Administering and Troubleshooting Cisco Secure Access
This course provides a comprehensive framework for understanding, deploying, managing, and troubleshooting Cisco Secure Access. Students will begin with an introduction to cloud security and key models such as SASE and Zero Trust Access, before moving into detailed coverage of Secure Access architecture, features, licensing, and integrations with Cisco SD-WAN and Meraki. Learners will learn Secure Access through onboarding, initial configurations, user and identity management, DNS forwarders, network connectivity, and policy creation for both internet and private access. This course content emphasizes endpoint security, VPN services, data loss prevention, malware protection, and the use of Cisco Secure Client across multiple platforms. Advanced topics include monitoring, logging, troubleshooting, scalability, and leveraging ThousandEyes for digital experience insights, as well as working with Secure Access APIs for automation and integration. This structured approach equips learners with the knowledge and tools to effectively implement, secure, and troubleshoot modern access environments.
Who Should Attend
Outline
Module 1: Introduction to Cisco Cloud Security
- Lesson 1: Cloud Security Overview
- Lesson 2: Evolution of Networking and Security
- Lesson 3: Overview of SASE (Secure Access Service Edge)
- Lesson 4: Umbrella vs Secure Access vs Secure Connect
- Lesson 5: Zero Trust Access (ZTA) / Zero Trust Network Access (ZTNA)
Module 2: Introduction to Cisco Secure Access
- Lesson 1: Introduction to Cisco Secure Access
- Platform Architecture
- Secure Access Licensing
- Network Requirements for Secure Access
- Service Levels and Support:
- Secure Access Regions
- Lesson 2: Secure Access features
- Clientless Zero Trust Access (ZTA)
- Client-Based Zero Trust Access (ZTA)
- VPN as a Service (VPNaaS)
- Unified Private Access
- Firewall as a Service (FWaaS)
- Intrusion Prevention System (IPS)
- Experience Insights: Digital Experience Monitoring (DEM)
- Domain Name System (DNS) Security
- Secure Web Gateway (SWG)
- Multimode Malware Protection
- Cloud Access Security Broker (CASB)
- Multimode Data Loss Prevention (DLP)
- Remote Browser Isolation (RBI)
- Lesson 3: Cisco SD-WAN Integration Overview
- Lesson 4: Cisco Meraki Integration Overview
- Lesson 5: Secure Private Access
- Via VPN
- Via ZTNA (Client Based)
- Via ZTNA Clientless
- Branch to RA user
- Secure Internet Access
- VPN full tunnel
- Branch traffic
- Roaming
- Via VPN
- Lesson 6: Cisco Secure Client Integration Overview
Module 3: Secure Cloud Control
- Lesson 1: Security Cloud Control Overview
- Mission and Objectives
- Customer Benefits
- Strengths & Differentiators
- Core Services
- Managed Products
- Platform Navigator
- Lesson 2: Secure Cloud Control Organizations
- Organization Overview
- Organization Creation
- Multiple Organizations Use Cases
- Organization Management
- Lesson 3: Secure Cloud Control Subscriptions
- Claiming and Activation Process
- Customer Onboarding
- Enterprise and Region Selection
- Claim Process Walkthrough
- Activation and Provisioning
- Lesson 4: Secure Cloud Control User Management
- Unified User Management
- Granular Control
- Administrator Access
- Identity Provider (IdP) Integration
- Lesson 5: Network Connectivity
- Connectivity requirements for SCC operations
- Secure flows and policy enforcement
- Integration of network infrastructure with SCC
- Lesson 6: Integrating Identity Providers
- Unified User Experience
- Login Security
- IdP Setup Process
Module 4: Onboarding and Initial Configuration of Cisco Secure Access
- Lesson 1: Accessing Cisco Secure Access
- Lesson 2: Security Cloud Sign-On
- Multi-factor authentication (MFA) for enhanced security.
