> > > ACS Detailed outline

Implementing Cisco Secure Access Control System Version 5.6 (ACS)

Course Description Schedule Course Outline

Detailed Course Outline

Introduction

  • What is RADIUS: TLV, RADIUS packets, differentiation to TACACS+
  • The portfolio: ACS versions, licenses, ACS View

Installation

  • Installation steps
  • Overview of the GUI and CLI

Basic configuration

  • Setup of devices, groups and user
  • AAA configuration (Switch, Access Point, ASA)

Authentication and Authorization

  • Behind the scenes: internal Authentication Flow
  • External databases: LDAP, AD, NAC Server
  • Proxy Authentication
  • Identity and Authorization Policies
  • Example: Command Authorization

Operation and Maintenance

  • Software Upgrade
  • Logging, Logging Relay
  • Reports / Reporting / MARS
  • Cluster
  • CLI

Scenarios

  • IP Phones
  • WLAN (AP, Controller)
  • VPN Group / Policy Mapping
  • Downloadable ACLs
  • DOT1X

Labs

  • ACS basic configuration
  • Updating ACS to 5.5
  • Creating AAA clients and Device Groups
  • Administrating internal and external application database
  • Creating Policies for Authentication and Authorization
  • Create and use monitoring, reporting and logging functions
  • Implementation of IEEE 802.1X Solutions: Switches, IP Phones, WLAN (AP, Controller), MARS, NAC Server, Access Point
  • Supporting the WLAN Security
  • LDAP Integration
 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!