Vi ste ovdje
Overview/Description
An essential element in building highly available networks is the implementation of a First Hop Redundancy Protocol (FHRP). FHRPs, such as the Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP), can prevent loss of connectivity by providing redundant default gateway functionality in a way that is transparent to the end hosts. Performance issues can adversely affect a business as employees may not be able to service their customers correctly. But does a network cause the problem or does a client, a...
Overview/Description
Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Equally important is how to recognize and solve issues that may occur. This course describes how to diagnose and troubleshoot port security, spoofing, and virtual LAN access control list (VACL) problems using the Cisco IOS command line interface. It will also explain how to diagnose and resolve AAA and 802.1x port-based authentication problems.
Target Audience
Professionals who work...
Overview/Description
Understanding the mechanics of routing features and their interactions with other devices on the network is a must when troubleshooting. Being able to quickly diagnose and resolve router problems are therefore important skills for any network support engineer. This course reviews various routing features and how to use Cisco IOS commands to gather information about the common causes for router issues, such as routing, high availability, NAT, and performance problems, as well as offers typical solutions.
Target Audience
Professionals who work in complex network...
Overview/Description
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'...
Overview/Description
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what...
Overview/Description
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (...
Overview/Description
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on...
Overview/Description
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path...
Overview/Description
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a...
Overview/Description
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to...