- Find Your Organization ID
- Configure Single Sign-On Authentication
- Troubleshoot Single Sign-On Authentication
- Lesson 3: Secure Access Single Sign-On Authentication
- Lesson 4: Secure Access Initial Workflow
- Configure Network Connections
- Task 1 – Add Network Connections
- Task 2 – Provision Users and Groups
- Task 3 – Configure Integrations with SAML Identity Providers
- Configure Access to Resources
- Task 1 – Set Up Private Resources
- Task 2 – Configure Rule Defaults and Global Settings
- Manage Rule Defaults
- Manage Global Settings
- Task 3 – Add a Policy Rule
- Configure End User Connectivity
- Task 1 – Configure Zero Trust
- Task 2 – Configure Virtual Private Networks
- Task 3 - Configure Internet Security
- Configure Endpoints and Network Sources
- Add Networks to Secure Access
- Set Up the Cisco Secure Client
- Add IPS Profiles
- Configure Rule Profiles
- Secure Access Overview Dashboard
- Experience Insights
- Connectivity
- Data Transfer
- Security
- Users and Groups
- Private Resources
- Configure Network Connections
Module 5: User Management and Authentication
- Lesson 1: Manage Users and Groups
- View User Details
- View Group Details
- View Organizational Unit Details
- Unenroll Devices for Client-Based Zero Trust Access
- Disconnect Remote Access VPN Sessions
- Lesson 2: Manage User Directories
- Configure User Directory Integrations
- Manage Cloud Identity Providers
- Import Users and Groups from CSV File
- Manage Active Directory Integration
- Manage Google Workspace Account
- Manage Imported Users and Groups
- Learn to enhance security with contextual factors like geolocation, device posture, and user behavior analysis.
- Lesson 3: Provision Users and Groups from Active Directory
- Prerequisites for AD Connectors
- Connect Multiple Active Directory Domains
- Manage AD Components
- Add AD Components in Secure Access
- Manage Sites for AD Components
- View AD Components in Secure Access
- Delete AD Components
- Manage AD Connectors
- Configure Authentication for AD Connectors and VAs
- Configure Updates on AD Connectors
- Connect Active Directory to Secure Access
- Deploy LDIF Files for AD Connector
- Change the Connector Account Password
- AD Connector Communication Flow and Troubleshooting
- AD Integration with Virtual Appliances
- Prerequisites for AD Connectors and VAs
- Prepare Your AD Environment
- Connect Active Directory to VAs
- Multiple AD Domains with Secure Access Sites
- Lesson 4: Manage User Authentication Profiles
- Add User Authentication Profiles
- About Single Sign-On for Users
- Edit User Authentication Profile
- Delete User Authentication Profile
- Lesson 5: Configure Integrations with SAML Identity Providers
- Prerequisites for SAML Authentication
- Configure Microsoft Entra ID for SAML
- Configure Okta for SAML
- Configure AD FS for SAML
- Configure Duo Security for SAML
- Configure Ping Identity for SAML
- Configure OpenAM for SAML
- SAML Certificate Renewal Options
- Test SAML Identity Provider Integration
Module 6: DNS Forwarders
- Lesson 1: Virtual Appliances Overview
- Prerequisites for Virtual Appliances
- Virtual Appliance Deployment Guidelines
- Virtual Appliance Sizing Guide
- Lesson 2: Manage VAs in Secure Access
- Configure Authentication for Virtual Appliances
- Manage DNS Forwarders
- Manage Site for Virtual Appliance
- Configure Updates for Virtual Appliances
- Lesson 3: Deploy Virtual Appliances
- Deploy VAs in Hyper-V for Windows 2012 or Higher
- Deploy VAs in VMware
- Deploy VAs in Microsoft Azure
- Deploy VAs in Amazon Web Services
- Deploy VAs in Google Cloud Platform
- Deploy VAs in KVM
- Deploy VAs in Nutanix
- Lesson 4: Configure Virtual Appliances
- Configure Settings on VAs
- Lesson 5: Local DNS Forwarding
- Lesson 6: Test Virtual Appliance Deployments
- Lesson 7: SNMP Monitoring for Virtual Appliances
- Lesson 8: Troubleshoot Virtual Appliances
Module 7: Network Connections
- Lesson 1: Network Connection Overview
- Lesson 2: Network Requirements
- Secure Access DNS Resolvers
- Secure Access Encrypted DNS Queries
- Secure Access DNS – Block Pages
