Agendas
|
In this guided, hands-on course, you'll explore how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Throughout the lab, you’ll take on the role of an administrator for a fictional organization, PseudoCo, as you configure secure connectivity between remote users and private applications hosted in a secure data center. What You’ll Learn: How to onboard private data center routers and create Network Tunnel Groups (NTGs) How to integrate Active Directory and Duo Security with Secure Access for identity-based access control How to implement SAML-based authentication for Zero Trust proxy workflows How to validate route propagation, tunnel health, and user access through CLI and dashboard tools How to integrate ThousandEyes for performance visibility Lab Format: Step-by-step guided tasks using virtual lab infrastructure CLI verification, dashboard workflows, and real-world attack simulation scenarios Knowledge check questions and reflection activities to reinforce learning This Session will provide attendees with the knowledge and steps necessary to configure, test and maintain their first Secure Access deployment. Attendees will have full admin access to a virtual data center environment deployed in one of Cisco's dCloud Data Center locations, containing all the necessary infrastructure to integrate with Secure Access. If you are unsure which dCloud Data Center your lab infrastructure is located in, please check with your proctor. Each attendee will also have full access to a unique Secure Access organization. These Secure Access Orgs are fully provisioned to be configured for infrastructure in any Secure Access region. It is recommended that Tunnels, IP Pools and VPN configurations are setup in the Secure Access region closest to the dCloud Data Center virtual data center environment you are using. Learning Objectives: Upon completion of this lab, you will be able to recognize and configure the components of Secure Access necessary to connect remote and branch users to private applications. Understand the difference between VPN and ZTA access to private applications. While not comprehensive, the knowledge gained in this lab will provide a solid foundation to build out an initial deployment of Secure Access, test its components and realize value quickly. |