a little. Welcome back, Cisco. Survive Design associate Demo to Ice 2.3. Scenario five. Network device and management. I mean, instructor Wayne. Okay, let's start lab now
being nice Navigator administration There were resources and our devices
to view all over the narrow devices that ice know about
by default. Never axes, devices or a nadie are listed by name, any name,
but you can change it a short order by clicking on any called tattle. For example, by he
you're gonna Reese sort of again
were by profile
the end of a hardware, software
or by location
through her city building glory set her or that type
switch. Wireless VPN and center are important for helping the defying custom authentication on the authorization policies that apply to Space City. The hardware functionality government regulations are access methods.
You can't even export all of them into CSFB file using export
on, you know,
to export all of them into our T s B file.
She It's a downloading here, right?
Wait, We can We can take a look at it.
Can check all all the devices over here.
Name description. I ke address small gold
on the software
On the also dedication A ll things this exported thio cstv foul. So if you click on ah never device name You can see all of the configurable. Never device profile in particle options,
I say from here, right,
You can see all over the configurable. Never device profile on particle options
out only, really? If you want to see all of the endpoints connected through a specific number device, go to contacts. Feasibility
network device ese,
you can't cross who or what is connected. Which ports?
Let's say we pick up a day. This one.
Now we can see who on a well connected which port. There's a user name I P address Mac address. So awesome. Forth on which part? You're gonna check it out, right?
There's ah never Device Location
20 y in e m E year orthe 70 something way America 29 A pick right
Summer a ice Can ve you'll manage and export never devices As we discovered in this lab.
Any questions? Feel free to contact me. Otherwise I'll see you in the next video. Bye for now
16.4 ISE 2.3: ISE Authentication and Authentication Policy
16.5 Secure Cloud Managed Branch with Meraki Umbrella: Secure WAN
16.6 Secure Cloud Management With Meraki and Umbrella: Secure the Access
16.7 Secure Cloud Managed Branch with Meraki Umbrella: Operational Efficiency
16.8 DNA Center Appliance