- Secure Access DNS and Web – Client Configuration Services
- Secure Access DNS and Web – Client Sync Services
- Secure Access DNS and Web – Client Certificate Revocation Services
- Cisco Secure Client and Captive Portal Detection
- Cisco Secure Client and Device Hostnames
- TLS Protocol Requirements
- Secure Access Secure Web Gateway Services
- Secure Access Realtime DLP Secure ICAP
- Secure Access SaaS Tenants
- Secure Access SAML Gateway Services
- Secure Access SAML Identity Provider Domains
- Secure Access SAML Gateway Client Certificate Revocation Services
- Lesson 3: Secure Access VPN Services
- Secure Access VPN Client Certificate Revocation Services
- Secure Access Zero Trust Client-Based Enrollment Services
- Secure Access Zero Trust Client-Based Proxy Services
- Secure Access Zero Trust Client-Based Proxy – Client Certificate Revocation Services
- Secure Access Zero Trust Proxy Services – Unmanaged Devices
- Secure Access Resource Connectors
- Lesson 4: Secure Access NAT as a Service
- Web Traffic and NATaaS
- Non-Web Traffic and NATaaS
- Reserved IP
- Best Practices
- Lesson 5: Manage Network Connections
- IPsec Network Tunnels
- Resource Connector Groups
- Resource Connectors (Deployed in Connector Groups)
- Network Tunnels (Deployed in Network Tunnel Groups)
- Lesson 6: Manage Network Tunnel Groups
- Device Compatibility and Network Tunnels
- Add a Network Tunnel Group
- Delete a Network Tunnel Group
- Edit a Network Tunnel Group
- View Network Tunnel Group Details
- Supported IPsec Parameters
- Lesson 7: Network Tunnel Configuration
- Establish a Tunnel
- Tunnel Size
- Maximum Transmission Unit Size
- Client Reachable Prefixes
- Throughput and Multiple Tunnels
- Establish a Tunnel
Module 8: SD-WAN Integration
- Lesson 1: Cisco SD-WAN Overview
- Lesson 2: Catalyst SD-WAN Security
- Lesson 3: Configure Tunnels with Cisco Catalyst SD-WAN
- Cisco Catalyst SD-WAN SD-WAN Prerequisites
- Configure Tunnel in Secure Access
- Configure Cisco Catalyst SD-WAN Templates
- Configure Cisco Catalyst SD-WAN Configuration Groups
- Configure Static Routes
- Verify Tunnel Status
- Lesson 4: Configure Tunnels with Meraki MX
- Meraki MX Prerequisites
- Caveats and Considerations
- Supported Use Cases and Requirements
- Add a Network Tunnel Group in Secure Access
- Configure a Tunnel in Meraki MX
- Verification and Troubleshooting
Module 9: Managing Secure Access Networks and Objects
- Lesson 1: End-User Connectivity
- Lesson 2: Traffic Steering for Zero Trust Access Client-Based Connections
- Using Wildcards to Configure Traffic Steering for Private Destinations
- Lesson 3: Remote Access Virtual Private Networks
- FQDNs for Network Connections
- Manage IP Pools
- Add an IP Pool
- Manage VPN Profiles
- Add VPN Profiles
- Add a RADIUS Group
- Manage Machine Tunnels
- Lesson 4: Internet Security
- Set Up Internet Security on User Devices
- Manage Internet Security Bypass
- Add Destinations for Internet Security Bypass
- Edit Destination for Internet Security Bypass
- Delete Destination for Internet Security Bypass
- Configure Cisco Secure Client Settings
- Lesson 5: PAC Files
- Deploy the Secure Access PAC File for Windows
- Deploy the Secure Access PAC File for macOS
- Customize the Secure Access PAC File
- Upload Custom PAC Files to Secure Access
- Lesson 6: Proxy Chaining
- Forwarded-For (XFF) Configuration
- Lesson 7: Registered Networks
- Add Network Resources
- Point Your DNS to Cisco Secure Access
- Clear Your DNS Cache
- Update a Network Resource
- Delete a Network Resource
- Lesson 8: Internal Networks
- Add Internal Network Resources
- Update an Internal Network Resource
- Delete an Internal Network Resource
- Lesson 9: Sites
- Lesson 10: Destination Lists
- Add a Destination List
- Upload Destinations From a File
- Edit a Destination List
- Download Destinations to a CSV File
- Control Access to Custom URLs
- Wildcards in Destination Lists
- Add Top-Level Domains to Destination Lists
- Add Punycode Domain Name to Destination List
- Troubleshoot DNS Destination Lists
- Lesson 11: Application Lists
- Add an Application List
- Application Categories
