View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

zone

RS0244 - SD-WAN 20.9 Unified Threat Defense (Part 4)

The video walks you through configuration of Unified Threat Defense (UTD) in Cisco Catalyst SD-WAN. We will setup required Security App Hosting on a branch router and configure each UTD feature: IPS, URL Filtering, SSL Decryption, and Malware Protection. There will be series of testing to show you what L7 firewall security an Edge device can provide. 

Rating: 
0
No votes yet
Difficulty Level: 
5

RS0244 - SD-WAN 20.9 Unified Threat Defense (Part 3)

The video walks you through configuration of Unified Threat Defense (UTD) in Cisco Catalyst SD-WAN. We will setup required Security App Hosting on a branch router and configure each UTD feature: IPS, URL Filtering, SSL Decryption, and Malware Protection. There will be series of testing to show you what L7 firewall security an Edge device can provide. 

Rating: 
0
No votes yet
Difficulty Level: 
5

RS0244 - SD-WAN 20.9 Unified Threat Defense (Part 2)

The video walks you through configuration of Unified Threat Defense (UTD) in Cisco Catalyst SD-WAN. We will setup required Security App Hosting on a branch router and configure each UTD feature: IPS, URL Filtering, SSL Decryption, and Malware Protection. There will be series of testing to show you what L7 firewall security an Edge device can provide. 

Rating: 
0
No votes yet
Difficulty Level: 
5

RS0244 - SD-WAN 20.9 Unified Threat Defense (Part 1)

The video walks you through configuration of Unified Threat Defense (UTD) in Cisco Catalyst SD-WAN. We will setup required Security App Hosting on a branch router and configure each UTD feature: IPS, URL Filtering, SSL Decryption, and Malware Protection. There will be series of testing to show you what L7 firewall security an Edge device can provide. 

Rating: 
0
No votes yet
Difficulty Level: 
5

RS0243 - SD-WAN 20.9 Zone-Based Firewall (Part 4)

The video takes you through Zoned-Based Firewall security in Cisco Catalyst SD-WAN. We will go through different lab scenarios that demonstrates potential use of ZBFW within the same and across Service VPN. The lab ends with an exercise to migrate Security Policy to Unified Security Policy.

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0243 - SD-WAN 20.9 Zone-Based Firewall (Part 3)

The video takes you through Zoned-Based Firewall security in Cisco Catalyst SD-WAN. We will go through different lab scenarios that demonstrates potential use of ZBFW within the same and across Service VPN. The lab ends with an exercise to migrate Security Policy to Unified Security Policy.

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0243 - SD-WAN 20.9 Zone-Based Firewall (Part 2)

The video takes you through Zoned-Based Firewall security in Cisco Catalyst SD-WAN. We will go through different lab scenarios that demonstrates potential use of ZBFW within the same and across Service VPN. The lab ends with an exercise to migrate Security Policy to Unified Security Policy.

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0243 - SD-WAN 20.9 Zone-Based Firewall (Part 1)

The video takes you through Zoned-Based Firewall security in Cisco Catalyst SD-WAN. We will go through different lab scenarios that demonstrates potential use of ZBFW within the same and across Service VPN. The lab ends with an exercise to migrate Security Policy to Unified Security Policy.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0321 - PAN 9.0 Virtual System (Part 3)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0321 - PAN 9.0 Virtual System (Part 2)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - zone