Processing your application. Please be patient while we make sure we receive every piece of it.
Security
ACS: Implementing Cisco Secure Access Control System v5.2
3 Days
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
This course teaches students how to provide secure access to network resources by using the Cisco Secure Access Control System (ACS) version 5.2, which interoperates with security features in Cisco IOS Software.


Students will gain a thorough understanding of the operation of the Cisco Secure ACS to control access to network services and devices. Course subjects include the principles of authentication (identifying users and devices in order to control access to networks, services, and devices), authorization (restricting the functions that users can perform on services and devices) and accounting (to track the activities of users). The RADIUS, TACACS+, Extensible Authentication Protocol (EAP), and IEEE 802.1X protocols are discussed in theory and practice as the basis of network security. Specific methods and configurations are shown that can be used in your production networks to achieve targeted and detailed control objectives. The course includes hands-on labs to provide direct experience in configuring Cisco Secure ACS and Cisco network devices.
  • Security professionals, architects, and engineers and network administrators responsible for securing their networks to assure authorized access only by authenticated users, with accounting of their activities
  • Cisco channel partners who sell, implement, and maintain Cisco ACS solutions
  • Cisco ACS solutions sales engineers
The knowledge and skills that a learner must have before attending this course include:
  • Cisco CCNA certification or the equivalent in knowledge and experience
  • Working knowledge of the Microsoft Windows operating system
Additional recommended training prerequisite:
  • Implementing Cisco IOS Network Security (IINS)
Module 1: Identity Management Solution Overview
Lesson 1A: Reviewing Identity Management
Lesson 1B: Understanding Borderless Security

Module 2: Product Overview and Initial Configuration

Lesson 2A: Reviewing RADIUS and TACACS+
Lesson 2B: Reviewing Cisco Secure ACS v5.2
Lesson 2C: Installing Cisco Secure ACS v5.2
Lesson 2D: Understanding Cisco Secure ACS Attributes and Dictionaries
Lesson 2E: Adding Network Devices to Cisco Secure ACS
Lesson 2F: Configuring Identity Stores and Identity Sequence

Module 3: Advanced Cisco Secure ACS Configuration and Device Management

Lesson 3A: Configuring LDAP with External Identity Store
Lesson 3B: Configuring Active Directory with External Identity Store
Lesson 3C: Configuring Authentication, Authorization, and Accounting with TACACS+
Lesson 3D: Understanding Cisco Secure ACS and Certification Authority
Lesson 3E: Monitoring, Reporting, and Troubleshooting

Module 4: IEEE 802.1X with Cisco Secure ACS v5.2

Lesson 4A: Introducing IEEE 802.1X
Lesson 4B: Reviewing IEEE 802.1X Policy Elements (RADIUS)
Lesson 4C: Configuring IEEE 802.1X and Windows XP, Vista, and 7
Lesson 4D: Configuring IEEE 802.1X with Cisco Secure Services Client (SSC)
Lesson 4E: Using IEEE 802.1X Port-Based Authentication
Lesson 4F: Troubleshooting IEEE 802.1X

Module 5: System Operations

Lesson 5A: Configuring Distributed Deployment
Lesson 5B: Configuring Cisco Secure ACS System Administration Features 
SITE MAP