- Delete an Application List
- Lesson 12: Content Category Lists
- Available Content Categories
- Add a Content Category List
- Request a Category for an Uncategorized Destination
- Dispute a Content Category
- View Content Categories in Reports
- Lesson 13: Tenant Control Profiles
- Add a Tenant Controls Profile
- Control Cloud Access to Microsoft 365
- Control Cloud Access to Google G Suite
- Control Cloud Access to Slack
- Control Cloud Access to Dropbox
- Use Tenant Controls in Access Rules
- Review Tenant Controls Through Reports
- Lesson 14: Roaming Devices
- View Internet Security Settings for Roaming Devices
- Edit Internet Security Settings for Roaming Devices
- Delete a Roaming Device
- Lesson 15: Private Resources
- Add a Private Resource
- Add a Private Resource Group
- Private Resource Configuration Examples
- Lesson 16: Connections to Private Destinations
- Comparison of Zero Trust Access and VPN
- Comparison of Client-Based and Browser-Based Zero Trust Access Connections
- Requirements for Zero Trust Access
- Network Authentication for Zero Trust Access
- Manage Branch Connections
- Allow SSH and RDP Access to Private Resources
- Lesson 17: Network and Service Objects
- Network Objects
- Add Network Objects
- Edit a Network Object
- Manage Details of a Network Object
- Delete a Network Object
- Network Object Groups
- Add Network Object Groups
- Edit a Network Object Group
- Manage Details of a Network Object Group
- Delete a Network Object Group
- Service Objects
- Add Service Objects
- Edit a Service Object
- Manage Details of a Service Object
- Delete a Service Object
- Service Object Groups
- Add Service Object Groups
- Edit a Service Object Group
- Manage Details of a Service Object Group
- Delete a Service Object Group
- Network Objects
Module 10: Configuring Access Policies and Access Rules
- Lesson 1: Secure Access - Access Policies
- Access Policy Overview
- Show Additional Data on Your Access Rules
- Edit the Order of the Rules in Your Access Policy
- Rule Defaults: Default Settings for Access Rules
- Global Settings for Access Rules
- Edit Rule Defaults and Global Settings
- Edit the Default Access Rules
- Using Wildcard Masks on Access Rules
- Lesson 2: Internet Access Rules
- Components for Internet Access Rules
- Default Settings for Internet Access Rules
- Add an Internet Access Rule
- About Configuring Sources in Internet Access Rules
- About Configuring Destinations in Internet Access Rules
- Ensure Rule Matching for Encrypted Internet Traffic
- Block Internet Access to Geographic Locations
- Advanced Application Controls
- Global Settings for Internet Access Rules
- About Isolated Destinations
- Isolate Downgrade
- Troubleshoot Internet Access Rules
- Zero Trust Access to Internet Destinations
- Lesson 3: Private Access Rules
- Components for Private Access Rules
- Default Settings for Private Access Rules
- Add a Private Access Rule
- About Configuring Sources in Private Access Rules
- About Configuring Destinations in Private Access Rules
- About Endpoint Requirements in Access Rules
- Allowing Traffic from Users and Devices on the Network
- Global Settings for Private Access Rules
- View Rules Associated with a Private Resource
- Troubleshoot Private Access Rule
Module 11: Cisco Secure Client
- Lesson 1: Cisco Secure Client Overview
- Lesson 2: Managing Client-based Zero Trust Access from Mobile Devices
- Set up the Zero Trust Access App for iOS Devices
- Set up the Zero Trust Access App for Android Devices
- Set up the Zero Trust Access App for Android on Samsung Devices
- Monitor and Troubleshoot the Zero Trust Access App from Mobile Devices
- Lesson 3: Cisco Secure Client on Windows and macOS Devices
- Download Cisco Secure Client
- Install the Root Certificate for All Browsers
- Install the Cisco Secure Client
- Lesson 4: Internet Security on Cisco Secure Client
- Download the OrgInfo.json File
- Umbrella Roaming Security Module Requirements
- Domain Management
- Interpret Internet Security Diagnostics
- IPv4 and IPv6 DNS Protection Status
- Customize Windows Installation of Cisco Secure Client
