This course provides in-depth knowledge and practical skills in implementing a comprehensive ACI security design.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Module 1: Cisco ACI Software Defined Networking (SDN) Architecture
Objective: Gain comprehensive knowledge of the Cisco SDN Architecture implementation of hardware and software
Module 2: Secure Hypervisor integration with Cisco ACI
Objective: Understand the secure integration of leading hypervisors with Cisco Application Centric Infrastructure (ACI)
Module 3: Cisco ACI Native Access Control
Objective: Explore, configure, and evaluate all the native Cisco ACI access control mechanisms
Module 4: Cisco ACI L4-L7 Service Graphs for Secure Device Integration
Objective: Develop skills in L4-L7 service graphs to extend ACI security with external devices
Module 5: Cisco ACI and NGFW Integration
Objective: Develop skills in understanding the value and approach of Cisco ACI and NGFW integration
Module 6: Application Policy Infrastructure Controller (APIC) Security and Hardening
Objective: Learn method of adding security to the APIC for all management and programmatic functions
Module 7: Administering Physical ACI Security
Objective: Master administration of ACI Physical Security
Module 8: Cisco ACI Multidomain Security
Objective: Develop skills in understanding the value and approach of Cisco ACI and VMware NSX integration
Lab Outline:
Labs are designed to assure learners a whole practical experience, through the following practical activities:
Lab 0: Accessing the NterOne Lab Devices
Lab 1: Validate Fabric Discovery
Lab 2: Create ACI Access Policies
Lab 3: Implement Cisco ACI Tenant Policies
Lab 4: Integrate APIC with Nutanix Acropolis Hypervisor (AHV)
Lab 5: Enable a Bare Metal Device in your Tenant
Lab 6: Configure External Layer 3 (L3Out) Connection
Lab 7: ACI VRF Policy Control Enforcement
Lab 8: Configure ACI Preferred Groups
Lab 9: Configure ACI vzAny
Lab 10: Configure an ACI Allow List Model with Contracts and Filters
Lab 11: Configure Tenant Span to analyze security
Lab 12: Contract Inheritance with EPG Contract Master
Lab 13: Configure an ASAv in a ACI Service Graph in Unmanaged Mode
Lab 14: ACI Endpoint Security Groups (ESGs)
Lab 15: ACI Micro segmented EPG (uEPG)
Lab 16: Configure a NGFW Firepower firewall in a ACI with Policy Based Routing (PBR)
Lab 17: Configure Threat Detection with IDS and IPS in the ACI Integrated NGFW Firepower Security virtual machine
Lab 18: Enabling 802.1X in ACI
Lab 19: Monitoring and Diagnosing ACI Security
Lab 20: Configure RBAC using Local and RADIUS Users
By the end of this course, participants will learn a comprehensive approach of implementing security in ACI. You will be proficient in managing and administering both internal and external security approaches in ACI. Upon completion, the learner will be able to meet these overall objectives:
The knowledge and skills that the learner should have before attending this course are as follows:
The primary audience for this course is as follows:
- Network administrators and engineers
- IT professionals working with Cisco ACI
- Individuals interested in Data Center security
COURSE CONTENT: Cisco Unified Communications Manager Architecture and Initial Configuration • Describing the Role of Cisco Unified Communications Manager, Its Architecture and Its Deployment and Redundancy Options • Performing…
COURSE CONTENT: UCS Infrastructure Components with Intersight • Cisco UCS X-Series, Use Cases, and Components • Introducing Cisco Intersight Managed Mode • Describing Cisco UCS C-Series Servers • Describing…
COURSE CONTENT: Module 1: Describe Cisco Umbrella • What is Umbrella • Enforcement • DNS Overview • Why DNS? • Co-occurrence Model • Spike Rank Model • Predictive IP…
We use cookies to improve your experience, including essential cookies required for the website to function. By continuing, you agree to our use of cookies. Learn more.