Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

Software-Defined Network Access Control Requirements Part 1

Network Access Control

Software-Defined Network Access Control Requirements Part 1

01 February 2024

Here are some of the compliance requirements for a Software-Defined enterprise NAC solution:

The NAC solution should provide visibility, which helps the IT administrator determine the types of devices on the network and how to provide them with the right level of permissions. Basic asset visibility profiles endpoints by matching their network attributes to known profiles. Advanced asset visibility performs deeper analysis of the different conversations that applications on these devices have with other endpoints and servers on the network through Deep Packet Inspection (DPI).

The NAC solution should provide different options for deployment which include hardware and virtual with support for large, medium, and small enterprises.

The NAC solution should support a distributed architecture where multiple NAC engines can be centrally managed and configured from the NOC: There are two types of deployment architectures – standalone and distributed. In the latter architecture, multiple NAC engines are deployed across mission critical locations to provide location survivability and less dependency on a centralized NOC.

The NAC solution should support central licensing where licenses are applied to the Primary Administrative Node in the distributed architecture which means multiple NAC engines can be deployed across mission critical locations without additional licenses for the appliances in each location.

The solution should manage the end user connection experience and control network access based on a variety of criteria including authentication, username, MAC address, time of day and location. It should support the management of who, what, where, when, and how based on a variety of criteria which includes authentication, username, MAC address, time of day and location.

The solution should gain complete contextual knowledge from your network – see exactly who’s on your network, their location and their device type. The NAC solution should support the management of who, what, where, when, how, posture, threat, and vulnerability so that network management teams are able to gain complete contextual knowledge from your network – see exactly who’s on your network, their location and their device type.

The solution should provide Authorization, Authentication and Accounting (AAA) of network connections. Authentication, Authorization and Accounting are core functionalities of a NAC solution where each session begins with authentication, whether to a user or to a device. Authentication can be active authentication or passive authentication (not including 802.1x session).

Authentication is done using 802.1x when the NAC solution authenticates the user against an Identity Source, while in passive authentication (used in Easy Connect), a NAC solution learns about the user after the user authenticates against the Identity Source like Microsoft’s Active Directory (AD) and the AD notifies NAC. Authorization is then done to enforce appropriate access control policies to each connection. Finally, an account is kept as an audit of a user’s or device’s footprint when connected to the network.

The solution should support BYOD onboarding, NAC provides multiple elements that help automate the entire onboarding aspect for BYOD. This includes a built- in Certificate Authority (CA) to create and help distribute certificates to different types of devices. The built-in CA provides a complete certificate lifecycle management. It also provides a My Devices Portal, an end user facing portal, that allows the end user to register their BYOD endpoint as well as mark it as being lost to blacklist it from the network.

BYOD on boarding can be accomplished either through a single SSID or through a dual SSID approach. In a single SSID approach, the same SSID is used to onboard and connect the end user’s device while in a Dual SSID approach a different open SSID is used to on board the devices but the device connects to a different more secure SSID after the onboarding process. For use cases that need provision of a more complete management policy, BYOD can be used to connect the end user to the MDM onboarding page as well.

The NAC solution should have Built-in device profiling. It should support Endpoint Analytics designed to improve endpoint profiling and its fidelity. It should provide fine-grained endpoint identification and assigns labels to a variety of endpoints. This is done by analyzing endpoint attributes through Deep Packet Inspection (DPI) and other probes aggregated from different sources such as SD-AVC, and other third-party components. It uses Artificial Intelligence (AI) and machine learning to intuitively group endpoints that have common attributes and helps IT admins in providing suggestions to choose the right endpoint profiling labels. Multifactor classification classifies endpoints using label categories for flexible profiling. These endpoint labels can then be used to create custom profiles that form the basis of providing the right set of access privileges to endpoints/endpoint groups via an authorization policy.

Sources:

https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/ise-licensing-guide-og.html

https://irp.cdn-website.com/1db26910/files/uploaded/81604009214.pdf

https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/discussions-network-accesscontrol/562265/1/Cisco%20ISE%20Ordering%20Guide%20June%202020.pdf/

Insoft Services

  • Recent Blogs

  • Relevant Blogs

  • No Comments

    Comments are closed.