View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

dns

DC0005 - ACI Fabric Policies (Part 3)

The video shows configuration of Fabric Policies section on Cisco ACI APIC GUI. Fabric policies control the operation of ACI underlying fabric including settings on hardware, protocols and network services. We will spend time on switch-level configuration, pod-level configuration, and any other global configuration, and how all of which are applied to fabric switches.
Rating: 
0
No votes yet
Difficulty Level: 
2

DC0005 - ACI Fabric Policies (Part 2)

The video shows configuration of Fabric Policies section on Cisco ACI APIC GUI. Fabric policies control the operation of ACI underlying fabric including settings on hardware, protocols and network services. We will spend time on switch-level configuration, pod-level configuration, and any other global configuration, and how all of which are applied to fabric switches.
Rating: 
0
No votes yet
Difficulty Level: 
2

DC0005 - ACI Fabric Policies (Part 1)

The video shows configuration of Fabric Policies section on Cisco ACI APIC GUI. Fabric policies control the operation of ACI underlying fabric including settings on hardware, protocols and network services. We will spend time on switch-level configuration, pod-level configuration, and any other global configuration, and how all of which are applied to fabric switches.
Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0280 - ISE 2.2 Posture Stealth Mode and 3rd Party NAD (Part 2)

The video shows the new posture assessment mode introduced in Cisco ISE 2.2. With Stealth mode, user will be no longer be prompted by the ISE Posture agent, which makes user experience more seamless. We will convert our posture configuration in the previous video into Stealth Mode and perform testing. The second half of video shows how to use internal DHCP and DNS server to assist URL redirect on 3rd party NAD using posture as an example.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0280 - ISE 2.2 Posture Stealth Mode and 3rd Party NAD (Part 1)

The video shows the new posture assessment mode introduced in Cisco ISE 2.2. With Stealth mode, user will be no longer be prompted by the ISE Posture agent, which makes user experience more seamless. We will convert our posture configuration in the previous video into Stealth Mode and perform testing. The second half of video shows how to use internal DHCP and DNS server to assist URL redirect on 3rd party NAD using posture as an example.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 3)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 2)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 1)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

WL0006 - WLC Access Point Authentication (Part 2)

The video walks you through different methods that Cisco Access Point uses to discover Wireless LAN Controller and how an AP makes a decision on which controllers to join. Each method will be demonstrated with their order of priority explained. We will mention the purpose of Master Controller and stress on importance of controller priming. Wireshark analysis will be performed throughout the lab for us to examine controller discovery and AP registration processes. 

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

WL0005 - WLC Access Point Registration (Part 2)

The video walks you through different methods that Cisco Access Point uses to discover Wireless LAN Controller and how an AP makes a decision on which controllers to join. Each method will be demonstrated with their order of priority explained. We will mention the purpose of Master Controller and stress on importance of controller priming. Wireshark analysis will be performed throughout the lab for us to examine controller discovery and AP registration processes. 

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - dns