View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

wireshark

WL0005 - WLC Access Point Registration (Part 2)

The video walks you through different methods that Cisco Access Point uses to discover Wireless LAN Controller and how an AP makes a decision on which controllers to join. Each method will be demonstrated with their order of priority explained. We will mention the purpose of Master Controller and stress on importance of controller priming. Wireshark analysis will be performed throughout the lab for us to examine controller discovery and AP registration processes. 

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

WL0005 - WLC Access Point Registration (Part 1)

The video walks you through different methods that Cisco Access Point uses to discover Wireless LAN Controller and how an AP makes a decision on which controllers to join. Each method will be demonstrated with their order of priority explained. We will mention the purpose of Master Controller and stress on importance of controller priming. Wireshark analysis will be performed throughout the lab for us to examine controller discovery and AP registration processes. 

Rating: 
4
Average: 4 (3 votes)
Difficulty Level: 
0

SEC0175 - ASA FirePower IPS Custom Rule

The video shows you how to create a custom intrusion rule on Cisco ASA FirePower. We will generate a special HTTP request to simulate malicious traffic and build an intrusion rule to match the content of the request and drop it. You will learn available parameters that you can use on FireSight web interface Rule Editor to define attack signature.

Rating: 
4.666665
Average: 4.7 (3 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 2)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 1)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0169 - ASA FirePower Custom Application Detector (Part 2)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0169 - ASA FirePower Custom Application Detector (Part 1)

The video shows you how to create an custom application detector on Cisco ASA FirePower. We will be simulating a custom business application using a TCP/IP Server/Client tool, perform a WireShark packet capture, and attempt to construct an application detector to match it. If you have an application that is not supported by the FireSight System and would like to build an access-control around it, this is a video to watch.

Rating: 
4.25
Average: 4.3 (4 votes)
Difficulty Level: 
0

SEC0148 - ASA CX Passive Authentication with ISE (Part 2)

The video provide a method to enhance reliability of Cisco ASA CX Passive Authentication by integrating Cisco ISE with CDA. You will see how the caveats inherent to CDA can be solved by using realtime user and IP information provided by 802.1x identity-based authentication network. We will analyze RADIUS packets being communicated between Cisco ISE and CDA to try to understand the underlying mechanism. Testing will be performed on both domain and non-domain devices, that have been onboarded through ISE, and this includes both wired and wireless.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0148 - ASA CX Passive Authentication with ISE (Part 1)

The video provide a method to enhance reliability of Cisco ASA CX Passive Authentication by integrating Cisco ISE with CDA. You will see how the caveats inherent to CDA can be solved by using realtime user and IP information provided by 802.1x identity-based authentication network. We will analyze RADIUS packets being communicated between Cisco ISE and CDA to try to understand the underlying mechanism. Testing will be performed on both domain and non-domain devices, that have been onboarded through ISE, and this includes both wired and wireless.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SP0028 - MPLS AToM TE and Pseudowire Redundancy

The video demonstrates another method of routing L2VPN traffic using Cisco MPLS Traffic Engineering (TE) tunnel. Instead of relying on targeted LDP, we will be leveraging MPLS TE for label exchange and traffic path control. We will also look at a way to provide redundancy using a backup pseudowire. We will perform Wireshark packet capture and review control and data packets. 

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - wireshark