The Power of Firepower - Cisco Security
The Power of Firepower - Cisco Security
  • 14
  • 25 051
Firepower Hour - Bite Size Edition - External Authentication and Authorization
Welcome to this edition Firepower Hour Bite Size Edition session where we cover both, how to configure and leverage external authentication and authorization.
มุมมอง: 272

วีดีโอ

Firepower Hour - Bite Size Edition - RBAC
มุมมอง 3133 ปีที่แล้ว
Welcome to the first Firepower Hour Bite Size Edition session where we cover 1 topic in between 5-15 minutes. This session is focusing around Role Based Access Control on Firepower Management Center.
Friday Firepower Hour - Secure Endpoint Integration Benefits
มุมมอง 3543 ปีที่แล้ว
In this video, we see several Firepower benefits when integrating Cisco Secure Endpoints, formerly known as AMP for Endpoints. We cover importing endpoint vulnerabilities and OS version which helps with tuning on Intrusion rules. We also integrate the sharing of events from endpoints with the FMC. The second part of the demo is covered in greater details in Friday Firepower Hour Session 2 - It ...
Friday's Firepower Hour What's New in Firepower 6 6
มุมมอง 2.6K4 ปีที่แล้ว
Join us to review what's new in Firepower 6.6 as we cover the new features such as Light Theme, VRF, new Security Intelligence categories, Time-Based Rules, New Policy Deployment options, Usability Enhancements for Security Policies, Object Group Search and more...
Friday Firepower Hour CTR Integration
มุมมอง 6504 ปีที่แล้ว
Hello, in this Friday Firepower Hour, we cover what is Cisco Threat Response, how Firepower is integrated and walking through an Investigation. Please subscribe to this channel and get notified whenever new content is posted. Thank you!
Friday Firepower Hour - SSL Policy
มุมมอง 2K5 ปีที่แล้ว
In this Friday Firepower Hour session, we cover how to configure an SSL Policy. We walk through on how to configure the Firepower Management Center as a Subordinate CA to your MS CA and then add this setting to a SSL Policy. We then test using 2 computers of which, 1 is domain joined and the other as a standalone to see the end user experience.
Friday Firepower Hour Intrusion and Network Analysis Policies
มุมมอง 7K5 ปีที่แล้ว
Spend 1 hour and learn about the differences between the base layers in Intrusion Policies, where and how Intrusion Policies are deployed along with Variable Sets. Also, we cover Network Analysis Policies and Packet flow order of operation with an Access Control Policy. And lastly, we cover an anatomy of a SNORT rule.
Cisco Friday Firepower Hour Series webinar
มุมมอง 1.1K5 ปีที่แล้ว
The session covers configuring Network Discovery, Intrusion and Correlation Policies. We also demonstrate how to configure a NMAP remediation instance, how to configure variable sets and lastly, how to tune an Intrusion rule.
Friday's Firepower Hour Session 6
มุมมอง 1.2K5 ปีที่แล้ว
Watch as we cover Firepower Best Practices, Optimization and Recommendations. We cover Network Discovery, Network Analysis Policies, Variable-Sets, Security Intelligence, Adaptive Profiles, Scheduling Tasks, Advanced Access Control Policy Settings, Network Whitelisting, NMAP responses and Correlation Policies.
Friday's Firepower Hour - Session 5
มุมมอง 9116 ปีที่แล้ว
In this video, we cover the new Cisco ASA to FTD Migration tool. Watch as we migrate an ASA 5506X config to a Firepower 2110 and learn the differences between ASA and Firepower Threat Defense (FTD).
Friday's Firepower Hour - Session 4
มุมมอง 1K6 ปีที่แล้ว
This session covers several topics. First is configuring an AD Realm and integrating the Cisco User Agent to retrieve AD username to IP address mappings and build Firepower Identity Policy. We then cover building a Access Control Policy rule that utilizes AD users and demonstrate Interactive Block page rule action. We look at configuring scheduling tasks and configuring customized dashboards. L...
Friday's Firepower Hour - Session 3
มุมมอง 1.2K6 ปีที่แล้ว
We cover Firepower Intrusion Policy settings and configuration.
Friday's Firepower Hour - Session 2
มุมมอง 1.4K6 ปีที่แล้ว
This session covers the Firepower security intelligence as well as custom feed and how to use these in an Access Control Policy. We also cover AMP for networks and AMP for endpoints integration, simple custom detection leveraged into a Windows and Network AMP4E policies. All the above are demo'd and we show AMP retrospective detection and quarantine.
Friday's Firepower Hour - Session 1
มุมมอง 4.7K6 ปีที่แล้ว
Watch and learn how to configure Network Discovery, Intrusion Policy and IPS Tuning, Variable Set, NMAP Remediation and Correlation Policy on Cisco Firepower.

