Firepower Threat Defense - Common Practice Guide Walkthrough

  Рет қаралды 32,461

Jason Maynard

Jason Maynard

6 жыл бұрын

Cisco Firepower Threat Defense Common Practice Guide Walkthrough with Demos -
cisco.lookbookhq.com/ngfw_ftd_...
Lots of great things here as well. demand.cisco.com/NGFW_Get-started

Пікірлер: 25
@davidwu9015
@davidwu9015 5 жыл бұрын
Very helpful and valuable, covering almost all the major aspects of FTD configuration, a good resources for FTD technical guys. Thanks for taking time to make the video.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks David for the feedback!
@manojupreti6413
@manojupreti6413 5 жыл бұрын
Simply Awesome - straight to the point
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks!!
@sergeileshchinsky
@sergeileshchinsky 6 жыл бұрын
Another great vid. Thanks a lot for sharing!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks sir!
@Owii92
@Owii92 6 жыл бұрын
Thanks for the time you took to make this video. I couldn't find anything like this on internet, beside admin guide and tutorial... without real explanations. anyway, thanks again :)
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Owii92 for the comment and glad it helped.
@staskosovskih8594
@staskosovskih8594 6 жыл бұрын
Totally awesome!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Stas!
@Crog2
@Crog2 5 жыл бұрын
Thank You for sharing. Thumb up
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks Igor!
@PraveenRai
@PraveenRai 2 жыл бұрын
Very very helpful Jason.. would create one new walkthrough video on snort3
@jasonmaynard8773
@jasonmaynard8773 2 жыл бұрын
Thank you and noted!
@HoangPham-ki7rj
@HoangPham-ki7rj 5 жыл бұрын
Thank you very much, very helpful guide :)
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Anytime Hoang and thanks for the feedback.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
I seen you message around DNS but you had your email address so I did not publish the comment. That said I assume you are looking at DNS Sinkholing. If so check out the following videos 23. Cisco Firepower Threat Defense: DNS Sinkholing kzfaq.info/get/bejne/esCkqaae1M3JY58.html 24. Cisco Firepower Threat Defense: DNS Sinkholing Packet Capture kzfaq.info/get/bejne/qLh7nM2ktZ_NqXU.html 25. Cisco Firepower Threat Defense: DNS Sinkhole Tweaking for the Analyst kzfaq.info/get/bejne/bbh9nKyisZ-rmZ8.html Hope this helps
@HoangPham-ki7rj
@HoangPham-ki7rj 5 жыл бұрын
@@jasonmaynard8773 Thanks for hidding the comment, in my case, after putting DNS server behind the firewall with default "balance and security", and malware blocking (1st rule), all pcs and even FW itself cannot use DNS service anymore, every others service like ping, RD are still OK, DNS is win 2008 R2. Checked log and i saw UDP port 53 were allow. Have you met this case?
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Hi Hoang, I am assuming that the PCs have to go through the firewall to get to DNS (not on the same network and you have a control point in place). I would go to FTD and leverage packet tracer and do a couple of tests. This should highlight what stage the firewall is blocking (if that is the case). If this does not help I would open a TAC case and get them to have a look. Packet Tracer - kzfaq.info/get/bejne/jcqWlcaBmLHZf2Q.html
@StephenCombs17
@StephenCombs17 4 жыл бұрын
question, I saw in the video you placed the the objects (DMZ, Inside Hosts) in your HOME NET variable. We do not want to do this correct? If you have both your DMZ and your INSIDE hosts in HOME NET then you will not inspect from inside to DMZ or vice versa since those are considered protected? My understanding is that you only want your inside hosts or protected hosts in your HOME NET variable everything else gets inspected.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Thanks Mark for reaching out - home_net should include all networks you are protecting. It states this in the guide "the majority of the rules use the variable $HOME_NET to specify the protected network and the variable $EXTERNAL_NET to specify the unprotected (or outside) ", also a quick google of www.google.com/search?q=snort+home_net+variable&rlz=1C1GCEU_enUS872US873&oq=snort+Home&aqs=chrome.0.69i59j69i57j35i39j0l5.5013j0j4&sourceid=chrome&ie=UTF-8 Gets you the following as well "$HOME_NET is a variable that defines the network or networks you are trying to protect, while $EXTERNAL_NET is the external, untrusted networks to which you are connected. These variables are used in virtually all rules to specify criteria for the source and destination of a packet." Hope this clarifies :)
@jtcod5422
@jtcod5422 4 жыл бұрын
Where can I find this lookbook? I followed first link and it gave me a 2 page document that doesn't show the details of this guide Walkthrough. Thanks.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Try the following: cisco.lookbookhq.com/ngfw_ftd_common-practices
@stanhuang8091
@stanhuang8091 6 жыл бұрын
very useful
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Glad it helped
DEFINITELY NOT HAPPENING ON MY WATCH! 😒
00:12
Laro Benz
Рет қаралды 58 МЛН
Русалка
01:00
История одного вокалиста
Рет қаралды 7 МЛН
Best father #shorts by Secret Vlog
00:18
Secret Vlog
Рет қаралды 22 МЛН
Firepower 1010 & Firepower Device Manager
37:53
Aaron McDaniel
Рет қаралды 50 М.
Upgrading Cisco FTD (Firepower Threat Defense) v6.x to v7.0.1
1:00:01
Ardeshir Feizirad
Рет қаралды 1,5 М.
Firepower IPS Tuning
56:45
Katherine McNamara
Рет қаралды 24 М.
Firepower Management Center - FMC 101
1:42:19
Cisco
Рет қаралды 153 М.
21. Cisco Firepower Threat Defense 6 2 2: SSL/TLS Decrypt
51:25
Jason Maynard
Рет қаралды 14 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Cisco Firepower NGFW Deployments - Part1
12:16
Mushraf Mustafa
Рет қаралды 9 М.
FIrepower 1010 Overview and Setup
15:16
Cisco Sal
Рет қаралды 72 М.
Cisco Firepower with CML lab demos // Get started with Firewalls today
1:32:17