- Customize macOS Installation of Cisco Secure Client
- Lesson 5: Manage Zero Trust Access using Cisco Secure Client on Windows and macOS Devices
- Requirements for Secure Client with Zero Trust Access
- Invite Users to Enroll in Zero Trust Access for Secure Client
- Troubleshoot Client-Based Zero Trust Access
- Completely Remove Zero Trust Access from a Device
- Lesson 6: Manage Virtual Private Networks on Cisco Secure Client
- Download the Virtual Private Network XML Profile
- CA Certificates for VPN Connections
- Lesson 7: Cisco Security for Chromebook Client
- Cisco Security for Chromebooks
- Prerequisites for Cisco Security for Chromebooks Client
- Deploy the Cisco Security for Chromebooks Client
- Enable Reporting for Private IP Addresses of Chromebook Device
- Verify Cisco Security for Chromebook client Deployment
- Troubleshoot Cisco Security for Chromebooks Client Deployment
- View Protection Status of Chromebook Devices
- Add Policies to a Chromebook Device
Module 12: Managing Secure Access Security Settings
- Lesson 1: Endpoint Security Settings
- Endpoint Attributes
- Lesson 2: Zero Trust Access Posture Profiles
- Add a Client-Based Zero Trust Access Posture Profile
- Add a Browser-Based Zero Trust Access Posture Profile
- Lesson 3: VPN Connection Posture Profiles
- Add a VPN Connection Posture Profile
- Lesson 4: IPS Profiles
- Lesson 5: Security Profiles
- Security Profiles for Internet Access
- Add a Security Profile for Internet Access
- Enable SafeSearch
- Security Profiles for Private Access
- Add a Security Profile for Private Access
- Lesson 6: Threat Categories
- Threat Category Descriptions
- Add a Threat Category List
- Dispute a Threat Categorization
- Lesson 7: File Inspection and File Analysis
- Enable File Inspection
- Enable File Analysis by Cisco Secure Malware Analytics
- Test File Inspection for Internet Access
- Monitor File Inspection and Analysis Activity
- Troubleshoot File Inspection and Analysis
- Lesson 8: File Type Controls
- Enable File Type Controls
- File Types to Block
- Review File Type Controls Through Reports
- Lesson 9: Notification Pages
- Preview Notification Pages
- Create Custom Block and Warn Pages
- Allow Users to Contact an Administrator
- Lesson 10: Traffic Decryption
- Important Information About Do Not Decrypt Lists
- Add a Do Not Decrypt List for Security Profiles for Internet Access
- Lesson 11: Certificates
- Certificates for Internet Decryption
- Install the Cisco Secure Access Root Certificate
- Add Customer CA Signed Root Certificate
- View the Cisco Trusted Root Store
- Manage Certificates for Private Resource Decryption
- Certificates for Private Resource Decryption
- Certificates for SAML Authentication
- Manage SAML Certificates for Service Providers
- Manage SAML VPN Service Provider Certificate Rotation
- Manage SAML Certificates for Identity Providers
- VPN Certificates for User and Device Authentication
- Manage CA Certificates for VPN Connections
- Lesson 12: Data Loss Prevention Policy
- Add a Real Time Rule to the Data Loss Prevention Policy
- Understand Exclusions in a Real Time Rule
- Supported Applications
- Add a SaaS API Rule to the Data Loss Prevention Policy
- Discovery Scan
- Edit a Data Loss Prevention Rule
- Delete a Data Loss Prevention Rule
- Enable or Disable a Data Loss Prevention Rule
- Supported File and Form Types
- Best Practices for the Data Loss Protection Policy
- Lesson 13: Data Classifications
- Create a Data Classification
- Copy and Customize a Built-In Data Classification
- Delete or Edit a Classification
- Create an Exact Data Match Identifier
- Index Data for an EDM
- Exact Data Match Field Types
- Create an Indexed Document Match Identifier
- Built-In Data Classifications
- Lesson 14: Built-in Data Identifiers
- Copy and Customize a Data Identifier
- Create a Custom Identifier
- Custom Regular Expression Patterns
- Individual Data Identifiers
- Lesson 15: SaaS API Data Loss Prevention
- Enable SaaS API Data Loss Prevention for AWS Tenants
- Enable SaaS API Data Loss Prevention for Azure Tenants
- Enable SaaS API Data Loss Prevention for Box Tenants