ความคิดเห็น

  • @SnortDefence
    @SnortDefence 5 หลายเดือนก่อน

    great video.. looking for ISE/FMC integration detail demo video and passive authentication configuration and testing on FTD along with SGT based AC policy and SGT detail configuration example in next vlog series if possible for your

  • @ccsmooth55
    @ccsmooth55 3 ปีที่แล้ว

    Great presentation. What do we do in instances where you are hosting an external-facing website using a publicly signed SSL certificate (Entrust, Verisign, etc) on the load balancer or server? Can we decrypt that traffic? Or do SSL policies only work for internal PKI certs where the FMC can be a subordinate CA for? Thanks!

  • @thepoweroffirepower-ciscos3129
    @thepoweroffirepower-ciscos3129 3 ปีที่แล้ว

    Everyone, the next Friday Firepower Hour session is May 21st. Covered topics include: • Review Cisco’s Secure Endpoint Integration Benefits with Firepower o Firepower Network Discovery Enhancement o Importing Endpoint Vulnerabilities into Firepower o Improving Intrusion Policies Efficacy o Sharing Endpoint Malware Events with Firepower o Enables Configure Once, Block Everywhere Capability Go to cisco.webex.com/cisco/k2/j.php?MTID=tf4a480d2491b83d292433f297f30be07 and register.

  • @rohitjawase9253
    @rohitjawase9253 3 ปีที่แล้ว

    Very very useful

    • @paulazzi1855
      @paulazzi1855 3 ปีที่แล้ว

      Thank you Rohit!

    • @rohitjawase9253
      @rohitjawase9253 3 ปีที่แล้ว

      @@paulazzi1855 Thanks for replying. Your videos are very informative. Just wanted to know when you are uploading nest video series. Could I expect the videos on AMP?

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 3 ปีที่แล้ว

      @@rohitjawase9253 Hi Rohit. Next session will be on 5/14 and topic will be around the benefits of Cisco Secure Endpoints with Firepower. That said, Friday Firepower Hour session 2 covers some of that also.

    • @rohitjawase9253
      @rohitjawase9253 3 ปีที่แล้ว

      @@thepoweroffirepower-ciscos3129 thanks

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 3 ปีที่แล้ว

      @@rohitjawase9253 Go to cisco.webex.com/cisco/k2/j.php?MTID=tf4a480d2491b83d292433f297f30be07 and register.

  • @youngjinyu6320
    @youngjinyu6320 3 ปีที่แล้ว

    어렵다 어려워..

  • @Bormanb23
    @Bormanb23 4 ปีที่แล้ว

    Very informative, is the certificate generation and installation process different for public SSL certs? I see some guides using OpenSSL and not the FMC etc. or is the process the same so for instance when deploying SSL certs to be used in RA VPN? thank you

    • @paulazzi1855
      @paulazzi1855 3 ปีที่แล้ว

      Hi Bismark, thank you for comment. You would not/could not use a public SSL cert for this. Your Firewall is acting as an intermediate CA. Not a single Public CA, like Entrust, Versign, etc. would allow you to be an intermediate CA for them, thus using your own CA. Hopefully this makes sense. Paul

  • @aaltameemi
    @aaltameemi 4 ปีที่แล้ว

    Thank you a lot for the useful info about the new release. I suggest to have such sessions in at least quarterly basis. Exploring new features, common practices, and use cases of firewpower capabilities.

