View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

identity

SEC0379 - Firepower 7.0 User Identity (Part 3)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0379 - Firepower 7.0 User Identity (Part 2)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0379 - Firepower 7.0 User Identity (Part 1)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 2)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 1)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 4)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 1)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - identity

Poll

Vote for the Next Video Series