Category: Cisco Traffic Decryption Policy
-
Remote Access VPN – Cisco Virtual Private Network (VPN)
Remote Access VPN In a remote access virtual private network, an endpoint device located in a remote network can connect to an organization’s internal network over the Internet via a secure channel. The endpoint device uses Cisco AnyConnect Secure Mobility Client to establish a secure tunnel with a threat defense, which is deployed in an…
-
Verification – Cisco Traffic Decryption Policy
Verification It’s time to test your configurations and see the magic—how a threat defense analyzes encrypted traffic and blocks a file despite its transfer over an encrypted session. This section assumes that your lab environment has a web server with the TLS protocol enabled. The web server is located at the outside zone of your…
-
“Do I Know This Already?” Quiz – Cisco Traffic Decryption Policy
“Do I Know This Already?” Quiz The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read…
-
Traffic Decryption Essentials – Cisco Traffic Decryption Policy
Traffic Decryption Essentials Secrecy and privacy are of vital importance for communication. Prior to the electronic communication era, a person was appointed as a messenger. Sometimes, a pigeon was used for its homing instinct. However, neither a person nor a pigeon was able to ensure the confidentiality of a message. The longer the distance they…
-
Decryption Techniques on Secure Firewall – Cisco Traffic Decryption Policy
Decryption Techniques on Secure Firewall The full suite of access control rule capabilities can be performed only on nonencrypted traffic. To decrypt, inspect, and block encrypted traffic, you need to configure an SSL policy and select the SSL policy from within your access control policy. When an SSL policy is associated with an access control…
-
“Do I Know This Already?” Quiz – Cisco System Logging (Syslog)
“Do I Know This Already?” Quiz The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read…
-
Secure Firewall Logging Essentials – Cisco System Logging (Syslog)
Secure Firewall Logging Essentials Secure Firewall can generate syslog alerts for various security events, such as intrusion policies, file and malware policies, discovery policies, and access control policies. It can also send syslog alerts to provide the health status of its various hardware and software components. You can configure a management center to generate and…
-
Best Practices for Logging – Cisco System Logging (Syslog)
Best Practices for Logging Consider the following issues when configuring Secure Firewall to send alerts to a syslog server: Prerequisites To learn and test the syslog configuration, you can utilize the same lab that you built in previous chapters. You can simply install the syslog service to your administrator computer. Figure 21-1 shows the lab…