View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0
Lab Document: 
<Please login to see the content>
The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
 
Part 2 of this video covers SSL policy testing
 
Topic:
  • Self-Signed Certificate Matching
  • Expired Certificate Matching 
  • Common Name Matching
  • Cipher Suite Matching
  • Certificate-Based Exemption

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

Poll

Vote for the Next Video Series