    • @paulazzi1855
      @paulazzi1855 4 ปีที่แล้ว

      Thank you Ayedh, appreciate your feedback and suggestion.

  • @Mat-mn7hf
    @Mat-mn7hf 4 ปีที่แล้ว

    Great channel!

  • @thepoweroffirepower-ciscos3129
    @thepoweroffirepower-ciscos3129 4 ปีที่แล้ว

    All, Below is the invite to the next Friday Firepower Hour WebEx session scheduled for May 15th. We will be covering the following topics: • Understanding the changes with Firepower 6.6 • Review and demonstrate the new features Go to cisco.webex.com/cisco/k2/j.php?MTID=t6a063cb192ff9edccf737d621ac71383 and register and join us for a 1 hour on what's new in Firepower 6.6. Thanks Paul

  • @chenthilchenthil4975
    @chenthilchenthil4975 4 ปีที่แล้ว

    Thanks for this Video. Its really helpful. I do have few queries about this session. Can i send you a mail with all my query ? Please confirm

  • @daviddennis5748
    @daviddennis5748 4 ปีที่แล้ว

    If you are going to allow a specific piece of a Web Application or category (, such as allowing google drive, but not gmail, or allowing facebook logins, but not all of facebook ) would you inspect the specific traffic (category or application) and resign it in the SSL policy and then allow it via your ACL? Thanks, loved the video!

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 4 ปีที่แล้ว

      David, thank you for your comment. In your SSL Policy, there is a default action. If that is set to Do not decrypt, then you would have to create a rule in your SSL Policy that identifies the apps you wish to block. In the Applications column/selection, apps requiring decryption to be identified are displayed with a gold lock so they are easily identified. Hopefully this helps and stay tuned for this Friday the 20th where we have the next Friday Firepower Hour covering how to integrate Firepower with Cisco Threat Response. Paul

  • @thepoweroffirepower-ciscos3129
    @thepoweroffirepower-ciscos3129 4 ปีที่แล้ว

    Happy to announce the next Friday Firepower Hour session is scheduled for Friday March 20th at 3pm CST. We will be covering the following topics: • Integrate Firepower into CTR dashboard • Review the Firepower Events sent to CTR • Investigate an event using CTR You need to register to attend and here is the link: cisco.webex.com/cisco/k2/j.php?MTID=t411bc09bc9654148415f4417c2fc61cd See you on March 20th!

  • @DavidDaverso
    @DavidDaverso 5 ปีที่แล้ว

    very nice walk-through by Cisco experts. very relevant content with the large percentage of malware encrypting their traffic to avoid detection

  • @thepoweroffirepower-ciscos3129
    @thepoweroffirepower-ciscos3129 5 ปีที่แล้ว

    Hello, the next Friday Firepower Hour will be covering the topic on SSL Policies. Register and join as we will be covering the following topics: Configure FMC as a subordinate CA, Configure SSL Policy, Review the SSL Policy components, Test and Review Events. Here is the link. Registration to join is required. cisco.webex.com/cisco/k2/j.php?MTID=t556e18897499a9ba67b006e160988e15 Thanks Paul

  • @bryangutierrez3745
    @bryangutierrez3745 5 ปีที่แล้ว

    Simply the best, better than all the rest

  • @bryangutierrez3745
    @bryangutierrez3745 5 ปีที่แล้ว

    i cant believe we live in a country where we can hear this beautiful knowledge

  • @bryangutierrez3745
    @bryangutierrez3745 5 ปีที่แล้ว

    I cant believe this much firepower knowledge can come out of one man's brain

  • @bryangutierrez3745
    @bryangutierrez3745 5 ปีที่แล้ว

    i cant believe i missed this live - it must have been an amazing day!

