View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

tunnel

SEC0457 - Umbrella IPSec Tunnel - FTD (Part 2)

The video goes through configuration of setting up an IPSec tunnel on a Cisco Firepower Secure Firewall to Cisco Umbrella. We will route traffic to Umbrella using Policy-Based Routing (PBR). In latter part of the lab, we will bring up a second IPSec tunnel for redundancy in an active/standby setup and test tunnel failover.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0457 - Umbrella IPSec Tunnel - FTD (Part 1)

The video goes through configuration of setting up an IPSec tunnel on a Cisco Firepower Secure Firewall to Cisco Umbrella. We will route traffic to Umbrella using Policy-Based Routing (PBR). In latter part of the lab, we will bring up a second IPSec tunnel for redundancy in an active/standby setup and test tunnel failover.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0456 - Umbrella IPSec Tunnel - Router (Part 3)

The video goes through configuration of setting up an IPSec tunnel on a Cisco IOS XE device to Cisco Umbrella. We will look at two ways of routing traffic to Umbrella using static and Policy-Based Routing (PBR). In latter part of the lab, we will bring up a second IPSec tunnel for redundancy in an active/standby setup.
 

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0456 - Umbrella IPSec Tunnel - Router (Part 2)

The video goes through configuration of setting up an IPSec tunnel on a Cisco IOS XE device to Cisco Umbrella. We will look at two ways of routing traffic to Umbrella using static and Policy-Based Routing (PBR). In latter part of the lab, we will bring up a second IPSec tunnel for redundancy in an active/standby setup.
 

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0456 - Umbrella IPSec Tunnel - Router (Part 1)

The video goes through configuration of setting up an IPSec tunnel on a Cisco IOS XE device to Cisco Umbrella. We will look at two ways of routing traffic to Umbrella using static and Policy-Based Routing (PBR). In latter part of the lab, we will bring up a second IPSec tunnel for redundancy in an active/standby setup.
 

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0367 - Firepower 6.7 Prefilter Policy (Part 3)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0367 - Firepower 6.7 Prefilter Policy (Part 2)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0367 - Firepower 6.7 Prefilter Policy (Part 1)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0243 - FTD 6.1 Prefilter Policy (Part 3)

The video introduces you to Pre-filter policy on Cisco FTD 6.1. We will demonstrate how prefilter policy can be used in addition to a regular access control rule to allow (Fastpath) or drop traffic and prevent them from further processing. The second half of the videos takes you through another feature called Tunnel Rule that allows FTD to analyze unencrypted tunnel traffic.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0243 - FTD 6.1 Prefilter Policy (Part 2)

The video introduces you to Pre-filter policy on Cisco FTD 6.1. We will demonstrate how prefilter policy can be used in addition to a regular access control rule to allow (Fastpath) or drop traffic and prevent them from further processing. The second half of the videos takes you through another feature called Tunnel Rule that allows FTD to analyze unencrypted tunnel traffic.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - tunnel