Hello. Welcome back. Cisco Certified Design Associate, Demo three. Secure Cloud managed the branch with Iraqi and umbrella. Scenario to security access. I'm your instructor. Wink Users need to be protected and no matter how they connect to Internal called resource is
the Muraki and umbrella integration
provides operational efficiency and a tight end. Toa WiFi security through policies for Interros s I. D. S on for individual users by exact shooting consistent the security policy across all connection types, users will be protected by the same policy
limiting the chance for a security breach
by leveraging layer to security with bold Muraki i p s I. D. S on the malware protection couples with a consistent policy out of the I P and the D. M s layer from umbrella, your organization will limit a security breaches efficiently and effectively
saving I t and operational man hours
a long way. The main tender credibility of your business
that a bridge is a security vulnerabilities cost the companies millions of dollars per year, but are often difficult employees or maintain the combination of a to call manager disillusions where the real time integration
reduces the time to deploy the solution and increases the effectiveness
in a phony and demonstration,
you will see wireless security policy applied on the S S I d. User level highlighting tight end WiFi security through policy. The details of the AMBARELLA security policy is highlighting the I. P and the D. N s protection provided by umbrella causes tend to policy. Apply it across network. A wide
awareness on the Roman users is highlighted the power off consistent security policy for all users. Okay, let's start the ***. Oh,
Security. Controlling the access is another key competent in securing your over organization. The most common way to connect it is it Through y fire Senator Branch one. From here we go. Two dynamic access control
in this demo, Rocky and Umbrella have created a powerful integration to protect your WiFi users. Through this integration, you can apply no umbrella stick, truly policy toe in terror. SS I d. To protecting. Everyone will connect to it
From where Leslie go to firewall on traffic. A shaving.
All right, you go. We hear firewall on traffic is shaping From here we choose the assets I d cinci.
In our case of the century, I says I d is our corporate s s I d On is a leveraging the baseline security policy umbrella policy
You can see from baseline Security policy. This is the most restrictive A policy and is applied by default all WiFi users. But sometimes users needed less restriction in order to get their job done.
Full of keys is that umbrella integration is extended to Iraqi group of policy.
We can verify that from network. So why don't we go to group of policies?
Rocky group of policies are applied
A device level on override access idea rule are a general security policy.
I can see from here general users leverages the general security umbrella policy.
We just click on it
to verify that from here. Or you can see it is leveraging the general security policy from here.
This was the last restrictive in this way a user. We go, I'm never go wide. We go to Koreans to find a user friends, shorebirds, tapping a friend.
Sure, Amber This way, user such as friends tremor can connect these a phone these friends schurenberg one which I t wants to restrict down his laptop. This one which needs the last restriction to the same ice s I d.
You can check at the more recent SS I D
and see the same mass society. This is normal access
this. You know, user, there's more restrictive this. Give this some more access over here. Right? Leveraging the group of policy functionality the laptop will have access to specific resource is
I'm Brad. Lies an incredible, really powerful I p and D. M s protection tool. And the integration allows the UT easily configure that right access for your users.
We gave after the umbrella to see that
we go to over veal
from the manual. We go to select the policies
on there. We go to all policies to work on that
on. Uh, here is the baseline. We see the baseline security policy here is it
Which friends Schubert's fully is using is locked it down from a Malaysia's attack. Security threats on the tightly controlled the white side of home can go too right?
Go to here.
Me. We can verify that
and see security. Those are the actions of restricted right.
However, friends showing Schubert's laptop is a leveraging the general security policy
and see the general security policy.
These policies is still highly secure
by the is less restrictive that six sites that he can go to
you ever find that
you getting jacked from here?
We have the wireless to define over here,
So show storage while listed to find here
this implementation of Iraqi and umbrella integration creates a simple but powerful architecture to protect users where the consolidating the WiFi networks deployed.
Next it again a show you secure Corporate network, A Y umbrella, and the Muraki can also work together to protect entire network as well.
We go to Muraki interface.
We choose the settler branch.
The leveraging the public ikey addresses information easily in seeing in Rocky's Dashboard
Go to our playing is the I. P. Address
in the leverage. From here on, we goto umbrella in her face
I give networks
and there were name
at a Nike S on ideas layer. By using the same policy
baseline security policy
in both of the WiFi integration, a small remote sites became confidently and quickly deploy. New sights knowingly will be secure with the exact the same policy. My click on
Be quick on security
We'll know exactly the same. My policy applied to
or the content deciding applied.
Same. The categories blocking that there is limited US chance to a bridge next week, and I show you a secure incorporated reveal miniatures, the Muraki and umbrella integration along with the network level. Interoperability is great for user's and devices who stay on network.
But what about when customers leave the corporate offices? This is aware, umbrella roaming client comes in
umbrella roaming client agent that is directly on the device can protect a user when they leave the network.
We go to the system. I'm Brad Overview.
We could go on the roaming clients
way. Click on Hank Aaron A. Siskel called gov dot com.
The created is a thing about days ISS. You can celebrity the same umbrella policy we have been discussing in this one. They're using the same policy. See, it is a baseline security policy,
so this means you can have a single I'm brown, a policy that seeks your your wife. I wan roaming clients. I know your users and devices are connected no matter where or how you connected.
Here's the identity. We have a subtler branch, Mom
cinci that I make access control. Wireless roaming computers on a San Chee. They're applying the same policy Over here.
There's an ID. A scenario too.
Summary in this demonstration we've discovered.
Where are his security policy? Applied on the S s i. D and a user level.
The details of the umbrella security policy Consistent policy applied across network Allied harness on our rooming users.
Any questions? Feel free to contact me. Otherwise I'll see you in the next video. Bye for now.
Cisco Certified Network Associate (CCNA) Certification
Our online, self-paced Cisco Certified Network Associate CCNA training teaches students to install, configure, troubleshoot ...
31 CEU/CPE Hours Available
Certificate of Completion Offered
Network Fundamentals Using GNS3
This course will enable students to install and configure a basic GNS3 network lab that ...
2 CEU/CPE Hours Available
Certificate of Completion Offered