No video

Firepower Threat Defense - Common Practice Guide Walkthrough

  Рет қаралды 32,504

Jason Maynard

Jason Maynard

6 жыл бұрын

Cisco Firepower Threat Defense Common Practice Guide Walkthrough with Demos -
cisco.lookbookhq.com/ngfw_ftd_...
Lots of great things here as well. demand.cisco.com/NGFW_Get-started

Пікірлер: 25
@davidwu9015
@davidwu9015 5 жыл бұрын
Very helpful and valuable, covering almost all the major aspects of FTD configuration, a good resources for FTD technical guys. Thanks for taking time to make the video.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks David for the feedback!
@sergeileshchinsky
@sergeileshchinsky 6 жыл бұрын
Another great vid. Thanks a lot for sharing!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks sir!
@manojupreti6413
@manojupreti6413 5 жыл бұрын
Simply Awesome - straight to the point
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks!!
@Owii92
@Owii92 6 жыл бұрын
Thanks for the time you took to make this video. I couldn't find anything like this on internet, beside admin guide and tutorial... without real explanations. anyway, thanks again :)
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Owii92 for the comment and glad it helped.
@staskosovskih8594
@staskosovskih8594 6 жыл бұрын
Totally awesome!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Stas!
@Crog2
@Crog2 5 жыл бұрын
Thank You for sharing. Thumb up
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks Igor!
@HoangPham-ki7rj
@HoangPham-ki7rj 5 жыл бұрын
Thank you very much, very helpful guide :)
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Anytime Hoang and thanks for the feedback.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
I seen you message around DNS but you had your email address so I did not publish the comment. That said I assume you are looking at DNS Sinkholing. If so check out the following videos 23. Cisco Firepower Threat Defense: DNS Sinkholing kzbin.info/www/bejne/eovXp3ajpMyYac0 24. Cisco Firepower Threat Defense: DNS Sinkholing Packet Capture kzbin.info/www/bejne/qIOump2phZ6cr6M 25. Cisco Firepower Threat Defense: DNS Sinkhole Tweaking for the Analyst kzbin.info/www/bejne/bYOwmnyngZ56n80 Hope this helps
@HoangPham-ki7rj
@HoangPham-ki7rj 5 жыл бұрын
@@jasonmaynard8773 Thanks for hidding the comment, in my case, after putting DNS server behind the firewall with default "balance and security", and malware blocking (1st rule), all pcs and even FW itself cannot use DNS service anymore, every others service like ping, RD are still OK, DNS is win 2008 R2. Checked log and i saw UDP port 53 were allow. Have you met this case?
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Hi Hoang, I am assuming that the PCs have to go through the firewall to get to DNS (not on the same network and you have a control point in place). I would go to FTD and leverage packet tracer and do a couple of tests. This should highlight what stage the firewall is blocking (if that is the case). If this does not help I would open a TAC case and get them to have a look. Packet Tracer - kzbin.info/www/bejne/jZXJk5aGaLCohZI
@PraveenRai
@PraveenRai 2 жыл бұрын
Very very helpful Jason.. would create one new walkthrough video on snort3
@jasonmaynard8773
@jasonmaynard8773 2 жыл бұрын
Thank you and noted!
@StephenCombs17
@StephenCombs17 4 жыл бұрын
question, I saw in the video you placed the the objects (DMZ, Inside Hosts) in your HOME NET variable. We do not want to do this correct? If you have both your DMZ and your INSIDE hosts in HOME NET then you will not inspect from inside to DMZ or vice versa since those are considered protected? My understanding is that you only want your inside hosts or protected hosts in your HOME NET variable everything else gets inspected.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Thanks Mark for reaching out - home_net should include all networks you are protecting. It states this in the guide "the majority of the rules use the variable $HOME_NET to specify the protected network and the variable $EXTERNAL_NET to specify the unprotected (or outside) ", also a quick google of www.google.com/search?q=snort+home_net+variable&rlz=1C1GCEU_enUS872US873&oq=snort+Home&aqs=chrome.0.69i59j69i57j35i39j0l5.5013j0j4&sourceid=chrome&ie=UTF-8 Gets you the following as well "$HOME_NET is a variable that defines the network or networks you are trying to protect, while $EXTERNAL_NET is the external, untrusted networks to which you are connected. These variables are used in virtually all rules to specify criteria for the source and destination of a packet." Hope this clarifies :)
@jtcod5422
@jtcod5422 4 жыл бұрын
Where can I find this lookbook? I followed first link and it gave me a 2 page document that doesn't show the details of this guide Walkthrough. Thanks.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Try the following: cisco.lookbookhq.com/ngfw_ftd_common-practices
@stanhuang8091
@stanhuang8091 6 жыл бұрын
very useful
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Glad it helped
Can A Seed Grow In Your Nose? 🤔
00:33
Zack D. Films
Рет қаралды 30 МЛН
Советы на всё лето 4 @postworkllc
00:23
История одного вокалиста
Рет қаралды 4,8 МЛН
Schoolboy - Часть 2
00:12
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 9 МЛН
لقد سرقت حلوى القطن بشكل خفي لأصنع مصاصة🤫😎
00:33
Cool Tool SHORTS Arabic
Рет қаралды 29 МЛН
21. Cisco Firepower Threat Defense 6 2 2: SSL/TLS Decrypt
51:25
Jason Maynard
Рет қаралды 14 М.
Upgrading Cisco FTD (Firepower Threat Defense) v6.x to v7.0.1
1:00:01
Ardeshir Feizirad
Рет қаралды 1,5 М.
Firepower Management Center - FMC 101
1:42:19
Cisco
Рет қаралды 154 М.
Cisco Firepower - Introduction, Configuration, and Best Practice | Webinar
1:05:54
Understanding Prefilter policy in FTD
16:35
Securing Networks with Cisco Firepower Threat Defense
Рет қаралды 20 М.
Cisco Firepower with CML lab demos // Get started with Firewalls today
1:32:17
Why Cisco Secure Firewall? The Power Inside
53:35
Jason Maynard
Рет қаралды 478
Firepower 1010 & Firepower Device Manager
37:53
Aaron McDaniel
Рет қаралды 50 М.
Can A Seed Grow In Your Nose? 🤔
00:33
Zack D. Films
Рет қаралды 30 МЛН