View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

topology

SEC0370 - Firepower 6.7 Network Discovery (Part 3)

The video introduces you to a concept of Network Discovery on Cisco Firepower 6.7 which is an essential component that adds intelligence to the solution. We will primarily focus on host and application discovery and will explain differences between passive and active discovery. We will also look at how the discovered information is stored in a host profile and its significance.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0370 - Firepower 6.7 Network Discovery (Part 2)

The video introduces you to a concept of Network Discovery on Cisco Firepower 6.7 which is an essential component that adds intelligence to the solution. We will primarily focus on host and application discovery and will explain differences between passive and active discovery. We will also look at how the discovered information is stored in a host profile and its significance.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0370 - Firepower 6.7 Network Discovery (Part 1)

The video introduces you to a concept of Network Discovery on Cisco Firepower 6.7 which is an essential component that adds intelligence to the solution. We will primarily focus on host and application discovery and will explain differences between passive and active discovery. We will also look at how the discovered information is stored in a host profile and its significance.

Rating: 
0
No votes yet
Difficulty Level: 
2

RS0186 - DNAC 2.1 Multi-Site Setup

The video walks you through our lab setup for Cisco SDA Multi-Site on Cisco DNAC 2.1 that will lay a foundation for our subsequent labs. We will explain a lab topology and perform device discovery to have all devices added to DNAC inventory.

Rating: 
0
No votes yet
Difficulty Level: 
1

RS0160 - SD-WAN Service Chaining (Part 3)

The video shows you how to insert a service device in Cisco SD-WAN traffic flow using Service Chaining. A firewall will be used to demonstrate an ability to steer interested traffic to a service device at a central location. The first scenario covers intra-VPN traffic, and the second scenario covers inter-VPN traffic.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0160 - SD-WAN Service Chaining (Part 2)

The video shows you how to insert a service device in Cisco SD-WAN traffic flow using Service Chaining. A firewall will be used to demonstrate an ability to steer interested traffic to a service device at a central location. The first scenario covers intra-VPN traffic, and the second scenario covers inter-VPN traffic.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0160 - SD-WAN Service Chaining (Part 1)

The video shows you how to insert a service device in Cisco SD-WAN traffic flow using Service Chaining. A firewall will be used to demonstrate an ability to steer interested traffic to a service device at a central location. The first scenario covers intra-VPN traffic, and the second scenario covers inter-VPN traffic.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0153 - SD-WAN Topology (Part 3)

The video shows various methods to manipulate Cisco SD-WAN overlay topology. vManage comes with some default topology templates that we can look at. We will also create our own topology using Custom rules. Many available attributes will be explored in the Centralized Control Policy.
Rating: 
3
Average: 3 (2 votes)
Difficulty Level: 
0

RS0153 - SD-WAN Topology (Part 2)

The video shows various methods to manipulate Cisco SD-WAN overlay topology. vManage comes with some default topology templates that we can look at. We will also create our own topology using Custom rules. Many available attributes will be explored in the Centralized Control Policy.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0153 - SD-WAN Topology (Part 1)

The video shows various methods to manipulate Cisco SD-WAN overlay topology. vManage comes with some default topology templates that we can look at. We will also create our own topology using Custom rules. Many available attributes will be explored in the Centralized Control Policy.
Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - topology

Poll

Vote for the Next Video Series