Hello. Welcome back. Since we'll certify Design associate Demo to Ice 2.3. Scenario for the you Alive Altercation. I'm an instructor Wing.
Okay, let's start a lap
Ice allows you to the old alive. Authentication to your network in real time using the live log capability. These are lost city to not only see what is coming in, but you can drill down to understand how and why something is a failing or unexpected
In eyes. Navigator operations
go to readers. Live blocks.
You can see the lab logs here. You cannot adjust it. A hop data frequency number of the Rikers
I window you would review right.
You can do every 32nd to refresh. And do you know,
show how many records you can do a time frame.
Notice that all of the details about one What?
Who, where and how subjective, Authenticated, and never.
Against four down. Over. We're here to see, um,
device word I p address authorization policy authorization profile, authentication policy and appoint profile and point idee. Resented any
on the time
If you want to know why something matching a specific communication, all transition policy, just simply Creek on the authentication details icon to get it over. The U
authentication details attributes off relation results on a view of the steps that the ice completed when evaluating its policy.
These can be extremely helpful for capturing
that has passed. We click on this. Do you take detailed to report?
All right, you can see this, right?
I'll think Asian details, attributes,
on the view the steps there ice completed when the evaporating in its policies.
If you wonder
why a particular you'd awry and point of failed click on that Tito's on isis you to tell you the reason
what resolution it can take to fix it. All right, here's the reason 5405
readers request dropped.
This is Kanaan located our device or tipo a client.
You know those a request dropped
summery ice lost you to view of live authentication to your network in real time using my life log capability. These are lost to you not only see what is coming in,
but you can drill down to understand a hall and why it was something is a fading or unexpected, just like the way it discovered in the slap.
Any questions? Feel free to contact me. Otherwise I'll see you in the next video. Bye for now.
16.3 ISE 2.3: Network Device Management
16.4 ISE 2.3: ISE Authentication and Authentication Policy
16.5 Secure Cloud Managed Branch with Meraki Umbrella: Secure WAN
16.6 Secure Cloud Management With Meraki and Umbrella: Secure the Access
16.7 Secure Cloud Managed Branch with Meraki Umbrella: Operational Efficiency