View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

certificate

RS0084 - Prime 3.1 VMware Installation (Part 2)

The video walks you through an installation process of Cisco Prime Infrastructure 3.1 Virtual Appliance on VMware ESXi. We discuss some pre-requisites and network parameters that you need for a successful installation. The second half of the video deals with replacing Prime default self-signed certificate with a CA-signed certificate.
Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

RS0084 - Prime 3.1 VMware Installation (Part 1)

The video walks you through an installation process of Cisco Prime Infrastructure 3.1 Virtual Appliance on VMware ESXi. We discuss some pre-requisites and network parameters that you need for a successful installation. The second half of the video deals with replacing Prime default self-signed certificate with a CA-signed certificate.
Rating: 
4.75
Average: 4.8 (4 votes)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0215 - ISE 2.0 Meraki MDM with AnyConnect VPN (Part 2)

The video shows an integration between Cisco ISE 2.0 and Meraki System Manager to provide client-based certificate authentication and mobile device posture assessment to AnyConnect VPN client. The configuration covers both ASA and ISE. The goal is to demonstrate an ability to provide consistent network access experience over VPN as we saw over wireless in the previous video.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0215 - ISE 2.0 Meraki MDM with AnyConnect VPN (Part 1)

The video shows an integration between Cisco ISE 2.0 and Meraki System Manager to provide client-based certificate authentication and mobile device posture assessment to AnyConnect VPN client. The configuration covers both ASA and ISE. The goal is to demonstrate an ability to provide consistent network access experience over VPN as we saw over wireless in the previous video.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0214 - ISE 2.0 Meraki MDM with Wireless (Part 3)

The video shows you how to leverage Meraki MDM to assist mobile user with device onboarding, generate device certificate, and manages wireless profile. Cisco ISE 2.0 will be used to perform wireless 802.1X authentication and posture assessment with Meraki System Manager integration. The goal is to demonstrate a simpler BYOD onboarding process.
 
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0214 - ISE 2.0 Meraki MDM with Wireless (Part 2)

The video shows you how to leverage Meraki MDM to assist mobile user with device onboarding, generate device certificate, and manages wireless profile. Cisco ISE 2.0 will be used to perform wireless 802.1X authentication and posture assessment with Meraki System Manager integration. The goal is to demonstrate a simpler BYOD onboarding process.
 
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - certificate