- Enable SaaS API Data Loss Prevention for Dropbox Tenants
- Enable SaaS API Data Loss Prevention for Google Drive Tenants
- Enable SaaS API Data Loss Prevention for Microsoft 365 Tenants
- Enable SaaS API Data Loss Prevention for ServiceNow Tenants
- Enable SaaS API Data Loss Prevention for Slack Tenants
- Enable SaaS API Data Loss Prevention for Webex Teams
- Lesson 16: Cloud Malware Protection
- Enable Cloud Malware Protection
- Revoke Authorization for a Platform
- Enable Cloud Malware Protection for AWS Tenants
- Enable Cloud Malware Protection for Azure Tenants
- Enable Cloud Malware Protection for Box Tenants
- Enable Cloud Malware Protection for Dropbox Tenants
- Enable Cloud Malware Protection for Google Drive
- Enable Cloud Access Security Broker Protection for Microsoft 365 Tenants
- Enable Cloud Malware Protection for ServiceNow Tenants
- Enable Cloud Malware Protection for Slack Tenants
- Enable Cloud Malware Protection for Webex Teams
Module 13: Monitoring and Troubleshooting Cisco Secure Access
- Lesson 1: Monitoring Secure Access
- Monitoring Remote Access Client
- Monitoring Networks
- Monitoring Network Path
- Monitor Application Performance
- Lesson 2: Secure Access Logging
- Enable Logging
- Enable Logging to Your Own S3 Bucket
- Enable Logging to a Cisco-managed S3 Bucket
- Change the Location of Event Data Logs
- Stop Logging
- Delete Logs
- Log Formats and Versioning
- Reports and CSV Formats
- Admin Audit Log Formats
- Cloud Firewall Log Formats
- Data Loss Prevention (DLP) Log Formats
- DNS Log Formats
- File Events Log Formats
- IPS Log Formats
- Remote Access VPN Log Formats
- Web Log Formats
- Zero Trust Access Log Formats
- Lesson 3: Cisco AI Assistant
- Add Rules with the Cisco Assistant
- Cisco Assistant Rule Examples
- Find Documented Answers with the Cisco Assistant
- Messages Generated by the Cisco Assistant
- Lesson 4: Experience Insights with ThousandEyes
- Experience Insights
- Onboard Experience Insights
- Set-Up Experience Insights
- Generate OAuth Bearer Token
- Configure Experience Insights
- Cisco AI Assistant for Experience Insights
- View Endpoint Performance Map
- View Summary of Endpoints
- Wi-Fi Descriptions
- View Common SaaS Applications
- Lesson 5: Reports
- Monitor Secure Access with Reports
- Export Report Data to CSV
- Bookmark and Share Reports
- Report Search Window & Retention
- Report Scheduling
- Schedule a Report
- Update a Scheduled Report
- Remote Access Log Report
- View the Remote Access Log Report
- Activity Search Report
- View and Customize the Activity Search Report
- View Firewall Events in Activity Search Report
- View Zero Trust Events in Activity Search Report
- View Activity Search Report Actions
- Schedule an Activity Search Report
- Use Search and Advanced Search
- Security Activity Report
- View Activity and Details by Filters
- View Activity and Details by Event Type or Security Category
- View an Event's Details
- Search for Security Activity
- Total Requests Report
- Activity Volume Report
- App Discovery Report
- View the App Discovery Report
- View the Highest Risk Apps
- Review Apps in the Apps Grid
- View App Details
- Change App Details
- Control Apps
- Control Advanced Apps
- View Traffic Data Through SWG Service
- Top Destinations Report
- Destination Details
- Top Categories Report
- Category Details
- Third-Party Apps Report
- Cloud Malware Report
- Data Loss Prevention Report
- Admin Audit Log Report
- Export Admin Audit Log Report to an S3 Bucket
- Lesson 6: Troubleshooting and Scalability
- Troubleshooting Common Issues
- Troubleshooting Clients
- Troubleshoot Client-Based Zero Trust Access
- Troubleshoot Failure in Accessing Private Resources
- Troubleshooting Network Connectivity
- Troubleshoot Secure Access Roaming Clients
- Cisco Secure Client Diagnostic and Reporting Tool (DART)
- Packet Captures
- HTTP Archive (HAR) Captures
Module 14: Experience Insights with ThousandEyes
- Lesson 1: Experience Insights Overview
- Purpose, key concepts, data flow (endpoint → network/Wi-Fi → cloud/SaaS), and benefits within Cisco Secure Access.
