The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.
How You'll Benefit
This training will help you:
Learn how to operate, manage, configure, and troubleshoot the Cisco C2C solution
Gain an understanding of how the Cisco ISE security components relate to the C2C architecture
Earn 32 CE credits towards recertification
Key Components of C2C:
Device Discovery and Identification: Automatically identifying and categorizing all devices trying to connect to the network.
Security Posture Assessment: Evaluating the security status of these devices to ensure they meet predetermined security policies.
Access Control: Allowing or denying device access based on compliance with security standards.
Continuous Monitoring: Regularly checking the security posture of connected devices to respond to new vulnerabilities or non-compliance issues.
Cisco's Role in C2C with 802.1X, ISE, and Splunk: 802.1X:
Role: Acts as a network access control protocol.
Function: Provides authentication to devices trying to connect to a LAN or WLAN. It ensures that only authenticated users and devices can access network resources, aligning with C2C’s goal to verify and secure each connection.
Cisco Identity Services Engine (ISE):
Role: Centralized policy management platform.
Function: Works with 802.1X for device authentication and integrates policies for access control. Cisco ISE helps enforce compliance by applying dynamic access control policies based on the user, device, and location, supporting C2C’s need for strict access control and continuous monitoring.
Splunk:
Role: Software platform for searching, monitoring, and analyzing machine-generated data.
Function: Integrates with Cisco ISE to collect and analyze data from network devices. Splunk helps in identifying trends, generating security alerts, and providing actionable insights into network health and security. It’s a vital tool for the continuous monitoring aspect of C2C, enabling the DoD to quickly respond to security incidents and maintain compliance across its networks.
How They Work Together:
Authentication: When a device tries to connect to the network, 802.1X helps authenticate it, ensuring it’s a recognized and authorized device.
Policy Enforcement: Post-authentication, Cisco ISE checks if the device complies with security policies. If compliant, ISE permits access, otherwise, it restricts network entry or limits capabilities.
Monitoring and Compliance: Splunk continuously analyzes data from Cisco ISE and other network elements to monitor compliance and alert for any deviations or potential security threats.
In summary, Cisco’s 802.1X, ISE, and Splunk are integral to the C2C framework, ensuring that all devices on the DoDIN are authenticated, comply with security policies, and are continuously monitored for threats and vulnerabilities. This integrated approach helps the DoD maintain a robust security posture as part of its move towards a Zero Trust Architecture.
This training is a Department of Defense mandate, ensuring compliance with cybersecurity protocols and procedures. The target audience includes individuals seeking the knowledge and skills involved in deploying, operating, and verifying Cisco DoD C2C network architecture, such as: