View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

NAT

SEC0242 - FTD 6.1 Network Address Translation (NAT) (Part 3)

The video runs through various NAT scenarios on Cisco FTD 6.1. We will be going over structure of NAT policy and covering the majority of common NAT use-cases including static NAT, dynamic NAT, PAT, and Identity NAT using both Twice NAT and Object NAT. We will also configure NAT64 to allow internet access to our IPv6 environment we configured in the previous video.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0242 - FTD 6.1 Network Address Translation (NAT) (Part 2)

The video runs through various NAT scenarios on Cisco FTD 6.1. We will be going over structure of NAT policy and covering the majority of common NAT use-cases including static NAT, dynamic NAT, PAT, and Identity NAT using both Twice NAT and Object NAT. We will also configure NAT64 to allow internet access to our IPv6 environment we configured in the previous video.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0242 - FTD 6.1 Network Address Translation (NAT) (Part 1)

The video runs through various NAT scenarios on Cisco FTD 6.1. We will be going over structure of NAT policy and covering the majority of common NAT use-cases including static NAT, dynamic NAT, PAT, and Identity NAT using both Twice NAT and Object NAT. We will also configure NAT64 to allow internet access to our IPv6 environment we configured in the previous video.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 4)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 3)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 2)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0232 - FTD 6.1 Firepower Device Manager - Configuration (Part 1)

The video shows you how to configure Cisco FTD 6.1 using Firepower Device Manager for some of the most commonly use functions to allow inbound and outbound traffic. We will configure Network Address Translation  (NAT), Access Control, Intrusion Policy, File Policy, Application Control, URL Filtering, Geolocation, and Identity Rule. Each function will be tested and validated.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

WL0037 - WLC Office Extend AP (OEAP600) (Part 3)

The video introduces you to the second type of Office Extend AP on Cisco Wireless LAN Controller with OEAP600. We will be configuring OEAP600 from its factory default state starting with basic AP registration security on WLC. We will also cover features such as Remote LAN and 802.1X port-based authentication that are not available on FlexConnect OEAP as well as common functionalities of Split-Tunnel (specified, and local), and personal SSID. 
Rating: 
0
No votes yet
Difficulty Level: 
4

Pages

Subscribe to RSS - NAT