- Architecture with ThousandEyes integration: data sources, collectors/agents, and correlation points.
- Real-world scenario: diagnosing 'Teams is slow' by correlating device Wi-Fi, WAN path, and SaaS endpoint.
- Lesson 2: Onboard Experience Insights
- Tenant readiness checks and required roles/permissions.
- Connecting Cisco Secure Access to ThousandEyes: account scoping, API enablement, least-privilege considerations.
- Lab: verify tenant linkage; confirm agent inventory and accessible measurements.
- Lesson 3: Set Up Experience Insights
- Core settings: regions, identity provider alignment, endpoint tagging standards, and privacy controls.
- Generate OAuth Bearer Token: register API client (client ID/secret), scope selection, token lifetime hygiene.
- Token generation flow, secure storage, and rotation practices.
- Lesson 4: Configure Experience Insights
- Link ThousandEyes tests to Experience Insights (HTTP Server, Page Load, Network/Path Visualization).
- Endpoint group definitions, thresholds, and alerting policies.
- Dashboards & widgets: building role-specific views for NOC vs. help desk.
- Lesson 5: Cisco AI Assistant for Experience Insights
- Capabilities: natural-language queries, root-cause suggestions, and remediation prompts.
- Guardrails: data scope, auditability, and explainability of AI-generated insights.
- Real-world workflow: 'Why are logins slow in Chicago?'—AI Assistant surfaces Wi-Fi RSSI issues plus CDN edge degradation.
- Lesson 6: View Endpoint Performance Map
- Map layers: endpoint health, local network, WAN/ISP, cloud path, and SaaS reachability.
- Reading hop-by-hop visualizations and identifying chokepoints.
- Lesson 7: View Summary of Endpoints
- Fleet health roll-ups: top impacted users, devices, and locations.
- Drill-downs: per-endpoint KPIs (CPU, memory, Wi-Fi signal/noise, driver/version), recent incidents.
- Lesson 8: Wi-Fi Descriptions
- Key Wi-Fi metrics: RSSI, SNR, PHY rate, retries, roaming behavior, band/channel utilization.
- Common pitfalls: sticky clients, misconfigured band steering, power/channel planning.
- Real-world fixes: targeted AP tuning vs. client driver updates.
- Lab: classify issues from Wi-Fi descriptions and match each to a remediation action.
- Lesson 9: View Common SaaS Applications
- Catalog of monitored SaaS (M365, Webex by Cisco, Salesforce, Google Workspace, etc.).
- Interpreting service status vs. user experience; distinguishing local vs. provider-side incidents.
- Lab: compare two SaaS apps across sites; set alert thresholds and notification routing.
Module 15: Secure Access APIs
- Lesson 1: Secure Access Overview
- Secure Access API Resources
- Base URI
- Authorization
- Rate Limits and Response Codes
- OAuth 2.0 Scopes
- Lesson 2: Secure Access API Authentication Keys
- API Key Use Cases
- Sign in to Secure Access
- Managing API Keys
- Lesson 3: API Reference
- Auth
- Admin
- Deployments
- Investigate
- Policies
- Reports
- Lesson 4: Secure Access Postman Collection
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date