Course Objectives
Describe how the Cisco Tetration Firewall Agent works to enforce security policy
Describe how to deploy the Cisco Tetration Firewall Agent
Describe how to Manage and Troubleshoot Cisco Tetration Firewall Agent policies
Review administrative and management tasks necessary to operate, support and manage Tetration
Describe how Tetration telemetry data is utilized in the Flows Corpus
Construct effective policies based on discovered flows and Application Dependency Mapping (ADM)
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Cisco Tetration Firewall Agent
- How the Cisco Tetration Firewall Agent Enforces Firewall Rules
- Deploying and Managing Linux Enforcement Agents
- Deploying and Managing Windows Enforcement Agents
- Deploying and Managing AIX Enforcement Agents
2 - Tetration Enforcement Agent Components, Messaging, and Interaction
- Enforcement Front End
- Firewall and Catch-all Rules
- The Preserve Rules Option
- Agent Config Intents
- Stateful Enforcement
3 - Tetration Enforcement Agent UI Configurations and Troubleshooting
- Agent UI Configuration
- Monitoring Agents
- Platform Specific Enforcement Features and Requirements
- Known Limitations
- Troubleshooting Inbound and Outbound Firewall Rules
4 - Tetration Secure Connector, Edge and Ingest Appliances
- Tetration Secure Connector Overview
- Tetration Secure Connector features and configuration
- Tetration Edge Appliance Overview
- Tetration Edge Appliance configuration
- Tetration Ingest Appliance Overview
- Tetration Ingest appliance features and configurations
5 - Application Dependency Mapping
- Application Management Workflow Cycle
- Tetration Application Insight
- ADM Process
- ADM Run Results
- Cluster Confidence
6 - Tetration Policy Analysis
- Enable Policy Analysis
- Live Policy Analysis
- Backdated Policy Experiments
- Quick Policy Analysis
- Diagnosis Using Policy Analysis
7 - Cisco Tetration Analytics Policy Enforcement Overview
- Policy Global Ordering & Conflict Resolution
- Scope Priorities
- Troubleshooting Policy Enforcement
8 - Cisco Tetration Flow Search
- Understanding the Flow Corpus
- Using Scopes to Filter Results
- Searching with Conjunctions
- Correlating Flow Data with Hosts and Processes
- Leveraging Annotations
9 - Using Tetration Forensics
- Forensic Signals
- Configuring Forensics
- Forensics Visualization and Alerts
- ForensicsScoring
- Network and Process Hash Anomaly Detection
10 - Tetration Apps and API
- App Store
- User Apps
- Visualize Data Sources
- Bring your own Data
- OpenAPI