Meraki MX Technical Deep Dive (Module 3) - UTM

Поділитися
Вставка
  • Опубліковано 11 вер 2024

КОМЕНТАРІ • 15

  • @veran6219
    @veran6219 4 роки тому +1

    Hi Fady, great presentation and detailed information - excellent job.

  • @joshxx1
    @joshxx1 5 років тому +1

    Good day , im just watching your videos, and im seeing the options in the inbound outbound rules , i don't have a way to configure inbound , just outbound and in the message below inbound it says ...Inbound traffic will be restricted to the services and forwarding rules configured below.
    Do you know if i have to check something or talk to customer support to have this option enabled.
    I have a mx65w with advanced security
    Thanks.

  • @davidthomason2549
    @davidthomason2549 7 років тому +1

    Is your description of the IPS policies accurate? When working with Firepower devices, there are bigger differences in the security policies than just the size of the database.

  • @sharaqafzaal1546
    @sharaqafzaal1546 2 роки тому

    Awesome

  • @jhonyvoz
    @jhonyvoz 6 років тому

    Fady in the main city is the best practice that MX would be as Layer3 or you have to have a Switch Core as L3? thanks

  • @ahmedarsalan5440
    @ahmedarsalan5440 6 років тому

    I am using a Meraki MX64W appliance which I am trying out but I don't see the option for Threat protection

    • @ahmedarsalan5440
      @ahmedarsalan5440 6 років тому

      Thank you Fady for your quick response
      It seems like I have the enterprise license, and since I have the trial version, maybe for that reason my Advanced Security is not Activated
      MX Advanced Security Not activated

  • @atomiczoom
    @atomiczoom 4 роки тому

    took me so long to realize he was saying " Category" :)

  • @denson877
    @denson877 5 років тому

    is this really a deep dive, i mean i'm no expert but this is very basic stuff.

    • @denson877
      @denson877 5 років тому

      Fady Sharobeem To me it seems you are walking through the features and explaining the basics of what they do. The basics, and more, are well documented by Meraki and can be found in a matter of seconds. The technical deep dive insinuates that we get to look 'under the hood'. Take the IDS/IPS ruleset for example. You say the main difference is the data retention period. The Meraki documentation however states the data retention period for each option is 3 years.
      What i'm more interested in is what the precise difference is between them in order to decide what ruleset to apply.. Looking at the Meraki documentation i see two differences, one being the CVSS score, and the second is the scope (categories). I'm guessing the 'Ruleset - Security' provides the highest level of security since it has a lower detect rate (8+) and broader scope (App-detect). I'm interested in knowing:
      1) I'f there is any noticable effect on throughput
      2) How the App-detect rule can be applied in real world scenario's
      3) What the scope of 'Connectivity' is.
      I hope i'm not being a dick, just seems 'technical deep dive' is misleading.

    • @denson877
      @denson877 5 років тому

      @@FadyNETDecorators Thanks for being so open to feedback. I guess i have a different understanding of the concept deepdive, which frankly could just be personal. The first two modules were spot on for me. Description (quick start and intro) met my expectations for sure. I'm now half way through module 4, and really find the information presented so far very useful. I do hope u keep posting video's since you seem to be a natural at teaching.