View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

decryption

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
0
No votes yet
Difficulty Level: 
5

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
0
No votes yet
Difficulty Level: 
5

SEC0152 - ASA CX Malware Protection and Safe Search (Part 2)

The video goes over two security features of Cisco ASA CX; Malware Protection, and Safe Search. You will be introduced to the concept of web reputation score and how it is used to help CX identify websites that potentially contain malware. We will demonstrate the use of reputation profile on both access and decryption policies. The second half of this lab covers Safe Search and how and why you might want to consider enabling this feature in your user environment along with its caveats.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0152 - ASA CX Malware Protection and Safe Search (Part 1)

The video goes over two security features of Cisco ASA CX; Malware Protection, and Safe Search. You will be introduced to the concept of web reputation score and how it is used to help CX identify websites that potentially contain malware. We will demonstrate the use of reputation profile on both access and decryption policies. The second half of this lab covers Safe Search and how and why you might want to consider enabling this feature in your user environment along with its caveats.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0151 - ASA CX URL and Web Category Filtering (Part 2)

The video shows you how to configure Cisco ASA CX to perform web filtering. We will be creating a whitelist and blacklist of website URL that we want to enforce on our users. We will then take one step further and leverage website category that is built into the CX. In addition to a deny action, we will explore a warn option and try to explore its behavior. To show you the flexibility of web category, we will apply it to decryption policy to get better control of the type of traffic that will or will not get decrypted. The video finishes by showing you the customization of user notification pages.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0151 - ASA CX URL and Web Category Filtering (Part 1)

The video shows you how to configure Cisco ASA CX to perform web filtering. We will be creating a whitelist and blacklist of website URL that we want to enforce on our users. We will then take one step further and leverage website category that is built into the CX. In addition to a deny action, we will explore a warn option and try to explore its behavior. To show you the flexibility of web category, we will apply it to decryption policy to get better control of the type of traffic that will or will not get decrypted. The video finishes by showing you the customization of user notification pages.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0149 - ASA CX Traffic Decryption

The video shows you how to configure Cisco ASA CX to gain visibility to encrypted traffic by enabling decryption capability. We will first used a self-signed certificate and present a problem of certificate warning. We will then try to resolve this by having the certificate signed by a client trusted CA. Most importantly you will get to see what user experience is like when the CX inserts itself in between HTTPS transactions.  

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
5
Subscribe to RSS - decryption

Lab Minutes Classifieds