Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
0.0
0 reviewsSECURITY
EXAM 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF)
About the Author
Introduction
History of SourceFire/Firepower
Managing Firepower
What Is This Book Really About?
What Does This Book Cover?
Securing Networks with Cisco Firepower (SNCF 300-710) Exam Objectives
Exam Description
What Objectives Will the Second Book in This Series Cover?
What chapters are covered in Part II in this CCNP Security SNCF series?
Chapter 1: Firepower Management Center (FMC)
Deploying a Cisco Firepower Network
What Is a Firepower Management Center (FMC)?
What If Your FMC Goes Down?
Virtual FMCs
FMC Virtual
FMC Virtual 300
Hardware FMCs
Starting the Firepower Management Center
Summary
Chapter 2: Cisco Firepower Management Center (FMC) Configuration
Initial FMC Login
Navigation Overview
Firepower System Configuration
Information
Access List
Access Control Preferences
Audit Log Certificate and Audit Log
Change Reconciliation
Console Configuration
DNS Cache
Dashboard
Database
Email Notification
External Database Access
HTTPS Certificate
Intrusion Policy Preferences
Language
Login Banner
Management Interfaces
Network Analysis Policy Preferences
Process
REST API Preferences
Remote Storage Device
SNMP
Shell Timeout
Time
Time Synchronization
UCAPL/CC Compliance
User Configuration
VMware Tools
Vulnerability Mapping
Web Analytics
Summary
Chapter 3: Firepower Management Center (FMC) Actions
Firepower Management Center (FMC) Actions
Firepower Management Center Alert Responses
Alert Responses
FMC Detailed Alerts
Summary
Chapter 4: Licensing & Health Policy
Licensing
Health Policy
Health Monitor
Health Policy
Health Events
Blacklist
Health Monitor Alerts
Summary
Chapter 5: Chassis Manager
Hardware Overview
Resetting our 4100s
Resetting the Password on 4100/9300
Setting the 4100/9300 Devices to Factory Default
Initial Configuration for 4100/9300
FXOS Overview
UCS Context
FXOS Context
Security Module Context
Local Management Context
Adapter Context
CIMC Context
Image Management
Adding FXOS
Upgrading FXOS
Adding a ASA Image
Adding an FTD Image
Adding Radware
Logging into the Chassis Manager
Platform Settings
Interfaces
Logical Devices
Adaptive Security Appliance (ASA)
FTD Cluster
FTD Standard
Cluster Traffic Flow
Centralized Features
Dynamic Routing in a Cluster
Site to Site VPNs in a Cluster
NAT in a Cluster
SIP in a Cluster
Syslog in a Cluster
SNMP in a Cluster
FTP in a Cluster
Trustsec in a Cluster
Unsupported Features
Summary
Chapter 6: Firepower Devices
Firepower Threat Defense (FTD) on the 1000/1100/2100/4100/9300 Devices
Configuration for 1010/1100/2100
Firepower Devices used in this book
7000/8000 Appliances
Virtual FTD on vCenter
CLI of the FTD Devices
Basic FTD CLI Commands
CLI Troubleshooting commands
Download the Advanced Troubleshooting File from the GUI
Download the Advanced Troubleshooting File from the CLI
Adding the 1010s and 1150s to the 2500 FMC
Adding the Firepower Appliance, 4140s and vFTDs into the Virtual FMC
Configuring the IPs on the 172.16.10.0 Devices
Configuring a DHCP Server
Configuring Routing
Verifying the Configuration from the CLI
Configuring the IPs on the 10.11.10.0 Managed Devices
Configuring Routing
Device Tab
Summary
Chapter 7: High Availability
High Availability
Licensing
Determining the Active Unit
High Availability on the Hardware FMC
High Availability on the Firepower Devices
Monitoring and Troubleshooting
Monitoring Interfaces
Standby Interface IP Addresses
Active/Standby IP Addresses and MAC Addresses
Verifying with the CLI
Upgrading a High Availability Pair
Upgrading a Firepower Device HA Pair
Summary
Chapter 8: Objects
Objects
Network
Port
Interface
Tunnel Zone
Application Filters
VLAN Tag
Security Group Tag
URL
Geolocation
Variable Set
Time Range
Security Intelligence Overview
Network Security Intelligence (SI)
DNS Security Intelligence
URL Security Intelligence
Security Intelligence Under the Hood
Sinkhole
Sinkhole Reloaded
File List
Cipher Suite List
Distinguished Name
PKI
FTD Only Settings
SLA Monitor
Prefix Lists
Route Map
Access Lists
AS Path
Community List
Policy List
VPN
Address Pools
FlexConfig
Radius Server Group
Intrusion Rules
Summary
Chapter 9: Access Control Policy
Overview
Policy Creation
Policy Editing
General Settings
Security Intelligence
HTTP Responses
Advanced
The Rules Tab
Rules!
