View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

firepower

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 1)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0231 - FTD 6.1 Firepower Device Manager - Introduction (Part 2)

The video introduces you to Cisco Firepower Device Manager (FDM) on FTD 6.1. We will cover different configuration sections on the web interface. Basic device config will be completed along the way while we point out what are available for you to configure. You should feel comfortable navigating around FDM by the end of the video. 
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0231 - FTD 6.1 Firepower Device Manager - Introduction (Part 1)

The video introduces you to Cisco Firepower Device Manager (FDM) on FTD 6.1. We will cover different configuration sections on the web interface. Basic device config will be completed along the way while we point out what are available for you to configure. You should feel comfortable navigating around FDM by the end of the video. 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0230 - FTD 6.1 ASA Device Installation (Part 2)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0230 - FTD 6.1 ASA Device Installation (Part 1)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - firepower

Poll

Vote for the Next Video Series