Hello. Welcome back. Cisco Certified Design Associate Demo to Ice 2.3. Scenario six. Ice authentication on authorization policy. Okay, let's start lab
being nice to 0.3. All policies were converted to policy sets because this is a more scalable and efficient way to view the large numbers of the policies
drill down into the ice. Authentication on the all tradition policies health scaleable crump attacks as T t's are a fine and on how many Hiten they have in a counter
in the ice navigated policy
to see all policy sites
right for demo proposal only have our default policy
to keep things simple
quick to the viewer
for the default policy to see its authentication policies
on the authorization policies.
Authentication policies came made very granular with conditions
down to a space of the user or en pointe.
They generally are used to future authentications by and they d profiles 100 functionality access methods. Where'd wireless
the he n authentication types A 2.1 acts I may be right authentication Prada goes P A. P. M s a chap version to ta ke terrorists
or of entity stores, right? It could be an internal Adie token, et cetera. Write their authorization policies
on they. D attributes authentication Medford's identity groups and appoint attributes. Other informations can all be tied together to lease out in a sadistic authorization profile. Let's take a look at the coyote and a point like this. If it is cameras,
it's the rule. Name is the camera.
The conditions are implants. Logical profile Eco's camera.
Then I give you the results. It's I'll give you the off camera access, but put it in the groups of a camera. Right there is The heat comes on. Employees in active directory with the condition wired or wireless were in this A D group.
I get permit our access. I put you in a secret group of employees
on his Here's the here. Calm
on for the D for authorization. If there's no other policy marriages,
I give you the limited access. Only
right now here's the heat come summary in ice 2.3. All policies were converted to policy sets because this is, ah more scalable and efficient way to build a large numbers of policies. As we discovered a previously in this lab,
any questions Feel free to contact me. Otherwise I was seeing an axe. A video bye for now
16.5 Secure Cloud Managed Branch with Meraki Umbrella: Secure WAN
16.6 Secure Cloud Management With Meraki and Umbrella: Secure the Access
16.7 Secure Cloud Managed Branch with Meraki Umbrella: Operational Efficiency
16.8 DNA Center Appliance
16.9 APIC 4.0 Operations and Troubleshooting