View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

security

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 3)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 2)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 1)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0228 - SD-WAN 20.9 Local Route Control (Part 3)

The video looks deep into Localized Control Policy in Cisco Catalyst SD-WAN and how it can be utilized in a SD-WAN design. To demonstrate, we will use it to perform route redistribution and filtering in BPG, OSPF, and EIGRP routing protocols at various part of our lab for underlay WAN and overlay LAN.

Rating: 
0
No votes yet
Difficulty Level: 
1

RS0228 - SD-WAN 20.9 Local Route Control (Part 2)

The video looks deep into Localized Control Policy in Cisco Catalyst SD-WAN and how it can be utilized in a SD-WAN design. To demonstrate, we will use it to perform route redistribution and filtering in BPG, OSPF, and EIGRP routing protocols at various part of our lab for underlay WAN and overlay LAN.

Rating: 
0
No votes yet
Difficulty Level: 
1

RS0227 - SD-WAN 20.9 Policy Overview

The video takes you through different policy type that are used in Cisco Catalyst SD-WAN. This includes Centralized Control and Data Policy, and Localized Control and Data Policy. We will explain packet flow and how a packet is processed by the policies. The goal is to get you to become familiarized with concept of policies before we start on configuration in upcoming labs. 

Rating: 
0
No votes yet
Difficulty Level: 
1

RS0211 - SD-WAN 20.8 Common Feature Templates (Part 2)

The video explores additional Feature Templates that can be shared between Edge devices in Cisco Catalyst SD-WAN. We will be configuring NTP, Security, Global settings, Banner, Logging, and SNMP on our lab devices

Rating: 
0
No votes yet
Difficulty Level: 
2

RS0211 - SD-WAN 20.8 Common Feature Templates (Part 1)

The video explores additional Feature Templates that can be shared between Edge devices in Cisco Catalyst SD-WAN. We will be configuring NTP, Security, Global settings, Banner, Logging, and SNMP on our lab devices

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0441 - Umbrella Getting Started (Part 2)

The video gets you started on Cisco Umbrella. We will show you how you can quickly setup Umbrella using DNS Security. In a few steps, we will have Umbrella ready to accept our DNS requests and start blocking attempts to malicious destinations.
 

Rating: 
3
Average: 3 (1 vote)
Difficulty Level: 
0

SEC0441 - Umbrella Getting Started (Part 1)

The video gets you started on Cisco Umbrella. We will show you how you can quickly setup Umbrella using DNS Security. In a few steps, we will have Umbrella ready to accept our DNS requests and start blocking attempts to malicious destinations.
 

Rating: 
4
Average: 4 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - security

Poll

Vote for the Next Video Series