Security Blogs

Showing results for 
Search instead for 
Did you mean: 

Blog Articles

Demystifying Firepower Deployment Modes

There are two mode of deployments: Firewall ModeIPS Mode For each mode, we have others modes 1.Firewall Mode Router ModeTransparent Mode 2.IPS Mode Inline ModeInline Tap ModePassive Mode The confusion...


Cisco Threat Modeling – Protect, detect, and respond

Is this bad? Are we Affected? How? Over the past two years, cyber-attacks saw a major rise in number and in complexity. As companies shift to digital and cloud-based, IT Systems face higher risks and ...


NAT Translation Use Cases on Firepower Threat Defense

NAT Translation Use Cases on Firepower Threat Defense explained with simple topology Case 1:   Case 2:  Case 3:  Case 4:  Case 5:  Case 6:  Case 7:  Case 8:  Case 9:  Case 10: Case 11:  Cas...


Download Cisco Security Practice Labs

Table of Contents Lab 1: VPNs Site to Site, Remote Access and ZBFLab 2: Zone-Based Firewall Scenario-1Lab 3: Zone-Based Firewall Scenario-2Lab 4: DHCP Snooping and ARP InspectionLab 5: IP source guard...


Understanding BYOD Authorization Policies on Cisco ISE

Authorization Rule 1: BYOD Onboarding and Portal - this rule is used for single-SSID onboarding. It provides authorization when the method of access is wireless_802.1X and the authentication method is...


Cisco ISE and Anomalous Behavior Detection How it works

MAB or MAC Authentication Bypass is a mechanism that allow a non-capable 802.1X to access network by validating the presence or not of the mac address of the device in the local database of Cisco ISE....


What is the Certificate Chain of Trust?

The Chain of Trust refers to your SSL certificate and how it is linked back to a trusted Certificate Authority. In order for an SSL certificate to be trusted it has to be traceable back to the trust r...


Introducing Cisco Secure Firewall Essentials Hub

The Cisco Secure Firewall Essentials hub offers comprehensive guides and documentation to help you start working with the Cisco Secure Firewall. It also includes deep dive into new features, best pra...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Quick Links