Video: Protecting your Home Network with the Sophos UTM Home Edition
https://youtu.be/dKo7sN4_WeY
https://youtu.be/dKo7sN4_WeY
In this article I will walk through the steps that are required to configure the ASA for external authentication using Cisco ISE for remote access VPN users. This demonstration will…
In this knowledge transfer session, I show you how to configure basic settings on the Cisco Adaptive Security Appliance (ASA) and how we can manage the ASA using the Adaptive…
In this article, I will demonstrate how to configure the ASAv so that you use a virtual serial port. This article assumes that you have installed the virtual Cisco Adaptive Security…
In this article, I will describe how to enable authentication and authorization for Firepower eXtensible Operating System (FXOS) devices. The use case presented in this document illustrates how Cisco Identity…
In this video demonstration, we take a look at Object NAT and how it can be used to map hosts statically. //pagead2.googlesyndication.com/pagead/js/adsbygoogle.js (adsbygoogle = window.adsbygoogle || []).push({});
In this article, I would like to demonstrate how to configure Cisco Smart Licensing on the virtual Cisco Adaptive Security Appliance (ASAv). This post assumes that readers already have access…
In this article, I will share my notes on the ASA packet process for version 8.3+. Domain 1.0 off the CCIE Security version blueprint focuses on perimeter security and intrusion prevention,…
In this article, I will cover network device administration using TACACS+ on Cisco's Identity Services Engine. Accompanied with a video demonstration, I will also list the TACACS+ configuration required for…
Earlier this week I delivered a presentation about UTM's to businesses on the Isle of Man. This lightning presentation was aimed to give a brief overview of Unified Threat Management…