SlideShare a Scribd company logo
Wireless Clients Describing the Cisco Secure Services Client
The Cisco SSC Overview The Cisco Secure Services Client is an 802.1X authentication supplicant Both wired and wireless Manages user and device identity  Cisco SSC suite comprises: Cisco Secure Services Client  Cisco Secure Services Client administration utility Cisco Secure Services Client log packager
The Cisco SSC Licenses Non-expiring wired and wireless license Non-expiring wired-only license 90-day trial license License Non-expiring license for full feature set must be purchased Non-expiring license available for wired-only version of the client with a limited feature set. Default license in the download; purchase not required 90-day trial license available for full wired and wireless feature set. After 90-days, valid license key must be purchased. 90-day trial license key posted in download section. Must be entered through the activation screen of the client. Description
Cisco Secure Services Client Installation The Cisco SSC client is  easy to install.  Rebooting the machine after the installation is recommended.
The Cisco SSC — Configuration No connection Connected
The Cisco SSC — Creating New Groups Connections are grouped In the SSC, connections are logically grouped. You can easily create new groups, or move connections between groups. You can also add basic wireless connections (PSK-based), but not secured or wired connections.
Connections are grouped
 
The Cisco SSC — Creating New SSIDs Inside groups, create connections The SSC allows the user to create simple connections
Inside groups, create connections
The SSC allows the user to create simple connections
Cisco Secure Services Client Administration Utility
Cisco Secure Services Client Administration Utility (Cont.) Define which authentication policies the user may need (for all the networks to which he/she might associate) Defines license deployment, connection sequence, and media selection
Defines license deployment, connection sequence, and media selection
Define which authentication policies the user may need (for all the networks to which he/she might associate)
Cisco Secure Services Client Administration Utility (Cont.) Define groups and networks In the SSCAU, you would also manage groups, and network connections inside the groups
Define groups and networks
Define groups and networks
Cisco Secure Services Client Administration Utility (Cont.) Enterprise type of security options are present SSC administration utility creates wired and  secured wireless profiles beyond SSC end user capabilities.
 
Enterprise types of security options are present
Cisco Secure Services Client Administration Utility (Cont.) Basic example of PEAP authentication configuration parameters
 
 
Cisco Secure Services Client Administration Utility (Cont.) Save the profile to a XML file, ready to deploy Similar to ACAU, you save the profiles in a file. It will be of XML type, and it is the administrator’s responsibility to deploy the file to the right location on the clients’ machines.
 
Save the profile to a XML file, ready to deploy
Cisco Secure Services Client Administration Utility (Cont.) This SSC instance shows both locally-defined and imported profiles But the user can not change the secure profiles
This SSC instance shows both locally-define and imported profiles But the user can not change the secure profiles
Summary Cisco SSC allows secure management of wired and wireless connections, with a Cisco card (or a card from another vendor). It exists in limited to 90-day full licenses, wired-only, or wired and wireless unlimited licenses. Its installation is straightforward and requires reboot.  The SSC allows users to create groups of connections and pre-shared key-based wireless network profiles. The SSC administration utility allows creation of more complex rules and profiles.
 

More Related Content

PPS
Iuwne10 S06 L04
DOCX
Sesame in a nutshell
PPTX
Gradution Project
PDF
VMware NSX @ VMUG.IT 20150529
DOCX
For linked in
PPS
Iuwne10 S05 L06
PPS
Iuwne10 S02 L07
Iuwne10 S06 L04
Sesame in a nutshell
Gradution Project
VMware NSX @ VMUG.IT 20150529
For linked in
Iuwne10 S05 L06
Iuwne10 S02 L07

Viewers also liked (20)

PPS
Iuwne10 S01 L04
PPT
Current Events Cisco III - Parr
PPS
Iuwne10 S05 L07
PPS
Iuwne10 S04 L02
PPS
Iuwne10 S02 L06
PPS
Iuwne10 Cag
PPS
Iuwne10 S05 L03
PPS
Iuwne10 S05 L01
PPS
Iuwne10 S05 L05
PPS
Iuwne10 S06 L02
PPS
Iuwne10 S02 L05
PPS
Iuwne10 S06 L03
PPS
Iuwne10 Lg
PDF
Unified Access Update - 11AC and Switching Platform
PDF
Wireless LAN Design and Deployment of Rich Media Networks
PDF
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
PPTX
Beyond BYOD
PPS
Iuwne10 S06 L01
PPTX
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
PDF
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Iuwne10 S01 L04
Current Events Cisco III - Parr
Iuwne10 S05 L07
Iuwne10 S04 L02
Iuwne10 S02 L06
Iuwne10 Cag
Iuwne10 S05 L03
Iuwne10 S05 L01
Iuwne10 S05 L05
Iuwne10 S06 L02
Iuwne10 S02 L05
Iuwne10 S06 L03
Iuwne10 Lg
Unified Access Update - 11AC and Switching Platform
Wireless LAN Design and Deployment of Rich Media Networks
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Beyond BYOD
Iuwne10 S06 L01
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Ad

Similar to Iuwne10 S03 L03 (20)

