

32

1

45 Cisco Network

39BRKCCIE-3222

Page 40: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

PxGrid Use Cases

Use-Case Description Partner

Cloud Access Monitoring: User/Device-

Aware Cloud-Hosted Resource

Monitoring

ISE user, group, access, device context to enhance monitoring and reporting of access to cloud

services by end-users.

SkyHigh, Elastica

Network/App Performance

Monitoring: User/device-aware network

topology and performance management

ISE IP:user:device binding and related context to network data system to attribute user, device,

role, etc. to visualization and performance management data.

Savvius

Threat Defense: User-behavior anomaly

(UBA) detection

Assess typical behavior of individual and groups of users and then look for anomalous behavior.

Utilizes ISE user/device context in analytics and event reporting.

FortScale,

Rapid 7, E8

WSA+ISE: User-aware web security

policies

Web access decisions based on ISE user/device context. Enables customers to differentiate web

content access policies based on real-time user and device situational awareness.

Cisco WSA

DNS, DHCP and IP Address

Management: User, Group and Device

Based DDI Monitoring and Reporting

Associate users and user network privileges with DHCP leases, IP address assignments and

domain name access by using ISE user/network context.

Infoblox

SIEM/TD: User/Device-Aware

SIEM/ThreatDefense Integration

Same use-cases as existing SIEM/TD ecosystem, but utilizing pxGrid for context and Rapid Threat

Containment.

NetIQ, Lancope,

Splunk, FireSIGHT

Management

Center 5.4,

LogRhythm

40BRKCCIE-3222

Page 41: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Web Filtering with pxgrid & Passive ID through ISE

41BRKCCIE-3222

Page 42: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Lets Configure pxGrid with ISE & WSA

Page 43: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 43BRKCCIE-3222

Sample Lab Topology

Page 44: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the WSACertificates

Network >

Certificate Management

Manage trusted Root Certificate

44BRKCCIE-3222

Page 45: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the WSA

Add your certificate

45BRKCCIE-3222

Page 46: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the WSA: Add ISE to the WSA

Network >

Identity Service Engine

47BRKCCIE-3222

Page 47: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the WSA Add ISE

Run Test to ensure DNS,

Certificates are valid & SGTs are imported

Add the pxGrid node

& Certficiates

48BRKCCIE-3222

Add the Monitor ISE nodes

& Certificates

Add the WSA Certificates

Page 48: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Now Configure ISE

Page 49: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Ensure that you are connected to the AD Controller

Select the Node

Click “join”

50BRKCCIE-3222

AD should show

“Operational” status

Page 50: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure ISE certificates for pxGrid clients

51BRKCCIE-3222

For complete certificate steps see:

https://communities.cisco.com/community/technology/security/pa/ise/blog/2016/07/27/ise-21-and-wsa-via-pxgrid-and-ca-signed-certificates

Page 51: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Enable pxGrid Services in ISE

Enable pxgrid services

Edit the Node

52BRKCCIE-3222

Page 52: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Enable Auto Registration in ISE

Enable auto approve new accounts

Ensure admin & mnt are showing

53BRKCCIE-3222

Page 53: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Verifying WSA is registered pxGrid Client

Ensure the WSA client is online

54BRKCCIE-3222

Ensure pxGrid is connected

Page 54: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Security Group Tags in ISE

Add SGT tag

SGT tag gets

propagated to WSA

55BRKCCIE-3222

Page 55: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure The Authorization Policy

56BRKCCIE-3222

Page 56: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure the Authorization Policy (Cont)

Rule added in Authorization Policy

Choose a

Rule Name

Choose Condition

Based on Profiles and

Connectivity Attributes

Assign

Appropriate SGT

BRKCCIE-3222 57

Page 57: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Now Configure WSA (again)

Page 58: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Identity Profile

Create a New Ident. Profile

59BRKCCIE-3222

Page 59: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Identity Profile (Cont)

Select “Identify Users with ISE”

Select Block Transactions

60BRKCCIE-3222

Type in the name of the profile

Page 60: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Access Policy

Create a New Access Policy

61BRKCCIE-3222

Page 61: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Access Policy (cont)

Select SGT to use

62BRKCCIE-3222

Type in Access Policy Name

Page 62: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Access Policy (cont)

Search for your SGT

Check the box next to your SGT

Click the “add” button

63BRKCCIE-3222

Page 63: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Add an Access Policy (cont)

Now that your SGT is assigned

Click Done

64BRKCCIE-3222

Page 64: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure URL Filtering

65BRKCCIE-3222

Configure URL Filter here

Page 65: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Create URL Filter List (cont)

Select Categories to Block

66BRKCCIE-3222

Page 66: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Web Redirection

Select WCCP for our Example

Configure WCCP on the WSA

67BRKCCIE-3222

Page 67: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Web Redirection

Match the Service ID on the

Network Device

Configure WCCP on the WSA (cont)

68BRKCCIE-3222

Page 68: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Web Redirection on the Switch

69BRKCCIE-3222

Page 69: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Verify Your Configuration

Page 70: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Turn up Logging for Troubleshooting

Use %m for troubleshooting ISE

71BRKCCIE-3222

Page 71: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Telnet into the WSA and verify via CLI

72BRKCCIE-3222

Page 72: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Browse to the WSA and verify with Policy Trace

73BRKCCIE-3222

Page 73: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Browse to the WSA and verify with Policy Trace (Cont)

74BRKCCIE-3222

Page 74: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Verify on the Switch via CLI

75BRKCCIE-3222

Page 75: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

You Have Completed Pxgrid ISE and WSA Integration

76BRKCCIE-3222

Page 76: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

• CCIE Security Program Overview

• Cisco Identity Services Engine (ISE) Overview

• Configure, Verify & Troubleshoot Profiling Using

Device Sensor

• Configure, Verify & Troubleshoot pxGrid with ISE &

WSA

BRKCCIE-3222

Summary

77

Page 77: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

• Give us your feedback to be entered into a Daily Survey Drawing. A daily winner will receive a $750 gift card.

