View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

gre

SEC0367 - Firepower 6.7 Prefilter Policy (Part 3)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0367 - Firepower 6.7 Prefilter Policy (Part 2)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0367 - Firepower 6.7 Prefilter Policy (Part 1)

The video introduces you to Pre-filter policy on Cisco Firepower 6.7. We will demonstrate how prefilter policy can be used to pre-process traffic to allow (Fastpath), drop, or inspect. The second half of the lab covers Tunnel Rule that is used to analyze unencrypted tunnel traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 3)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 2)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 1)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 4)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 3)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 2)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 1)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - gre

Poll

Vote for the Next Video Series