Firepower Threat Defense (FTD) by Arash Deljoo

Cisco Firepower ( More topics will add )

Ratings: 4.91 / 5.00




Description

Cisco Firepower Threat Defense (FTD) is an integrative software image combining CISCO ASA and FirePOWER feature into one hardware and software inclusive system. Cisco is a pioneer in the Next Generation Firewall Vendors, where competitors are limited to single platforms. Cisco Firepower Threat Defense (FTD) unified image software is available in stable release or beta.

So basically ASA with FTD image is not an ASA with FirePOWER. When the FTD image is used there is a single compiled image and not the separate ASA software with FirePOWER software running in a module. there is only FTD software which can be managed through Cisco FMC a single management console to manage an entire platform.

Cisco FTD recognizes various applications and can be used to filter or monitor the applications and prevents malicious content from masquerading as a legitimate application.

Features include URL filtering, cloud-based sandboxing and malware protection, as well as integration with endpoint security, network traffic analysis, web gateway, email security, and network access control.

The Cisco Firepower™ Next-Generation Firewall (NGFW) is the industry's first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, and advanced malware protection from the network to the endpoint.

What You Will Learn!

  • Evolution of Next-Generation Firewall
  • Cisco Firepower History
  • Firepower Threat Defense (FTD)
  • Cisco Secure Firewall Solutions
  • Managing Firepower
  • The FTD Management Interface
  • Routed Firewall - Static IP Address Assignment
  • Firepower Licenses
  • Routed Firewall - Dynamic IP Address Assignment with DHCP
  • Routed Firewall - IPv4 Static Routing
  • Routed Firewall - IPv6 Static Routing
  • Routed Firewall - RIPv2
  • Routed Firewall - OSPFv2
  • Transparent Firewall - BVI Configuration
  • Transparent Firewall - Access Control Policy Based on Network Address
  • Transparent Firewall - Access Control Policy Based on Port
  • Blocking Traffic Using Inline Interface Mode Concept
  • Blocking Traffic Using Inline Interface Mode Configuration
  • IPS - Inline Mode
  • Capturing Traffic from a Firepower Engine
  • Capturing Traffic from a Firewall Engine
  • Capturing Traffic from the FMC
  • Verification and Troubleshooting Tools
  • Inspecting Traffic without Blocking It
  • Handling Encapsulated Traffic

Who Should Attend!

  • Network Administrators
  • Security Administrators
  • Network Support Engineers