Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back. Cisco Certified Design Associate Demo to Ice 2.3. Scenario six. Ice authentication on authorization policy. Okay, let's start lab
00:13
being nice to 0.3. All policies were converted to policy sets because this is a more scalable and efficient way to view the large numbers of the policies
00:25
drill down into the ice. Authentication on the all tradition policies health scaleable crump attacks as T t's are a fine and on how many Hiten they have in a counter
00:37
in the ice navigated policy
00:40
policy states
00:43
to see all policy sites
00:46
right for demo proposal only have our default policy
00:51
to keep things simple
00:52
quick to the viewer
00:56
for the default policy to see its authentication policies
01:00
on the authorization policies.
01:03
Authentication policies came made very granular with conditions
01:10
down to a space of the user or en pointe.
01:11
They generally are used to future authentications by and they d profiles 100 functionality access methods. Where'd wireless
01:23
the he n authentication types A 2.1 acts I may be right authentication Prada goes P A. P. M s a chap version to ta ke terrorists
01:36
or of entity stores, right? It could be an internal Adie token, et cetera. Write their authorization policies
01:46
on they. D attributes authentication Medford's identity groups and appoint attributes. Other informations can all be tied together to lease out in a sadistic authorization profile. Let's take a look at the coyote and a point like this. If it is cameras,
02:04
it's the rule. Name is the camera.
02:07
The conditions are implants. Logical profile Eco's camera.
02:13
Then I give you the results. It's I'll give you the off camera access, but put it in the groups of a camera. Right there is The heat comes on. Employees in active directory with the condition wired or wireless were in this A D group.
02:31
I get permit our access. I put you in a secret group of employees
02:38
on his Here's the here. Calm
02:40
on for the D for authorization. If there's no other policy marriages,
02:46
I give you the limited access. Only
02:51
right now here's the heat come summary in ice 2.3. All policies were converted to policy sets because this is, ah more scalable and efficient way to build a large numbers of policies. As we discovered a previously in this lab,
03:08
any questions Feel free to contact me. Otherwise I was seeing an axe. A video bye for now

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor