View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

avc

RS0154 - SD-WAN ACL FW and Traffic Engineering (Data) (Part 4)

The video shows you a use of Centralized Data Policy in Cisco SD-WAN to implement traffic control and engineering. We will apply access-control based on IP, protocol, port, and application to limit communication between our SD-WAN sites. To demonstrate traffic engineering, we will use remote TLOC and local color to reroute traffic. We finish off with failover testing to see how traffic engineering behaves when there is a failure in the network.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0154 - SD-WAN ACL FW and Traffic Engineering (Data) (Part 3)

The video shows you a use of Centralized Data Policy in Cisco SD-WAN to implement traffic control and engineering. We will apply access-control based on IP, protocol, port, and application to limit communication between our SD-WAN sites. To demonstrate traffic engineering, we will use remote TLOC and local color to reroute traffic. We finish off with failover testing to see how traffic engineering behaves when there is a failure in the network.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0154 - SD-WAN ACL FW and Traffic Engineering (Data) (Part 2)

The video shows you a use of Centralized Data Policy in Cisco SD-WAN to implement traffic control and engineering. We will apply access-control based on IP, protocol, port, and application to limit communication between our SD-WAN sites. To demonstrate traffic engineering, we will use remote TLOC and local color to reroute traffic. We finish off with failover testing to see how traffic engineering behaves when there is a failure in the network.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0154 - SD-WAN ACL FW and Traffic Engineering (Data) (Part 1)

The video shows you a use of Centralized Data Policy in Cisco SD-WAN to implement traffic control and engineering. We will apply access-control based on IP, protocol, port, and application to limit communication between our SD-WAN sites. To demonstrate traffic engineering, we will use remote TLOC and local color to reroute traffic. We finish off with failover testing to see how traffic engineering behaves when there is a failure in the network.
Rating: 
0
No votes yet
Difficulty Level: 
4

RS0122 - SDA Application Policy (EasyQoS) (Part 3)

The video shows you how to use Application Policy feature on Cisco DNAC to consistently push QoS configuration to network devices. We will go through defining application and policy required to create a queueing profile and apply to a switch and router on both LAN and WAN interfaces.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

RS0122 - SDA Application Policy (EasyQoS) (Part 2)

The video shows you how to use Application Policy feature on Cisco DNAC to consistently push QoS configuration to network devices. We will go through defining application and policy required to create a queueing profile and apply to a switch and router on both LAN and WAN interfaces.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

RS0122 - SDA Application Policy (EasyQoS) (Part 1)

The video shows you how to use Application Policy feature on Cisco DNAC to consistently push QoS configuration to network devices. We will go through defining application and policy required to create a queueing profile and apply to a switch and router on both LAN and WAN interfaces.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 4)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - avc