logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Ccieccnp Security Sncf 300710 Securing Networks With Cisco Firepower Sncf Lammle

  • SKU: BELL-12303882
Ccieccnp Security Sncf 300710 Securing Networks With Cisco Firepower Sncf Lammle
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Ccieccnp Security Sncf 300710 Securing Networks With Cisco Firepower Sncf Lammle instant download after payment.

Publisher: TL
File Extension: PDF
File size: 104.69 MB
Pages: 618
Author: Lammle, Todd
Language: English
Year: 2020
Volume: 1

Product desciption

Ccieccnp Security Sncf 300710 Securing Networks With Cisco Firepower Sncf Lammle by Lammle, Todd instant download after payment.

SECURITY

EXAM 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF)

About the Author

Introduction

History of SourceFire/Firepower

Managing Firepower

What Is This Book Really About?

What Does This Book Cover?

Securing Networks with Cisco Firepower (SNCF 300-710) Exam Objectives

Exam Description

What Objectives Will the Second Book in This Series Cover?

What chapters are covered in Part II in this CCNP Security SNCF series?

Chapter 1: Firepower Management Center (FMC)

Deploying a Cisco Firepower Network

What Is a Firepower Management Center (FMC)?

What If Your FMC Goes Down?

Virtual FMCs

FMC Virtual

FMC Virtual 300

Hardware FMCs

Starting the Firepower Management Center

Summary

Chapter 2: Cisco Firepower Management Center (FMC) Configuration

Initial FMC Login

Navigation Overview

Firepower System Configuration

Information

Access List

Access Control Preferences

Audit Log Certificate and Audit Log

Change Reconciliation

Console Configuration

DNS Cache

Dashboard

Database

Email Notification

External Database Access

HTTPS Certificate

Intrusion Policy Preferences

Language

Login Banner

Management Interfaces

Network Analysis Policy Preferences

Process

REST API Preferences

Remote Storage Device

SNMP

Shell Timeout

Time

Time Synchronization

UCAPL/CC Compliance

User Configuration

VMware Tools

Vulnerability Mapping

Web Analytics

Summary

Chapter 3: Firepower Management Center (FMC) Actions

Firepower Management Center (FMC) Actions

Firepower Management Center Alert Responses

Alert Responses

FMC Detailed Alerts

Summary

Chapter 4: Licensing & Health Policy

Licensing

Health Policy

Health Monitor

Health Policy

Health Events

Blacklist

Health Monitor Alerts

Summary

Chapter 5: Chassis Manager

Hardware Overview

Resetting our 4100s

Resetting the Password on 4100/9300

Setting the 4100/9300 Devices to Factory Default

Initial Configuration for 4100/9300

FXOS Overview

UCS Context

FXOS Context

Security Module Context

Local Management Context

Adapter Context

CIMC Context

Image Management

Adding FXOS

Upgrading FXOS

Adding a ASA Image

Adding an FTD Image

Adding Radware

Logging into the Chassis Manager

Platform Settings

Interfaces

Logical Devices

Adaptive Security Appliance (ASA)

