View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

asa

SEC0231 - FTD 6.1 Firepower Device Manager - Introduction (Part 2)

The video introduces you to Cisco Firepower Device Manager (FDM) on FTD 6.1. We will cover different configuration sections on the web interface. Basic device config will be completed along the way while we point out what are available for you to configure. You should feel comfortable navigating around FDM by the end of the video. 
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0231 - FTD 6.1 Firepower Device Manager - Introduction (Part 1)

The video introduces you to Cisco Firepower Device Manager (FDM) on FTD 6.1. We will cover different configuration sections on the web interface. Basic device config will be completed along the way while we point out what are available for you to configure. You should feel comfortable navigating around FDM by the end of the video. 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0230 - FTD 6.1 ASA Device Installation (Part 2)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0230 - FTD 6.1 ASA Device Installation (Part 1)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - asa