Course Details

Previous Page

Cisco SISAS 1.0: Identity Services Overview and 802.1X

Target Audience
Expected Duration
Lesson Objectives
Course Number

The most secure solution at the access edge is to leverage the intelligence of the network. Cisco offers a host of services designed to enable secure user and host access to enterprise networks. It provides standards-based network access control at the access layer by using the 802.1X protocol to secure the physical ports where end users connect. 802.1X is an IEEE standard for media-level access control, offering the capability to permit or deny network connectivity, control VLAN access and apply traffic policy, based on user or machine identity. In this course, you will learn about the secure access solution and its key components, such as authentication, authorization, accounting, the identity stores, as well as the main authentication proxy protocols: RADIUS and TACACS+. Additionally, you will explore the 802.1X framework. This course is one of a series in the Skillsoft learning path that covers the objectives for the Implementing Cisco Secure Access Solutions (SISAS) v1.0 (300-208 SISAS) exam.

Target Audience
This course is for anyone wishing to obtain the Implementing Cisco Secure Access Solutions (SISAS) v1.0 300-208 certification; one of four designed for the CCNP Security track from Cisco. Knowledge of Cisco Certified Network Associate (CCNA) certification is required and knowledge of Cisco Certified Network Associate (CCNA) Security certification and Knowledge of Microsoft Windows Operating System are helpful.


Expected Duration (hours)

Lesson Objectives

Cisco SISAS 1.0: Identity Services Overview and 802.1X

  • start the course
  • describe Cisco modular network architecture principles and designs
  • identify Cisco Modular Network Architecture security products and technologies
  • identify components of the Cisco secure access solution
  • compare AAA authentication and authorization services
  • describe AAA accounting services
  • identify functions that can be used to leverage Change of Authority (CoA)
  • describe the function of identity sources
  • compare the TACACS+ and RADIUS protocols
  • identify the functions and components of IEEE 802.1X
  • describe the 802.1X message flow
  • describe 802.1X authorization features
  • describe 802.1X VLAN types that can be assigned
  • describe the downloadable ACLs
  • describe the 802.1X Host Modes
  • identify the benefit of a 802.1X phased deployment
  • match the 802.1X deployment mode with its description
  • sequence the steps within a typical CoA flow
  • describe the MAC Authentication Bypass (MAB) feature
  • plan for 802.1X implementation
  • Course Number: