View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

identity

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 2)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 1)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 4)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 1)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 1)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0222 - ISE 2.0 pxGrid with ASA Firepower (Part 3)

The video shows a functional integration of ASA Firepower with ISE 2.0 pxGrid service. We will have the Firepower join pxGrid using certificate-based authentication and subscribe for user contextual information. We will create and test Firepower access policies to restrict user traffic based on their AD group membership and assigned Security Group Tag. 
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - identity