Introducing Cisco Secure Firewall Threat Defense
- Need for a Firewall
- Traditional Network Security and the New Reality
- Cisco Secure Portfolio
- Cisco Secure Firewall Threat Defense Features Overview
- Cisco Secure Firewall Threat Defense Platform Overview
- Cisco Secure Firewall Use Cases
- Cisco Secure Firewall Smart Licensing
Describing Cisco Secure Firewall Threat Defense Deployment Options
- Deployment Modes Overview
- Firewall Deployment Mode
- Configuring Global Interfaces
- Configuring IPS Interfaces
- Resilient and Scalable Design
Describing Cisco Secure Firewall Threat Defense Management Options
- Cisco Secure Firewall Threat Defense Management Overview
- Cisco Secure Firewall Management Center
- Cisco Secure Firewall Threat Defense Device Manager
- Cisco Defense Orchestrator
Configuring Basic Network Settings on Cisco Secure Firewall Threat Defense
- Initial Cisco Secure Firewall Threat Defense Setup
- Cisco Secure Firewall Management Center Initial Setup
- Cisco Secure Firewall Threat Defense Registration with Cisco Secure Firewall Management Center
- Cisco Secure Firewall Threat Defense Device Management
- Interfaces and Security Zones Configuration
- Static Routing Configuration
- Platform Settings Configuration
- Health Policy
Configuring High Availability on Cisco Secure Firewall Threat Defense
- Active/Standby Failover Overview
- Stateless and Stateful Failover
- Health Monitor Initiated Failover
- Active/Standby Failover Configuration
- Verify and Troubleshoot Active/Standby High Availability
Configuring Auto NAT on Cisco Secure Firewall Threat Defense
- NAT Overview
- AutoNAT Configuration
Describing Packet Processing and Policies on Cisco Secure Firewall Threat Defense
- Objects Overview
- Policies Overview
- Cisco Secure Firewall Engines and Detailed Packet Processing
Configuring Discovery Policy on Cisco Secure Firewall Threat Defense
- Discovery Policy Overview
- Network Discovery Policy Configuration
- Discovery Events and Host Profile Analysis
Configuring Prefilter Policy on Cisco Secure Firewall Threat Defense
- Prefilter Policy Overview
- Prefilter Policy Configuration
- Connection Events Analysis
Configuring Access Control Policy on Cisco Secure Firewall Threat Defense
- Access Control Policy Overview
- Access Control Policy Rules and Rule Actions
- Access Control Policy Deployment
- Access Control Policy Best Practices
Configuring Security Intelligence on Cisco Secure Firewall Threat Defense
- Security Intelligence Overview
- Security Intelligence Objects
- IP and URL Security Intelligence Configuration and Verification
- DNS Security Intelligence Configuration and Verification
Configuring File Policy on Cisco Secure Firewall Threat Defense
- File Policy Overview
- Network Malware Protection and File Type Detection Architecture
- File Policy Configuration
- Malware and File Events Analysis
Configuring Intrusion Policy on Cisco Secure Firewall Threat Defense
- IPS and Snort Introduction
- Intrusion (Snort) Rule Introduction
- Intrusion Policy Fundamentals
- Creating Customizable (User Created) IPS Policies
- Intrusion Event Overview
Performing Basic Threat Analysis on Cisco Secure Firewall Management Center
- Events Overview
- Indications of Compromise
- Content Explorer
- Dahsboards
- Reports
- Using the Unified Event Viewer
- Threat Analysis Example
Managing Cisco Secure Firewall Threat Defense System
- Update management
- User Account Management
- Backup of the System
- Configuration Export and Import
- Configuration Rollback
Troubleshooting Basic Traffic Flow
- Cisco Secure Firewall Threat Defense CLI
- Traffic Flow Troubleshooting Process and Tools
- Traffic Flow Troubleshooting Examples
Cisco Secure Firewall Threat Defense Device Manager
- Cisco Secure Firewall Threat Defense Device Manager Initial Configuration
- Cisco Secure Firewall Threat Defense Device Manager Policies Overview