0% found this document useful (0 votes)
94 views

Implementing Cisco Secure Access Control System (ACS) v5.2: Course Objectives Associated Certifications

This course teaches how to provide secure access to network resources using Cisco Secure Access Control System (ACS) version 5.2. It covers authentication, authorization, accounting, RADIUS, TACACS+, EAP, IEEE 802.1X, and configuring ACS with external identity stores like LDAP and Active Directory.

Uploaded by

Nb A Dung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Implementing Cisco Secure Access Control System (ACS) v5.2: Course Objectives Associated Certifications

This course teaches how to provide secure access to network resources using Cisco Secure Access Control System (ACS) version 5.2. It covers authentication, authorization, accounting, RADIUS, TACACS+, EAP, IEEE 802.1X, and configuring ACS with external identity stores like LDAP and Active Directory.

Uploaded by

Nb A Dung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Implementing Cisco Secure Access Control System (ACS) v5.

2
This course teaches students how to provide secure access to network resources by using the Cisco Secure Access Control System
(ACS) version 5.2, which interoperates with security features in Cisco IOS Software. Students will gain a thorough understanding of the
operation of the Cisco Secure ACS to control access to network services and devices. Course subjects include the principles of
authentication (identifying users and devices in order to control access to networks, services, and devices), authorization (restricting the
functions that users can perform on services and devices) and accounting (to track the activities of users). The RADIUS, TACACS+,
Extensible Authentication Protocol (EAP), and IEEE 802.1X protocols are discussed in theory and practice as the basis of network
security. Specific methods and configurations are shown that can be used in your production networks to achieve targeted and detailed
control objectives.

Course Objectives Associated Certifications

Upon completing this course, the student will be able to meet these objectives: NA

 Describe the RADIUS and TACACS+ protocols Required Exam(s)


 Compare and contrast the various ACS solutions: ACS Express, Enterprise, ACS on
NA
VMware, Cisco Secure ACS -1120 Series, and Cisco Secure ACS -1121
 List the main components of Cisco Secure ACS Price
 Install Cisco Secure ACS v5.2
$2,995.00
 Use a setup script during Cisco Secure ACS install
 Describe how licensing works with Cisco Secure ACS Duration
 Understand attributes, value types, and values
3 days
 Configure the different types of AAA clients
 Access network resources and AAA clients Methods of Delivery
 Configure local identity store and identity store sequence
 Instructor Led
 Understand users and identity stores  Distance Learning
 Configure an external identity store with LDAP  On-Site
 Describe the fundamentals of LDAP
 Set up external identity store with Active Directory
 Perform authentication, command authorization, and accounting with TACACS
 Monitor and troubleshoot Cisco Secure ACS
 Configure and troubleshoot digital certificates self-signed by Cisco Secure ACS using local CA
 Describe and configure IEEE 802.1X and EAP
 Configure Cisco Secure ACS environments with IEEE 802.1X and Windows XP clients
 Configure IEEE 802.1X for single host authentication
 Troubleshoot IEEE 802.1X

Who Should Attend

The primary audience for this course is as follows:

 Network Security Engineers

Prerequisite Skills and Knowledge

 CCNA Security or valid CCSP or any CCIE certification can act as a prerequisite.
 Cisco CCNA® certification or the equivalent in knowledge and experience
 Working knowledge of the Microsoft Windows operating system

Course Outline

Course Introduction

Module 1: Identity Management Solution

 Reviewing Identity Management


 Understanding Borderless Security

Module 2: Product Overview and Initial Configuration

 Reviewing RADIUS and TACACS+


 Reviewing Cisco Secure ACS v5.2
 Installing Cisco Secure ACS v5.2
 Understanding Cisco Secure ACS Attributes and Dictionaries
 Adding Network Devices to Cisco Secure ACS
 Configuring Identity Stores and Identity Sequence
Module 3: Advanced Cisco Secure ACS Configuration and Device Management

 Configuring LDAP with External Identity Store


 Configuring Active Directory with External Identity Store
 Configuring Authentication, Authorization, and Accounting with TACACS+
 Understanding Cisco Secure ACS and Certification Authority
 Monitoring, Reporting, and Troubleshooting

Module 4: IEEE 802.1X with Cisco Secure ACS v5.2

 Introducing IEEE 802.1X


 Reviewing IEEE 802.1X Policy Elements (RADIUS)
 Configuring IEEE 802.1X and Windows XP, Vista, and 7
 Configuring IEEE 802.1X with Cisco Secure Services Client (SSC)
 Using IEEE 802.1X Port-Based Authentication
 Troubleshooting IEEE 802.1X

Module 5: System Operations

 Configuring Distributed Deployment


 Configuring Cisco Secure ACS System Administration Features

Labs

 Remote Lab Familiarity


 Verify the Cisco Secure ACS Installation
 Set Up AAA Clients in Cisco Secure ACS
 User and Local Identity Store
 External Identity Store (Active Directory)
 Configure Command Authorization
 Install a Certificate on the Secure ACS Server
 Configure Basic 802.1x Authorization
 Configure Advanced 802.1x Authorization
 Configure 802.1x VLAN Assignments
 Troubleshoot
 Distributed Deployment

You might also like