ECS Extreme Access Control

X

Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.


ECS Extreme Access Control

VARAA NYT
ECS Extreme Access Control
Kesto
4 päivää
Toimitus
(Online ja paikan päällä)
Hinta
Hinta pyydettäessä

The Extreme Access Control course teaches you the methods to properly configure and manage their Extreme Networks Access Control (EAC) solution using a combination of the network management software applications including Extreme Management Center, Policy and Extreme Access Control.

This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where you will perform real-world tasks configuring authentication mechanisms as well as creating different assessment methods and policies.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Access Control implementation
  • Take the ECS – Extreme Control certification exam

Introduction to Extreme Access Control

  • Extreme EAC Components
  • Extreme EAC Component functions
  • EAC Licensing Comparisons

Extreme Management Device Management

  • Extreme Management Center
  • Extreme Management Center Tools

Policy Overview

  • Policy Components and Structure
  • Policy Configuration for EAC Integration

Universal Port

  • Universal Port Features for EAC Integration

Initial EAC Configuration

  • EAC Manager Components
  • Adding Devices to the EAC Gateway

EAC Profiles

  • Interactions between Policy and EAC
  • Manage EAC Profiles

Authentication

  • Authentication Only Model
  • Authentication with Authorization Deployment Model
  • Components of Authentication and Authorization
  • Demonstrated RADIUS and LDAP Authentication Configuration

EAC Rules

  • Overview of EAC Rules
  • Configuration of EAC Rules

EAC Dashboard

  • Navigated to the EAC Dashboard Navigation
  • End System Table
  • Minor troubleshooting tasks for an End System

Network Redirection

  • How EAC Redirection works
  • Options to redirect Wired and Wireless Traffic to the EAC Engine for Network Registration

Portal Configuration

  • Creation of EAC Portal Pages for Network Registration, Assessment, Remediation and Administration

Guest Registration

  • Network Registration
  • Components of Guest Network Registration
  • Configuration of a EAC Deployment Providing Guest Registration Functionality

Network Registration Administration

  • Registration Administration and Sponsor pages
  • Maintenance of a User’s Registration Account

Authenticated Registration

  • Components of Authenticated Network Registration
  • Configuration of a EAC Deployment to provide Registration Functionality

Assessment

  • Different Assessment Types
  • Assessment Configuration Components
  • Assessment Configurations
  • Network Managers
  • Security Managers
  • System Administrators
  • Operators

Due to the nature of this course, Extreme Networks recommends that students should have previous hands-on experience with Extreme Networks wired and wireless as well as having attended Switching and Routing courses prior to attending.

The Extreme Access Control course teaches you the methods to properly configure and manage their Extreme Networks Access Control (EAC) solution using a combination of the network management software applications including Extreme Management Center, Policy and Extreme Access Control.

This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where you will perform real-world tasks configuring authentication mechanisms as well as creating different assessment methods and policies.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Access Control implementation
  • Take the ECS – Extreme Control certification exam

Introduction to Extreme Access Control

  • Extreme EAC Components
  • Extreme EAC Component functions
  • EAC Licensing Comparisons

Extreme Management Device Management

  • Extreme Management Center
  • Extreme Management Center Tools

Policy Overview

  • Policy Components and Structure
  • Policy Configuration for EAC Integration

Universal Port

  • Universal Port Features for EAC Integration

Initial EAC Configuration

  • EAC Manager Components
  • Adding Devices to the EAC Gateway

EAC Profiles

  • Interactions between Policy and EAC
  • Manage EAC Profiles

Authentication

  • Authentication Only Model
  • Authentication with Authorization Deployment Model
  • Components of Authentication and Authorization
  • Demonstrated RADIUS and LDAP Authentication Configuration

EAC Rules

  • Overview of EAC Rules
  • Configuration of EAC Rules

EAC Dashboard

  • Navigated to the EAC Dashboard Navigation
  • End System Table
  • Minor troubleshooting tasks for an End System

Network Redirection

  • How EAC Redirection works
  • Options to redirect Wired and Wireless Traffic to the EAC Engine for Network Registration

Portal Configuration

  • Creation of EAC Portal Pages for Network Registration, Assessment, Remediation and Administration

Guest Registration

  • Network Registration
  • Components of Guest Network Registration
  • Configuration of a EAC Deployment Providing Guest Registration Functionality

Network Registration Administration

  • Registration Administration and Sponsor pages
  • Maintenance of a User’s Registration Account

Authenticated Registration

  • Components of Authenticated Network Registration
  • Configuration of a EAC Deployment to provide Registration Functionality

Assessment

  • Different Assessment Types
  • Assessment Configuration Components
  • Assessment Configurations
  • Network Managers
  • Security Managers
  • System Administrators
  • Operators

Due to the nature of this course, Extreme Networks recommends that students should have previous hands-on experience with Extreme Networks wired and wireless as well as having attended Switching and Routing courses prior to attending.

    Kurssiaikataulu
  • ` Feb 6 - Feb 9, 2023
  • ` Mar 6 - Mar 9, 2023
  • ` Apr 3 - Apr 6, 2023
  • ` May 1 - May 4, 2023
  • ` May 29 - Jun 1, 2023
  • ` Jun 26 - Jun 29, 2023