View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

ngfw

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
0
No votes yet
Difficulty Level: 
5

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
0
No votes yet
Difficulty Level: 
5

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 1)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 3)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 2)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0226 - ASA Firepower 6.0 URL and DNS Security Intelligence (Part 1)

The video introduces you to the concept of URL and DNS Security Intelligence on ASA Firepower 6.0. Unlike their predecessor, Network-based SI that monitor traffic at the IP address level, URL and DNS SI allow or deny traffic based on URL and DNS requests. We will go through some lab exercise of configuring both static and dynamic feed. We will also demonstrate an ability to have Firepower intercept and redirect DNS request to a sinkhole target.
Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - ngfw

Lab Minutes Classifieds

Poll

Vote for the Next Video Series