FTD Cluster

FTD Standard

Cluster Traffic Flow

Centralized Features

Dynamic Routing in a Cluster

Site to Site VPNs in a Cluster

NAT in a Cluster

SIP in a Cluster

Syslog in a Cluster

SNMP in a Cluster

FTP in a Cluster

Trustsec in a Cluster

Unsupported Features

Summary

Chapter 6: Firepower Devices

Firepower Threat Defense (FTD) on the 1000/1100/2100/4100/9300 Devices

Configuration for 1010/1100/2100

Firepower Devices used in this book

7000/8000 Appliances

Virtual FTD on vCenter

CLI of the FTD Devices

Basic FTD CLI Commands

CLI Troubleshooting commands

Download the Advanced Troubleshooting File from the GUI

Download the Advanced Troubleshooting File from the CLI

Adding the 1010s and 1150s to the 2500 FMC

Adding the Firepower Appliance, 4140s and vFTDs into the Virtual FMC

Configuring the IPs on the 172.16.10.0 Devices

Configuring a DHCP Server

Configuring Routing

Verifying the Configuration from the CLI

Configuring the IPs on the 10.11.10.0 Managed Devices

Configuring Routing

Device Tab

Summary

Chapter 7: High Availability

High Availability

Licensing

Determining the Active Unit

High Availability on the Hardware FMC

High Availability on the Firepower Devices

Monitoring and Troubleshooting

Monitoring Interfaces

Standby Interface IP Addresses

Active/Standby IP Addresses and MAC Addresses

Verifying with the CLI

Upgrading a High Availability Pair

Upgrading a Firepower Device HA Pair

Summary

Chapter 8: Objects

Objects

Network

Port

Interface

Tunnel Zone

Application Filters

VLAN Tag

Security Group Tag

URL

Geolocation

Variable Set

Time Range

Security Intelligence Overview

Network Security Intelligence (SI)

DNS Security Intelligence

URL Security Intelligence

Security Intelligence Under the Hood

Sinkhole

Sinkhole Reloaded

File List

Cipher Suite List

Distinguished Name

PKI

FTD Only Settings

SLA Monitor

Prefix Lists

Route Map

Access Lists

AS Path

Community List

Policy List

VPN

Address Pools

FlexConfig

Radius Server Group

Intrusion Rules

Summary

Chapter 9: Access Control Policy

Overview

Policy Creation

Policy Editing

General Settings

Security Intelligence

HTTP Responses

Advanced

The Rules Tab

Rules!

ACP Rules Example

Summary

Chapter 10: Malware and File Policy

Advanced Malware Protection (AMP) Basics

File Analysis

Retrospective Events

File Dispositions

File Disposition Caching

Cloud Communications

Malware & File Policy

Advanced Settings

File Rules

File Policy Actions and Licensing

File Blocking Behavior

File Types and Categories

Sample Policy

Cisco AMP for Endpoints in Firepower Management Center

Integrating Firepower with AMP for Endpoints

AMP for Endpoints and AMP Private Cloud

Putting It All Together

Verifying a File Policy

Summary

Chapter 11: Firepower Network Discovery

Firepower Technologies

Network Discovery Policy

Firepower Discovery Information

User Information

Host Attributes

Summary

Chapter 12: Intrusion Prevention System (IPS) Policy

Policy Basics

What Rules Are Enabled by Default?

Connectivity over Security Base Policy

Balanced Security and Connectivity Base Policy

Security over Connectivity Base Policy

Maximum Detection Base Policy

Final Thoughts on Base Policies

Rule States

Layers

Private and Shared Layers

A Shared Layer Alternative

The Intrusion Policy Interface

Intrusion Policy Editing

Rule Management

Creating, Importing, Deleting, & Editing a Snort Rule

Firepower Recommendations

Advanced Settings

Policy Layers

Committing Changes

Configuring and Verifying an Intrusion Policy

Verifying Your IPS Policy

Summary

Chapter 13: DNS Policy

Domain Name System (DNS)

The Kill Chain

A Typical Malware Infection

IP Blacklists

The Proxy Problem

The Proxy Solution

DNS Policy Configuration

Summary

Chapter 14: Prefilter

Overview

Prefilter Uses

Policy Creation

Prefilter Rules

Summary

Chapter 15: Network Address Translation (NAT)

What Is Network Address Translation (NAT)?

Types of Network Address Translation

NAT Names

Firepower NAT

Firepower NAT Examples

Firepower Threat Defense (FTD) NAT

Auto NAT or Manual NAT?

Testing and Troubleshooting NAT

NAT Verification

Summary

Chapter 16: Identity Policy

Identity with Firepower

Identity Sources

Non-Authoritative (Traffic-Based Detection)

Authoritative Sources

Realms

Add Realm

Add Directory

User Download

Identity Policy

Implement your Identity Policy

Summary

Chapter 17: User Management

User Preferences

Account Management

Internal vs. External User Authentication

User Privileges

Predefined User Roles

Creating New User Accounts

Creating a Custom User Role

Managing User Role Escalation

Configuring External Authentication

Creating Authentication Objects

Summary

Chapter 18: Advanced Network Analysis

Event Analysis Principles

False Positives

False Negatives

Possible Outcomes

The Goal of Analysis

Intrusion Events

Workflows

The Time Window

Navigating the Analysis Interface

Security Intelligence Events

Security Intelligence Workflows

Security Intelligence Tuning

File and Malware Events

Summary

Related Products