  • @bryangutierrez3745
    @bryangutierrez3745 5 ปีที่แล้ว

    This is an amazing session

  • @Ma7moudFat7y1
    @Ma7moudFat7y1 5 ปีที่แล้ว

    Thanks .. very helpful

  • @vijaykumar-mi7sw
    @vijaykumar-mi7sw 5 ปีที่แล้ว

    great thanks for your session..

  • @yannickdoh-dval4374
    @yannickdoh-dval4374 5 ปีที่แล้ว

    Hello, Thanks for this video. Pleass How to backup an FTD configurations prior to 6.3 version?

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 5 ปีที่แล้ว

      Hi Yannick, this functionality was added in 6.3. Prior to this was a manual re-configuration of Interfaces, etc.

  • @RogueDire
    @RogueDire 6 ปีที่แล้ว

    Thanks so much! for a new out of the box Firepower deployment, setting the "network discovery" default action in the ACP would allow all Interzone traffic? meaning traffic from the outside (internet) can access something in the inside? or does Firepower has a default Deny for interzone traffic? thanks again!

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 6 ปีที่แล้ว

      Hi, with a Network Discovery or Intrusion Policy, all traffic is allowed unless IPS rule blocks, very much like an IDS/IPS. With the default action set to Block, then it's more like a firewall. By default, permit inter and intra interface traffic is enabled, unlike the ASA. You would require to configure ACP rules to deny/permit traffic bases on Zone/Vlan/Network/etc. Here is some configuration example. www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200908-configuring-firepower-threat-defense-int.html

    • @RogueDire
      @RogueDire 6 ปีที่แล้ว

      @@thepoweroffirepower-ciscos3129 then we need to make sure default action is always set to block from the initial deployment. Thank you

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 6 ปีที่แล้ว

      @@RogueDire Yes, if your firepower deployment is a the Internet edge. In a datacenter, it would depend on what ACP rules are configured. If you only wanted to allow certain traffic, then create rules to only allows that traffic and then Block everything else. If you want to allow all traffic but inspect via IPS policy, then you could leverage Intrusion as your default action. There is no right/wrong answer or deployment. It just depends on what you require from a security policy.

  • @RogueDire
    @RogueDire 6 ปีที่แล้ว

    How do I register for the live sessions (partner)

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 6 ปีที่แล้ว

      Hi, there are live sessions but only in select cities. Reach out to your local Cisco CSE asking if there are events in your area. Thanks.

  • @murrad01
    @murrad01 6 ปีที่แล้ว

    Great content!

  • @bryangutierrez3745
    @bryangutierrez3745 6 ปีที่แล้ว

    Can't wait for the next episode, i'm on the edge of my seat.

  • @bryangutierrez3745
    @bryangutierrez3745 6 ปีที่แล้ว

    Hard to believe this is free! So good...

  • @bryangutierrez3745
    @bryangutierrez3745 6 ปีที่แล้ว

    Wow, Amazing content in this one. Paul can sure deliver a presentation.

  • @bryangutierrez3745
    @bryangutierrez3745 6 ปีที่แล้ว

    This is great! Very informative.

  • @davidthompson9359
    @davidthompson9359 6 ปีที่แล้ว

    You mentioned you are using a virtual FMC in you lab. We found out after Cisco recommended to us to purchase that you can't run redundancy or HA between two virtual FMCs. You have to have two hardware FMCs to have FMC HA.

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 6 ปีที่แล้ว

      Hi David, this is accurate. Only the FMC appliances natively support HA, with the exception of the 750 which is EOS. www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html There are other reasons why you would want to go with appliances over virtual FMC. The datasheet info in the above link provides some insight into EPS and Database size. Thanks

    • @RogueDire
      @RogueDire 6 ปีที่แล้ว

      Backup FMC regularly and snapshot the FMC

    • @thepoweroffirepower-ciscos3129
      @thepoweroffirepower-ciscos3129 6 ปีที่แล้ว

      @@RogueDire Absolutely, backup regularly and schedule that!