Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back. Cisco Certified Design Associate, Demo three. Secure Cloud managed the branch with Iraqi and umbrella. Scenario to security access. I'm your instructor. Wink Users need to be protected and no matter how they connect to Internal called resource is
00:19
the Muraki and umbrella integration
00:21
provides operational efficiency and a tight end. Toa WiFi security through policies for Interros s I. D. S on for individual users by exact shooting consistent the security policy across all connection types, users will be protected by the same policy
00:39
limiting the chance for a security breach
00:43
by leveraging layer to security with bold Muraki i p s I. D. S on the malware protection couples with a consistent policy out of the I P and the D. M s layer from umbrella, your organization will limit a security breaches efficiently and effectively
01:00
saving I t and operational man hours
01:03
a long way. The main tender credibility of your business
01:07
that a bridge is a security vulnerabilities cost the companies millions of dollars per year, but are often difficult employees or maintain the combination of a to call manager disillusions where the real time integration
01:23
reduces the time to deploy the solution and increases the effectiveness
01:29
in a phony and demonstration,
01:30
you will see wireless security policy applied on the S S I d. User level highlighting tight end WiFi security through policy. The details of the AMBARELLA security policy is highlighting the I. P and the D. N s protection provided by umbrella causes tend to policy. Apply it across network. A wide
01:52
awareness on the Roman users is highlighted the power off consistent security policy for all users. Okay, let's start the ***. Oh,
02:00
Security. Controlling the access is another key competent in securing your over organization. The most common way to connect it is it Through y fire Senator Branch one. From here we go. Two dynamic access control
02:20
in this demo, Rocky and Umbrella have created a powerful integration to protect your WiFi users. Through this integration, you can apply no umbrella stick, truly policy toe in terror. SS I d. To protecting. Everyone will connect to it
02:36
From where Leslie go to firewall on traffic. A shaving.
02:39
All right, you go. We hear firewall on traffic is shaping From here we choose the assets I d cinci.
02:49
In our case of the century, I says I d is our corporate s s I d On is a leveraging the baseline security policy umbrella policy
03:00
You can see from baseline Security policy. This is the most restrictive A policy and is applied by default all WiFi users. But sometimes users needed less restriction in order to get their job done.
03:15
Full of keys is that umbrella integration is extended to Iraqi group of policy.
03:21
We can verify that from network. So why don't we go to group of policies?
03:28
Rocky group of policies are applied
03:30
A device level on override access idea rule are a general security policy.
03:38
I can see from here general users leverages the general security umbrella policy.
03:46
We just click on it
03:47
to verify that from here. Or you can see it is leveraging the general security policy from here.
03:57
This was the last restrictive in this way a user. We go, I'm never go wide. We go to Koreans to find a user friends, shorebirds, tapping a friend.
04:12
Sure, Amber This way, user such as friends tremor can connect these a phone these friends schurenberg one which I t wants to restrict down his laptop. This one which needs the last restriction to the same ice s I d.
04:30
You can check at the more recent SS I D
04:35
and see the same mass society. This is normal access
04:41
this. You know, user, there's more restrictive this. Give this some more access over here. Right? Leveraging the group of policy functionality the laptop will have access to specific resource is
04:55
I'm Brad. Lies an incredible, really powerful I p and D. M s protection tool. And the integration allows the UT easily configure that right access for your users.
05:05
We gave after the umbrella to see that
05:10
we go to over veal
05:12
from the manual. We go to select the policies
05:16
on there. We go to all policies to work on that
05:23
on. Uh, here is the baseline. We see the baseline security policy here is it
05:29
Which friends Schubert's fully is using is locked it down from a Malaysia's attack. Security threats on the tightly controlled the white side of home can go too right?
05:41
Go to here.
05:43
Me. We can verify that
05:45
and see security. Those are the actions of restricted right.
05:49
However, friends showing Schubert's laptop is a leveraging the general security policy
05:56
and see the general security policy.
06:00
These policies is still highly secure
06:05
by the is less restrictive that six sites that he can go to
06:10
you ever find that
06:12
you getting jacked from here?
06:15
We have the wireless to define over here,
06:19
So show storage while listed to find here
06:24
this implementation of Iraqi and umbrella integration creates a simple but powerful architecture to protect users where the consolidating the WiFi networks deployed.
06:35
Next it again a show you secure Corporate network, A Y umbrella, and the Muraki can also work together to protect entire network as well.
06:46
We go to Muraki interface.
06:49
We choose the settler branch.
06:54
The leveraging the public ikey addresses information easily in seeing in Rocky's Dashboard
07:00
Go to our playing is the I. P. Address
07:04
in the leverage. From here on, we goto umbrella in her face
07:11
Goto overview.
07:16
I give networks
07:21
and there were name
07:24
center branch
07:26
at a Nike S on ideas layer. By using the same policy
07:31
baseline security policy
07:34
in both of the WiFi integration, a small remote sites became confidently and quickly deploy. New sights knowingly will be secure with the exact the same policy. My click on
07:47
this one.
07:51
Be quick on security
07:54
applied.
07:58
We'll know exactly the same. My policy applied to
08:01
baseline policy
08:03
or the content deciding applied.
08:07
Same. The categories blocking that there is limited US chance to a bridge next week, and I show you a secure incorporated reveal miniatures, the Muraki and umbrella integration along with the network level. Interoperability is great for user's and devices who stay on network.
08:26
But what about when customers leave the corporate offices? This is aware, umbrella roaming client comes in
08:33
umbrella roaming client agent that is directly on the device can protect a user when they leave the network.
08:43
We go to the system. I'm Brad Overview.
08:50
We could go on the roaming clients
08:54
way. Click on Hank Aaron A. Siskel called gov dot com.
09:03
The created is a thing about days ISS. You can celebrity the same umbrella policy we have been discussing in this one. They're using the same policy. See, it is a baseline security policy,
09:20
so this means you can have a single I'm brown, a policy that seeks your your wife. I wan roaming clients. I know your users and devices are connected no matter where or how you connected.
09:33
Here's the identity. We have a subtler branch, Mom
09:39
cinci that I make access control. Wireless roaming computers on a San Chee. They're applying the same policy Over here.
09:50
There's an ID. A scenario too.
09:52
Summary in this demonstration we've discovered.
09:56
Where are his security policy? Applied on the S s i. D and a user level.
10:01
The details of the umbrella security policy Consistent policy applied across network Allied harness on our rooming users.
10:11
Any questions? Feel free to contact me. Otherwise I'll see you in the next video. Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor