Category: Cisco System Logging
-
Remote Access VPN – Cisco Virtual Private Network (VPN)
Remote Access VPN In a remote access virtual private network, an endpoint device located in a remote network can connect to an organization’s internal network over the Internet via a secure channel. The endpoint device uses Cisco AnyConnect Secure Mobility Client to establish a secure tunnel with a threat defense, which is deployed in an…
-
“Do I Know This Already?” Quiz – Cisco Virtual Private Network (VPN)
“Do I Know This Already?” Quiz The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read…
-
“Do I Know This Already?” Quiz – Cisco Traffic Decryption Policy
“Do I Know This Already?” Quiz The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read…
-
Decryption Techniques on Secure Firewall – Cisco Traffic Decryption Policy
Decryption Techniques on Secure Firewall The full suite of access control rule capabilities can be performed only on nonencrypted traffic. To decrypt, inspect, and block encrypted traffic, you need to configure an SSL policy and select the SSL policy from within your access control policy. When an SSL policy is associated with an access control…
-
Secure Firewall Logging Essentials – Cisco System Logging (Syslog)
Secure Firewall Logging Essentials Secure Firewall can generate syslog alerts for various security events, such as intrusion policies, file and malware policies, discovery policies, and access control policies. It can also send syslog alerts to provide the health status of its various hardware and software components. You can configure a management center to generate and…
-
Best Practices for Logging – Cisco System Logging (Syslog)
Best Practices for Logging Consider the following issues when configuring Secure Firewall to send alerts to a syslog server: Prerequisites To learn and test the syslog configuration, you can utilize the same lab that you built in previous chapters. You can simply install the syslog service to your administrator computer. Figure 21-1 shows the lab…
-
Sending Syslog from Threat Defense – Cisco System Logging (Syslog)
Sending Syslog from Threat Defense By using the platform settings policy, you can deploy different logging configurations to different threat defense devices. The platform settings policy allows you to configure many device-specific options in one place and then deploy them to one or more threat defense devices as needed. For example, you can add a…