About
Professional History
Topics
ASA
AMP
Career
Cisco DNA
CCIE Security v5
Firepower
Identity Services Engine
Labbing
Microsoft Server
Netflow
Nexus 1000v
pxGrid
Training Reviews
Splunk
Stealthwatch
Tetration
TrustSec
VPN
Video Training
Web Security Appliance
Blog
Contact
Social Media
LinkedIn
Twitter
Links

Networking fun

About
Professional History
Topics
ASA
AMP
Career
Cisco DNA
CCIE Security v5
Firepower
Identity Services Engine
Labbing
Microsoft Server
Netflow
Nexus 1000v
pxGrid
Training Reviews
Splunk
Stealthwatch
Tetration
TrustSec
VPN
Video Training
Web Security Appliance
Blog
Contact
Social Media
LinkedIn
Twitter
Links
server-at-night-1199726.jpg

Blog

Katherine McNamara
March 20, 2019

Installing Splunk on Ubuntu

Katherine McNamara
March 20, 2019

In this video, we will go through the installation of Splunk on Ubuntu

Tagged: Videos

1 Comment
Katherine McNamara
March 19, 2019

Firepower Intrusion Tuning

Katherine McNamara
March 19, 2019

In this video, we’re going to dig into policy layers, tuning, event suppression, and dynamic rule changes in Firepower.

Tagged: Videos

2 Comments
Katherine McNamara
March 19, 2019

Overview of Stealthwatch Operations

Katherine McNamara
March 19, 2019

In this video, I’m going to walk through the Stealthwatch WebUI and touch on the swing client a little.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Defining Custom Applications inside Stealthwatch

Katherine McNamara
March 18, 2019

This is just a quick video talking about how we could define custom applications inside of Stealthwatch

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Active Directory Integration with Stealthwatch

Katherine McNamara
March 18, 2019

In this video, we're going to be integrating Active Directory with Stealthwatch. You may think you know what this means but it's not IP-to-User binding. Check out the video for more detail.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Stealthwatch and ISE Integration via pxGrid - Part 2

Katherine McNamara
March 18, 2019

In this video, we continue our pxGrid configuration to perform rapid threat containment between ISE and Stealthwatch

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Stealthwatch and ISE Integration via pxGrid - Part 1

Katherine McNamara
March 18, 2019

In this video, we're going to integrate ISE and Stealthwatch via pxGrid and share contextual information. Part 2 will dig into configuring adaptive network control with Stealthwatch and ISE.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Configuring SNMP for Exporters on Stealthwatch

Katherine McNamara
March 18, 2019

In this video, we’re going to configure SNMP for the exporters on Stealthwatch. While it might not seem like a big deal, this will help with ensuring that the interface names and speeds are correctly showing in the Stealthwatch Management Console.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Configuring ETA on Routers

Katherine McNamara
March 18, 2019

This is going to be a really short video. I’m going to walk through the configuration of ETA on my CSR1000v. As of IOS-XE version 16.6.2, support for ETA was added on ISR and CSR routers.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Configuring Netflow and Encrypted Threat Analytics on the Catalyst 9K

Katherine McNamara
March 18, 2019

In this video, we’re going to be configuring Netflow and ETA on the Catalyst 9K. After we’ve completed that, we’ll do a little walkthrough of Cognitive Threat Analytics and ETA.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Catalyst 9300 Switch IOS Upgrade

Katherine McNamara
March 18, 2019

In this video, I'm just upgrading my Catalyst 9300 and looking at some basic syntax changes. It's not a security video but I figured I'd record it anyways.


Tagged: Videos

5 Comments
Katherine McNamara
March 18, 2019

FTD Netflow Configuration for Stealthwatch

Katherine McNamara
March 18, 2019

In this video, we’ll be going to be configuring Netflow on FTD for Stealthwatch


Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Router Netflow Configuration for Stealthwatch

Katherine McNamara
March 18, 2019

In this video, we’ll be going over the configuration of Netflow on my router for Stealthwatch.

Tagged: Videos

Comment
Katherine McNamara
March 18, 2019

Switch Netflow Configuration for Stealthwatch

Katherine McNamara
March 18, 2019

In this video, I'm going to be configuring my switches with a compatible Netflow configuration for Stealthwatch

Tagged: Videos

2 Comments
Katherine McNamara
March 17, 2019

Overview of Stealthwatch Policies and Use Cases

Katherine McNamara
March 17, 2019

In this video, I'll be exploring some of the uses of Stealthwatch and going over the security policy.

Tagged: Videos

Comment
Katherine McNamara
March 17, 2019

Stealthwatch 7.0 Appliance Administration

Katherine McNamara
March 17, 2019

In this video, we’ll be going over how appliance administration is different in Stealthwatch 7.0 and the new apps feature in Stealthwatch.

Tagged: Videos

Comment
Katherine McNamara
March 17, 2019

Installing Stealthwatch 7.0

Katherine McNamara
March 17, 2019

In this video, I'll go over the components of Stealthwatch and install both the Steathwatch Management Console and Flowcollector in my lab.

Tagged: Videos

Comment
Katherine McNamara
March 17, 2019

ISE 2.6 Policy Sets & Using Network Device Groups

Katherine McNamara
March 17, 2019

It’s been awhile since I updated my blog and videos. I know there’s been a lot of changes to Cisco Security products. Since I have to rebuild my lab anyways, I wanted to update some of these posts and videos. Expect a lot more videos coming from me over the course of the next few weeks.

Tagged: Videos

4 Comments
Katherine McNamara
November 11, 2018

Tetration - Forensics and Alerts

Katherine McNamara
November 11, 2018

Since Tetration has visibility both inside the endpoint and the traffic flowing through the network, it gives us some amazing forensic analysis capabilities. In this post, we will review some of these powerful capabilities but this is far from all of the forensic features in Tetration.

Tagged: Tetration

2 Comments
Katherine McNamara
November 11, 2018

Tetration - Policy Analysis

Katherine McNamara
November 11, 2018

Before making any policy changes, one usually would want to be able to analyze how it would impact traffic. Tetration has the ability to simulate and validate policy before applying changes using its Policy Analysis feature.

Tagged: Tetration

Comment
Newer Posts
Older Posts

RSS Feed

  • July 2020 1
  • April 2020 3
  • March 2020 10
  • November 2019 6
  • October 2019 5
  • May 2019 1
  • April 2019 3
  • March 2019 34
  • November 2018 8
  • May 2018 1
  • October 2017 7
  • July 2017 12
  • May 2017 2
  • April 2017 7
  • March 2017 3
  • February 2017 17
  • January 2017 4
  • August 2016 12
  • July 2016 1
  • June 2016 4
  • May 2016 11
  • April 2016 1
  • January 2016 4
  • December 2015 16
  • AMP
  • AnyConnect
  • ASA
  • Career
  • CCIE Security
  • DNA
  • Firepower
  • ISE
  • Lab
  • NetFlow
  • Nexus 1000v
  • Posture
  • pxGrid
  • Review
  • Server
  • Splunk
  • StealthWatch
  • Tetration
  • TrustSec
  • Videos
  • VPN
  • WSA
Back to Top