View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

access control

SEC0352 - Firepower 6.7 FDM NAT and Access Control (Part 3)

The video shows you how to configure Network Address Translation (NAT), and Access Control on Cisco Firepower 6.7 using Firepower Device Manager. Some of the most commonly used functions will be covered including Static NAT, Dynamic PAT, ACL to allow inbound and outbound traffic, application filtering, intrusion policy, URL filtering, Geolocation, and Security Intelligence.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0352 - Firepower 6.7 FDM NAT and Access Control (Part 2)

The video shows you how to configure Network Address Translation (NAT), and Access Control on Cisco Firepower 6.7 using Firepower Device Manager. Some of the most commonly used functions will be covered including Static NAT, Dynamic PAT, ACL to allow inbound and outbound traffic, application filtering, intrusion policy, URL filtering, Geolocation, and Security Intelligence.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0352 - Firepower 6.7 FDM NAT and Access Control (Part 1)

The video shows you how to configure Network Address Translation (NAT), and Access Control on Cisco Firepower 6.7 using Firepower Device Manager. Some of the most commonly used functions will be covered including Static NAT, Dynamic PAT, ACL to allow inbound and outbound traffic, application filtering, intrusion policy, URL filtering, Geolocation, and Security Intelligence.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 4)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 1)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0166 - ASA FirePower Object and Access Control (Part 2)

The video takes you through the heart of Cisco ASA FirePower and FireSight system configuration which is Access Control Policy. We will go through the basic components of Access Control rules including Security Zone, Network Object, Port Object, and Geolocation as well as leveraging user identity obtained from the previous video to build rules based on our requirement scenarios. 

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0166 - ASA FirePower Object and Access Control (Part 1)

The video takes you through the heart of Cisco ASA FirePower and FireSight system configuration which is Access Control Policy. We will go through the basic components of Access Control rules including Security Zone, Network Object, Port Object, and Geolocation as well as leveraging user identity obtained from the previous video to build rules based on our requirement scenarios. 

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0
Subscribe to RSS - access control