View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

application

RS0083 - vNAM Alarm and Threshold (Part 2)

The video shows you how to configure Cisco vNAM to respond to traffic performance threshold violation. As part of demonstration, we will enable alarm thresholds and actions on our test FTP and voice traffic. We will trigger the alarms by introducing server and network impairment and observe the system response by sending email notification and performing packet capture.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0083 - vNAM Alarm and Threshold (Part 1)

The video shows you how to configure Cisco vNAM to respond to traffic performance threshold violation. As part of demonstration, we will enable alarm thresholds and actions on our test FTP and voice traffic. We will trigger the alarms by introducing server and network impairment and observe the system response by sending email notification and performing packet capture.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0081 - vNAM Response Time Monitoring (Part 3)

The video shows you how to use Cisco vNAM to monitor application response time. We will explore available graphs and tools on vNAM that allow you drill into application performance statistics. We will testing application performance monitoring by creating high server CPU utilization and network latency and see how the problem can be identified by vNAM.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0081 - vNAM Response Time Monitoring (Part 2)

The video shows you how to use Cisco vNAM to monitor application response time. We will explore available graphs and tools on vNAM that allow you drill into application performance statistics. We will testing application performance monitoring by creating high server CPU utilization and network latency and see how the problem can be identified by vNAM.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0081 - vNAM Response Time Monitoring (Part 1)

The video shows you how to use Cisco vNAM to monitor application response time. We will explore available graphs and tools on vNAM that allow you drill into application performance statistics. We will testing application performance monitoring by creating high server CPU utilization and network latency and see how the problem can be identified by vNAM.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0169 - ASA FirePower Custom Application Detector (Part 2)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0169 - ASA FirePower Custom Application Detector (Part 1)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
4
Average: 4 (3 votes)
Difficulty Level: 
0

SEC0168 - ASA FirePower Application Filtering (Part 2)

The video demonstrates Cisco ASA FirePower capability to perform traffic filtering based on application and application categories. Some of the applications used in our scenarios are RDP, Bit Torrent, Facebook, and Social Networking. We will also touch upon the significance of HTTPS traffic and how it affects FirePower capability to analyze traffic.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0168 - ASA FirePower Application Filtering (Part 1)

The video demonstrates Cisco ASA FirePower capability to perform traffic filtering based on application and application categories. Some of the applications used in our scenarios are RDP, Bit Torrent, Facebook, and Social Networking. We will also touch upon the significance of HTTPS traffic and how it affects FirePower capability to analyze traffic.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0150 - ASA CX Application Filtering

The video demonstrates Cisco ASA CX ability to perform application matching beyond just protocols and ports by using Application Visibility and Control (AVC) feature. You will see how to deploy access policy at ease without worrying about being circumvented by application running on non-default port, or even those that sprawl multiple dynamic ports. This intelligence take you as far as matching based on a group of application by type, and specific application behavior. All of these will be demonstrated through three applications; RDP, Bittorrent, and Facebook, in this lab.

Rating: 
0
No votes yet
Difficulty Level: 
3
Subscribe to RSS - application

Lab Minutes Classifieds