Toc 9780136677857
Toc 9780136677857
Identity Management
SISE 300-715
Official Cert Guide
Enhance Your Exam Preparation
See the card insert in the back of the book for your Pearson
CCNP Security Identity Management SISE
300-715 Official Cert Guide
Table of Contents
Cover
Title Page
Copyright Page
Contents at a Glance
Contents
Introduction
Part I: Authentication, Authorization, and Accounting
Chapter 1 Fundamentals of AAA
Do I Know This Already? Quiz
Foundation Topics
Comparing and Selecting AAA Options
Device Administration AAA
Network Access AAA
TACACS+
TACACS+ Authentication Messages
TACACS+ Authorization and Accounting Messages
RADIUS
AV Pairs
Change of Authorization (CoA)
Supplicant Options
Windows Native Supplicant
User Authentication
Machine Authentication (Computer Authentication)
Cisco AnyConnect NAM Supplicant
Client Policy
Authentication Policy
Networks
Network Groups
Implementing AnyConnect NAM Profiles
EAP Chaining
Remote-Access Connections
EasyConnect
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Chapter 5 Introduction to Advanced Concepts
Do I Know This Already? Quiz
Foundation Topics
Change of Authorization
Automating MAC Authentication Bypass (MAB)
Posture Assessment
Mobile Device Management (MDM)
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Network Devices
Network Device Groups
Network Access Devices
Table of Contents
More on MAB
Restore the Authentication Policy
Exam Preparation Tasks
Review All Key Topics
Q&A
Chapter 10 Authorization Policies
Do I Know This Already? Quiz
Foundation Topics
Authentication Versus Authorization
Authorization Policies
Goals of Authorization Policies
Understanding Authorization Policies
Role-Specific Authorization Rules
Authorization Policy Example
Employee Full Access Rule
Internet Only for Smart Devices Rule
Employee Limited Access Rule
Live Sessions
Looking Forward
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Chapter 12 Web Authentication
Do I Know This Already? Quiz
Foundation Topics
Web Authentication Scenarios
Local Web Authentication (LWA)
Centralized Web Authentication (CWA)
Sponsors
Sponsor Groups
Sponsor Portals
Portal Settings
Login Settings and AUP Page Settings
The Remaining Settings
Notification Services
SMTP Servers
SMS Gateway Providers
Provisioning Guest Accounts from a Sponsor Portal
SAML Authentication
Call to Action
Infrastructure Configuration
DHCP Helper
SPAN Configuration
VLAN Access Control Lists (VACLs)
Device Sensor
VMware Configurations to Allow Promiscuous Mode
Profiling Policies
Profiling Feed Service
Configuring the Profiler Feed Service
Verifying the Profiler Feed Service
Endpoint Profile Policies
Logical Profiles
Verify Profiling
The Dashboard
Global Search
Endpoint Identities
Device Sensor show Commands
MDM Onboarding
Integration Points
Configuring MDM Integration
Configuring MDM Onboarding Rules
Create the Authorization Profile
Create the Authorization Rules
Managing Endpoints
Self-Management
Administrative Management
What Is TrustSec?
What Is a Security Group Tag?
What Is the TrustSec Architecture?
TrustSec-Enabled Network Access Devices
Defining the TrustSec Settings for a Network Access Device
Configuring an IOS XE Switch for TrustSec
Configuring an ASA for TrustSec
Enforcement
SGACL
Table of Contents
Configuring Security Group ACLs
TrustSec Policy Matrix
Configuring the TrustSec Policy Matrix
Security Group Firewalls
Security Group Firewall on the ASA
Security Group Firewall on the Firepower
Security Group Firewall on the ISR and ASR
Configuring Posture
Update the Compliance Modules
Configure Client Provisioning
Protect Your Sanity
Download AnyConnect
Upload AnyConnect Headend Deployment Packages to ISE
Configure the Client Provisioning Portal
Table of Contents
Configure the Client Provisioning Policy
Configuring Posture Policy Elements
Conditions
Remediations
Requirements
Configure Posture Policies
Other Important Posture Settings
Posture Lease
Cache Last Known Posture Compliant Status
Reassessment Configurations
Authorization Rules
Create an Authorization Profile for Redirection
Create the Authorization Rules
Mobile Posture
Create Mobile Posture Authorization Conditions
Create Mobile Posture Authorization Rules
Diagnostic Tools
RADIUS Authentication Troubleshooting Tool
Execute Network Device Command
Evaluate Configuration Validator
Posture Troubleshooting
Endpoint Debug
TCP Dump
Session Trace Tests
Troubleshooting Methodology
Log De-duplication
Table of Contents
The USERNAME User
pxGrid
pxGrid in Action
Context-In
Configuring ISE for pxGrid
Configuring pxGrid Participants
Configuring Firepower Management Center for Identity with pxGrid
Configuring the Web Security Appliance
Integrating Stealthwatch and ISE