• Complete your session surveys through the Cisco Live mobile app or on www.CiscoLive.com/us.

Complete Your Online Session Evaluation

Don’t forget: Cisco Live sessions will be available for viewing on demand after the event at www.CiscoLive.com/Online.

Page 78: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Continue Your Education

• Demos in the Cisco campus

• Walk-in Self-Paced Labs

• Lunch & Learn

• Meet the Engineer 1:1 meetings

• Related sessions

79BRKCCIE-3222

Page 79: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 80BRKCCIE-3222

Security Beta Programs

To participate in Beta:

http://cs.co/security-beta-nomination

or email

[email protected]“I've been involved in many beta programs … I must

say that this one has been the best organized. This

beta has taken a very active, hands-on approach.” -

Liberal Arts College Customer

Security Beta Products Customer Benefits

• Free test hardware

• Early experience with and training on new

features and functionality

• Demos and feedback sessions on product

usability, design, and roadmaps

• Risk-free testing in the customer environment

prior to FCS

• Beta customer S1-3 issues fixed in GA release

ASAFirepower

NGFW/NGIPS

Firepower

Platforms

AMP for

EndpointsISR ESA

ISE OpenDNS

Stealthwatch

Learning

Networks

Page 80: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cybersecurity Cisco Education OfferingsCourse Description Cisco Certification

Understanding Cisco Cybersecurity

Fundamentals (SFUND)

The SECFND course provides understanding of

cybersecurity’s basic principles, foundational knowledge, and

core skills needed to build a foundation for understanding

more advanced cybersecurity material & skills.

CCNA® Cyber Ops

Implementing Cisco Cybersecurity

Operations (SECOPS)

This course prepares candidates to begin a career within a

Security Operations Center (SOC), working with

Cybersecurity Analysts at the associate level.

CCNA® Cyber Ops

Securing Cisco Networks with Threat

Detection and Analysis (SCYBER)

Designed for security analysts who work in a Security

Operations Center, the course covers essential areas of

security operations competency, including SIEM, Event

monitoring, security event/alarm/traffic analysis (detection),

and incident response

Cisco Cybersecurity

Specialist

Cisco Security Product Training Courses Official deep-dive, hands-on product training on Cisco’s

latest security products, including NGFW, ASA, NGIPS,

AMP, Identity Services Engine, Email and Web Security

Appliances, and more.

For more details, please visit: www.cisco.com/go/securitytraining or http://learningnetwork.cisco.com

Questions? Visit the Learning@Cisco Booth

81BRKCCIE-3222

Page 81: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cybersecurity Cisco Education OfferingsCourse Description Cisco Certification

New! CCIE Security 5.0 CCIE® Security

Implementing Cisco Edge Network Security

Solutions (SENSS)

Implementing Cisco Threat Control

Solutions (SITCS) v1.5

Implementing Cisco Secure Access

Solutions (SISAS)

Implementing Cisco Secure Mobility

Solutions (SIMOS)

Configure Cisco perimeter edge security solutions utilizing Cisco

Switches, Cisco Routers, and Cisco Adaptive Security Appliance

(ASA) Firewalls

Implement Cisco’s Next Generation Firewall (NGFW), FirePOWER

NGIPS (Next Generation IPS), Cisco AMP (Advanced Malware

Protection), as well as Web Security, Email Security and Cloud

Web Security

Deploy Cisco’s Identity Services Engine and 802.1X secure

network access

Protect data traversing a public or shared infrastructure such as the

Internet by implementing and maintaining Cisco VPN solutions

CCNP® Security

Implementing Cisco Network Security

(IINS 3.0)

Focuses on the design, implementation, and monitoring of a

comprehensive security policy, using Cisco IOS security features

CCNA® Security

For more details, please visit: www.cisco.com/go/securitytraining or http://learningnetwork.cisco.com

Questions? Visit the Learning@Cisco Booth

82BRKCCIE-3222

Page 82: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 83BRKCCIE-3222

Page 83: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

Thank you

Page 84: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network
Page 85: Identity Management and Access Control for Security CCIE ...d2zmdbbm9feqrf.cloudfront.net/2017/usa/pdf/BRKCCIE-3222.pdf · •Introduction •CCIE Security ... access to Cisco network

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Glossary of Acronyms• AAA - Authentication Authorization Accounting

• ASAv - Adaptive Security Virtual Appliance

• APIC-EM - Application Policy Infrastructure Controller Enterprise Module

• CSR – Cloud Services Router

• MAB - Machine Authentication Bypass

• MAR - Machine Access Restriction

• ISE – Identity Services Engine

• MAB – MAC Authentication Bypass

• ACL – Access Control List

• SGT – Security Group Tag

• SGACL – Security Group Access Control List

• ACI – Application Centric Infrastructure

• EPG – EndPoint Group

• BYOD – Bring Your Own Device

86BRKCCIE-3222