Hello. Welcome back. Cisco Certified Design Associate Time 03 Secure call Manager to branch with Iraqi and umbrella scenario. Three. Operational efficiency. I'm your instructor way.
It is under constant pressure to maintain a network, manage a security risks, connect the new users and devices
all well, making it easier to executive business objectives
called Manage. The Solutions provide i t the tour rolls, and the interface is to take the most complicated situations on and make them a easy this system. Iraqi Cloud Manage. The solution provides I T administrators and the efficient platform to deploy secure networks
across the world in a single click with the troubleshooting tours toe address, network security user issues
the umbrella that's for provided the visibility into security deployments along with the deep granularity into user behavioral, highlighting potential security frights and a trance. The combination of this easy to use on a powerful interfaces
allow i t to drastically reduce the time to resolution
finding and fixing security problems fast preventing catastrophic security breaches and giving I t climb back to focus on the business.
You know, falling and demonstration. You will see global level troubleshooting network this highlighting the system Iraqi dashboards. Efficiency Global level Troubleshooting security is highlighting the umbrella dashboard efficiency
level. Troubleshooting is highlighting using a compliant interfaces to reduce the time to resolution of a common problem.
Okay, let's start lab
scenario free operational efficiency. Global level troubleshooting network. A key component of the secure Cloud Manager. That branch solution is the operational efficiency of the Iraqi and umbrella interfaces.
This industry leading called managing the solutions help fine and the fix problems fast
saving I tee times and money on the matter Gating security risk is that at the same time I did the highest in the level of the Iraqi dashboard provides visibility to all networks no matter the type of the size from your lodgers campus to your smallest, the remote town of worker.
So from here we go to overview organization
The visibility is traveling on an individual network.
From here we can check of individual network network on the application Assurance on parental would click on this one of our fine
Here's the visibility Can't see you.
Um, Iraqis, world health. We can chart go to a wireless, we go to war, does health to check the worst house that will. Very a powerful, intuitive
functionality is functionality. Provides a network a wider view All the potential issues in your wireless network on the help pinpoint problem clients. Then we can click on the connection from here.
So when a user has any show, we click on the link on the number of connections we see the film connections We connected a Ronnie lost a one who can go running off the one we see all the the HCP errors over here
the intruder. The interviews also IittIe enemy instead Visually tribal on networks way Click on the AP on a dash B R 1-81.
See what's wrong with their network in real time by giving a visual representation off items like related issues.
I give you any shoes
on the poor health switch. Poor health
on we have a port is the green
What happened then? We have a report.
We see the poor is green
Uh, we can't re in basket. Never politi by clicking on the location.
This shows you that politics behind visually is nothing is wrong.
We can't even see the form where
so issues update available, you know, could be in a related problem,
even can dig into the details into the most important that switch port
in the ports,
you can see up in comports
quick on the opting comport.
So, of course,
but that idea. Visually, you can see if there's an issue. Oh, whether physical or configuration in ever in their network.
From here, we see the Vita 40 was important from here,
something that could take hours or even days to hunt down, leveraging command line. Right.
And then we move on to global level troubleshooting security. Umbrella as a cloud dashboard provides a high level visibility into the deployment of health of your devices and the activity of the secure users on. Then we'll go to ambarella interfaces,
no matter what type of end points you connect. Network knows roaming computers are even virtual appliance is, it will be. You can protect it.
We go to overdo
umbrella interest after the NS request traffic to verify it about a video of the destination to prevent the Malaysia's attacks from ever entering the network.
Looking out of the activity, security at a men's came asking a specific security frights.
So from here,
all right, we're gonna see. The total request is still the logs in the security blocks.
There we click of you under total blocks, your activities,
such as command and controls.
We can filter it by command and controls
from here, creek on it,
then find a quick example. Bond at domaine dot com.
By determining home a champion whether the attack is using,
we can click on a global traffic person. Tish,
on that we can see the person cage of the traffic
on the whole many users The attack is affecting. They just scroll down to see how many users been affecting.
See top identities on the recent activities for the Sum
Security at a men's can determine if it's a single device or user that is having issues or ah, Laura Global attack on their organization.
Next, we're gonna move on to a client level troubleshooting. Net word
idea means air. Constantly reacting to a user demands on making sure their network as systems are working as they expected.
We go to Morocco, and her face is no
Iraqi. Inside along, I t too easily examine application behavior. Oh, when a person calls into the help desk will you go to night work wide
by using the client search function to quickly find the user. In our case, Joe
wrong can, uh,
on there. We can determine his device type in this case is desktop.
We can determine whether or not in the application of the show he has is due to user error or an application error. We point out to that most absurd green accepted for Sierra
there's gotta problem right, Bender Veysel law, adding that means to walk up the application details. Just click on it
to determine the source of it. A problem?
No. By clicking on this one, you can easy to see that. What the root cause of it,
whether it's affecting only these user or affecting others. We go to clients from here. We go to clients across our days, client.
We'll see the more clients being affected
then, based on the never wide application health feel.
Just click on this. We can take termine. Whether there's a battery application for the user's, the leverage we see the Sierra Me East 44% performance score.
We have the West still about 99%. Once the better application. Is he used by the end user?
I can verify the user. Is that having a positive experience?
We go, you trance. We can go here. We can be Oh, tens.
We go black. Top of three.
We have your client. He does.
Then from here, the IittIe can verify. The usurers is having a positive experience in check.
to the visibility in a tours inside of the Iraqi dashboard.
Then we move on to crying level troubleshooting security
within the umbrella dash for security of the means can use the Robin navigation in the umbrella dash more.
In this case of the century, as has idea of the dynamic access A controlled Iraqi network, we go to Allah. Sentry problem. Here we click on this one
on to quickly find the distributor's who have a single security Friday. The tournament Ever there is more interesting activity. They should a mask. Eight pills are the users.
So this is the users.
Be able this one going on this one.
Well, you can do
block it. We see filter back rocket Welcome.
So once the security and man determines this client is at a high risk they cannot review the information for you know, I'm brown Dash for
from here they can just copied the ikey address.
Move back to Iraqi Interface
Ranch one to go to dynamic control.
dynamic access control
from the information we know about the system on the user from the key address we copy it is paste over here
used the tours of such as a live tours in Iraqi system of manager
to go to the root of the problem.
The last two security manager to go to the details over the problem.
Okay, this end of the demo
in this demonstration and we discovered global level troubleshooting that were security and Cline novel troubleshooting
Any questions? Feel free to contact me otherwise L CEO in the next video bye for now.