View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

wireshark

SEC0175 - ASA FirePower IPS Custom Rule

The video shows you how to create a custom intrusion rule on Cisco ASA FirePower. We will generate a special HTTP request to simulate malicious traffic and build an intrusion rule to match the content of the request and drop it. You will learn available parameters that you can use on FireSight web interface Rule Editor to define attack signature.

Rating: 
4.666665
Average: 4.7 (3 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 2)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 1)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0169 - ASA FirePower Custom Application Detector (Part 2)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0169 - ASA FirePower Custom Application Detector (Part 1)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
4
Average: 4 (3 votes)
Difficulty Level: 
0

SEC0148 - ASA CX Passive Authentication with ISE (Part 2)

The video provide a method to enhance reliability of Cisco ASA CX Passive Authentication by integrating Cisco ISE with CDA. You will see how the caveats inherent to CDA can be solved by using realtime user and IP information provided by 802.1x identity-based authentication network. We will analyze RADIUS packets being communicated between Cisco ISE and CDA to try to understand the underlying mechanism. Testing will be performed on both domain and non-domain devices, that have been onboarded through ISE, and this includes both wired and wireless.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0148 - ASA CX Passive Authentication with ISE (Part 1)

The video provide a method to enhance reliability of Cisco ASA CX Passive Authentication by integrating Cisco ISE with CDA. You will see how the caveats inherent to CDA can be solved by using realtime user and IP information provided by 802.1x identity-based authentication network. We will analyze RADIUS packets being communicated between Cisco ISE and CDA to try to understand the underlying mechanism. Testing will be performed on both domain and non-domain devices, that have been onboarded through ISE, and this includes both wired and wireless.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SP0028 - MPLS AToM TE and Pseudowire Redundancy

The video demonstrates another method of routing L2VPN traffic using Cisco MPLS Traffic Engineering (TE) tunnel. Instead of relying on targeted LDP, we will be leveraging MPLS TE for label exchange and traffic path control. We will also look at a way to provide redundancy using a backup pseudowire. We will perform Wireshark packet capture and review control and data packets. 

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SP0027 - MPLS AToM Interworking (Part 2)

The video walks you through configuration of Cisco Any Transport over MPLS (AToM) interworking. In our first two scenarios, we will be configuring EoMPLS to provide Layer2 connectivity between sites with disparate circuit type, specifically non-tag and 802.1q circuit, using Ethernet and VLAN mode. Our last scenario involves interworking of non-Ethernet circuit to an Ethernet circuit, which will call for an IP mode. Wireshark packet capture will be performed and we will notes the differences in packet structure with interworking.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SP0027 - MPLS AToM Interworking (Part 1)

The video walks you through configuration of Cisco Any Transport over MPLS (AToM) interworking. In our first two scenarios, we will be configuring EoMPLS to provide Layer2 connectivity between sites with disparate circuit type, specifically non-tag and 802.1q circuit, using Ethernet and VLAN mode. Our last scenario involves interworking of non-Ethernet circuit to an Ethernet circuit, which will call for an IP mode. Wireshark packet capture will be performed and we will notes the differences in packet structure with interworking.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - wireshark

Lab Minutes Classifieds