ACP Rules Example
Summary
Chapter 10: Malware and File Policy
Advanced Malware Protection (AMP) Basics
File Analysis
Retrospective Events
File Dispositions
File Disposition Caching
Cloud Communications
Malware & File Policy
Advanced Settings
File Rules
File Policy Actions and Licensing
File Blocking Behavior
File Types and Categories
Sample Policy
Cisco AMP for Endpoints in Firepower Management Center
Integrating Firepower with AMP for Endpoints
AMP for Endpoints and AMP Private Cloud
Putting It All Together
Verifying a File Policy
Summary
Chapter 11: Firepower Network Discovery
Firepower Technologies
Network Discovery Policy
Firepower Discovery Information
User Information
Host Attributes
Summary
Chapter 12: Intrusion Prevention System (IPS) Policy
Policy Basics
What Rules Are Enabled by Default?
Connectivity over Security Base Policy
Balanced Security and Connectivity Base Policy
Security over Connectivity Base Policy
Maximum Detection Base Policy
Final Thoughts on Base Policies
Rule States
Layers
Private and Shared Layers
A Shared Layer Alternative
The Intrusion Policy Interface
Intrusion Policy Editing
Rule Management
Creating, Importing, Deleting, & Editing a Snort Rule
Firepower Recommendations
Advanced Settings
Policy Layers
Committing Changes
Configuring and Verifying an Intrusion Policy
Verifying Your IPS Policy
Summary
Chapter 13: DNS Policy
Domain Name System (DNS)
The Kill Chain
A Typical Malware Infection
IP Blacklists
The Proxy Problem
The Proxy Solution
DNS Policy Configuration
Summary
Chapter 14: Prefilter
Overview
Prefilter Uses
Policy Creation
Prefilter Rules
Summary
Chapter 15: Network Address Translation (NAT)
What Is Network Address Translation (NAT)?
Types of Network Address Translation
NAT Names
Firepower NAT
Firepower NAT Examples
Firepower Threat Defense (FTD) NAT
Auto NAT or Manual NAT?
Testing and Troubleshooting NAT
NAT Verification
Summary
Chapter 16: Identity Policy
Identity with Firepower
Identity Sources
Non-Authoritative (Traffic-Based Detection)
Authoritative Sources
Realms
Add Realm
Add Directory
User Download
Identity Policy
Implement your Identity Policy
Summary
Chapter 17: User Management
User Preferences
Account Management
Internal vs. External User Authentication
User Privileges
Predefined User Roles
Creating New User Accounts
Creating a Custom User Role
Managing User Role Escalation
Configuring External Authentication
Creating Authentication Objects
Summary
Chapter 18: Advanced Network Analysis
Event Analysis Principles
False Positives
False Negatives
Possible Outcomes
The Goal of Analysis
Intrusion Events
Workflows
The Time Window
Navigating the Analysis Interface
Security Intelligence Events
Security Intelligence Workflows
Security Intelligence Tuning
File and Malware Events
Summary