PPTX
From Cisco ACS to ISE
PDF
Mobilize employees with the cisco mobile workspace solution
PPT
S5068 Presentation Live
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PPTX
BYOD without Compromise
PDF
Identity Services Engine Overview and Update
PDF
Cisco acs configuration guide
PDF
CSACSGuide-SAMPLE
PDF
Cisco ISE Performance, Scalability and Best Practices.pdf
PPTX
Network Security.pptx
PDF
Cont cg40 oct
PDF
Sonicwall wireless & sra
PDF
Cisco ios software configuration guide for cisco aironet access points cisco ...
PDF
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
PDF
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
PPTX
Ethernet and TCP optimizations
PDF
Deploying Secure Converged Wired, Wireless Campus
PDF
Attacking and Securing WPA Enterprise Networks
PPTX
CCNASv2_InstructorPPT_CH2.pptx
From Cisco ACS to ISE
Mobilize employees with the cisco mobile workspace solution
S5068 Presentation Live
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
BYOD without Compromise
Identity Services Engine Overview and Update
Cisco acs configuration guide
CSACSGuide-SAMPLE
Cisco ISE Performance, Scalability and Best Practices.pdf
Network Security.pptx
Cont cg40 oct
Sonicwall wireless & sra
Cisco ios software configuration guide for cisco aironet access points cisco ...
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Ethernet and TCP optimizations
Deploying Secure Converged Wired, Wireless Campus
Attacking and Securing WPA Enterprise Networks
CCNASv2_InstructorPPT_CH2.pptx
Ad

More from Ravi Ranjan (17)

PPS
Iuwne10 S05 L04
PPS
Iuwne10 S05 L02
PPS
Iuwne10 S04 L07
PPS
Iuwne10 S04 L06
PPS
Iuwne10 S04 L04
PPS
Iuwne10 S04 L05
PPS
Iuwne10 S04 L01
PPS
Iuwne10 S04 L03
PPS
Iuwne10 S03 L05
PPS
Iuwne10 S03 L04
PPS
Iuwne10 S03 L02
PPS
Iuwne10 S03 L01
PPS
Iuwne10 S02 L09
PPS
Iuwne10 S02 L08
PPS
Iuwne10 S02 L04
PPS
Iuwne10 S02 L01
PPS
Iuwne10 S02 L02
Iuwne10 S05 L04
Iuwne10 S05 L02
Iuwne10 S04 L07
Iuwne10 S04 L06
Iuwne10 S04 L04
Iuwne10 S04 L05
Iuwne10 S04 L01
Iuwne10 S04 L03
Iuwne10 S03 L05
Iuwne10 S03 L04
Iuwne10 S03 L02
Iuwne10 S03 L01
Iuwne10 S02 L09
Iuwne10 S02 L08
Iuwne10 S02 L04
Iuwne10 S02 L01
Iuwne10 S02 L02

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation_ Review paper, used for researhc scholars

Iuwne10 S03 L03

  • 1. Wireless Clients Describing the Cisco Secure Services Client
  • 2. The Cisco SSC Overview The Cisco Secure Services Client is an 802.1X authentication supplicant Both wired and wireless Manages user and device identity Cisco SSC suite comprises: Cisco Secure Services Client Cisco Secure Services Client administration utility Cisco Secure Services Client log packager
  • 3. The Cisco SSC Licenses Non-expiring wired and wireless license Non-expiring wired-only license 90-day trial license License Non-expiring license for full feature set must be purchased Non-expiring license available for wired-only version of the client with a limited feature set. Default license in the download; purchase not required 90-day trial license available for full wired and wireless feature set. After 90-days, valid license key must be purchased. 90-day trial license key posted in download section. Must be entered through the activation screen of the client. Description
  • 4. Cisco Secure Services Client Installation The Cisco SSC client is easy to install. Rebooting the machine after the installation is recommended.
  • 5. The Cisco SSC — Configuration No connection Connected
  • 6. The Cisco SSC — Creating New Groups Connections are grouped In the SSC, connections are logically grouped. You can easily create new groups, or move connections between groups. You can also add basic wireless connections (PSK-based), but not secured or wired connections.
  • 8.  
  • 9. The Cisco SSC — Creating New SSIDs Inside groups, create connections The SSC allows the user to create simple connections
  • 10. Inside groups, create connections
  • 11. The SSC allows the user to create simple connections
  • 12. Cisco Secure Services Client Administration Utility
  • 13. Cisco Secure Services Client Administration Utility (Cont.) Define which authentication policies the user may need (for all the networks to which he/she might associate) Defines license deployment, connection sequence, and media selection
  • 14. Defines license deployment, connection sequence, and media selection
  • 15. Define which authentication policies the user may need (for all the networks to which he/she might associate)
  • 16. Cisco Secure Services Client Administration Utility (Cont.) Define groups and networks In the SSCAU, you would also manage groups, and network connections inside the groups
  • 17. Define groups and networks
  • 18. Define groups and networks
  • 19. Cisco Secure Services Client Administration Utility (Cont.) Enterprise type of security options are present SSC administration utility creates wired and secured wireless profiles beyond SSC end user capabilities.
  • 20.  
  • 21. Enterprise types of security options are present
  • 22. Cisco Secure Services Client Administration Utility (Cont.) Basic example of PEAP authentication configuration parameters
  • 23.  
  • 24.  
  • 25. Cisco Secure Services Client Administration Utility (Cont.) Save the profile to a XML file, ready to deploy Similar to ACAU, you save the profiles in a file. It will be of XML type, and it is the administrator’s responsibility to deploy the file to the right location on the clients’ machines.
  • 26.  
  • 27. Save the profile to a XML file, ready to deploy
  • 28. Cisco Secure Services Client Administration Utility (Cont.) This SSC instance shows both locally-defined and imported profiles But the user can not change the secure profiles
  • 29. This SSC instance shows both locally-define and imported profiles But the user can not change the secure profiles
  • 30. Summary Cisco SSC allows secure management of wired and wireless connections, with a Cisco card (or a card from another vendor). It exists in limited to 90-day full licenses, wired-only, or wired and wireless unlimited licenses. Its installation is straightforward and requires reboot. The SSC allows users to create groups of connections and pre-shared key-based wireless network profiles. The SSC administration utility allows creation of more complex rules and profiles.
  • 31.