Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back. Cisco Certified Design Associate Time 03 Secure call Manager to branch with Iraqi and umbrella scenario. Three. Operational efficiency. I'm your instructor way.
00:12
It is under constant pressure to maintain a network, manage a security risks, connect the new users and devices
00:20
all well, making it easier to executive business objectives
00:24
called Manage. The Solutions provide i t the tour rolls, and the interface is to take the most complicated situations on and make them a easy this system. Iraqi Cloud Manage. The solution provides I T administrators and the efficient platform to deploy secure networks
00:41
across the world in a single click with the troubleshooting tours toe address, network security user issues
00:49
the umbrella that's for provided the visibility into security deployments along with the deep granularity into user behavioral, highlighting potential security frights and a trance. The combination of this easy to use on a powerful interfaces
01:04
allow i t to drastically reduce the time to resolution
01:08
finding and fixing security problems fast preventing catastrophic security breaches and giving I t climb back to focus on the business.
01:19
You know, falling and demonstration. You will see global level troubleshooting network this highlighting the system Iraqi dashboards. Efficiency Global level Troubleshooting security is highlighting the umbrella dashboard efficiency
01:34
level. Troubleshooting is highlighting using a compliant interfaces to reduce the time to resolution of a common problem.
01:44
Okay, let's start lab
01:45
scenario free operational efficiency. Global level troubleshooting network. A key component of the secure Cloud Manager. That branch solution is the operational efficiency of the Iraqi and umbrella interfaces.
02:00
This industry leading called managing the solutions help fine and the fix problems fast
02:06
saving I tee times and money on the matter Gating security risk is that at the same time I did the highest in the level of the Iraqi dashboard provides visibility to all networks no matter the type of the size from your lodgers campus to your smallest, the remote town of worker.
02:23
So from here we go to overview organization
02:28
overview.
02:31
The visibility is traveling on an individual network.
02:36
From here we can check of individual network network on the application Assurance on parental would click on this one of our fine
02:47
Here's the visibility Can't see you.
02:50
Um, Iraqis, world health. We can chart go to a wireless, we go to war, does health to check the worst house that will. Very a powerful, intuitive
03:02
functionality is functionality. Provides a network a wider view All the potential issues in your wireless network on the help pinpoint problem clients. Then we can click on the connection from here.
03:16
So when a user has any show, we click on the link on the number of connections we see the film connections We connected a Ronnie lost a one who can go running off the one we see all the the HCP errors over here
03:32
the intruder. The interviews also IittIe enemy instead Visually tribal on networks way Click on the AP on a dash B R 1-81.
03:45
See what's wrong with their network in real time by giving a visual representation off items like related issues.
03:54
I give you any shoes
03:58
on the poor health switch. Poor health
04:02
on we have a port is the green
04:05
What happened then? We have a report.
04:09
We see the poor is green
04:12
Giving power.
04:15
Uh, we can't re in basket. Never politi by clicking on the location.
04:23
This shows you that politics behind visually is nothing is wrong.
04:28
We can't even see the form where
04:31
so issues update available, you know, could be in a related problem,
04:36
even can dig into the details into the most important that switch port
04:42
in the ports,
04:46
you can see up in comports
04:49
quick on the opting comport.
04:53
So, of course,
04:58
but that idea. Visually, you can see if there's an issue. Oh, whether physical or configuration in ever in their network.
05:06
From here, we see the Vita 40 was important from here,
05:13
something that could take hours or even days to hunt down, leveraging command line. Right.
05:18
And then we move on to global level troubleshooting security. Umbrella as a cloud dashboard provides a high level visibility into the deployment of health of your devices and the activity of the secure users on. Then we'll go to ambarella interfaces,
05:39
no matter what type of end points you connect. Network knows roaming computers are even virtual appliance is, it will be. You can protect it.
05:48
We go to overdo
05:51
umbrella interest after the NS request traffic to verify it about a video of the destination to prevent the Malaysia's attacks from ever entering the network.
06:03
Looking out of the activity, security at a men's came asking a specific security frights.
06:11
So from here,
06:12
all right, we're gonna see. The total request is still the logs in the security blocks.
06:18
There we click of you under total blocks, your activities,
06:25
such as command and controls.
06:29
We can filter it by command and controls
06:31
from here, creek on it,
06:36
then find a quick example. Bond at domaine dot com.
06:46
By determining home a champion whether the attack is using,
06:50
we can click on a global traffic person. Tish,
06:56
on that we can see the person cage of the traffic
07:00
on the whole many users The attack is affecting. They just scroll down to see how many users been affecting.
07:09
See top identities on the recent activities for the Sum
07:15
CSC website.
07:18
Security at a men's can determine if it's a single device or user that is having issues or ah, Laura Global attack on their organization.
07:29
Next, we're gonna move on to a client level troubleshooting. Net word
07:32
idea means air. Constantly reacting to a user demands on making sure their network as systems are working as they expected.
07:43
We go to Morocco, and her face is no
07:48
Iraqi. Inside along, I t too easily examine application behavior. Oh, when a person calls into the help desk will you go to night work wide
08:01
clients
08:05
by using the client search function to quickly find the user. In our case, Joe
08:11
wrong can, uh,
08:13
on there. We can determine his device type in this case is desktop.
08:20
We can determine whether or not in the application of the show he has is due to user error or an application error. We point out to that most absurd green accepted for Sierra
08:35
there's gotta problem right, Bender Veysel law, adding that means to walk up the application details. Just click on it
08:43
to determine the source of it. A problem?
08:48
No. By clicking on this one, you can easy to see that. What the root cause of it,
08:54
whether it's affecting only these user or affecting others. We go to clients from here. We go to clients across our days, client.
09:05
The future.
09:07
We'll see the more clients being affected
09:09
then, based on the never wide application health feel.
09:15
Just click on this. We can take termine. Whether there's a battery application for the user's, the leverage we see the Sierra Me East 44% performance score.
09:28
We have the West still about 99%. Once the better application. Is he used by the end user?
09:35
I can verify the user. Is that having a positive experience?
09:39
We go, you trance. We can go here. We can be Oh, tens.
09:45
We go black. Top of three.
09:48
We have your client. He does.
09:52
Then from here, the IittIe can verify. The usurers is having a positive experience in check.
10:01
99% score
10:05
to the visibility in a tours inside of the Iraqi dashboard.
10:09
Then we move on to crying level troubleshooting security
10:13
within the umbrella dash for security of the means can use the Robin navigation in the umbrella dash more.
10:20
In this case of the century, as has idea of the dynamic access A controlled Iraqi network, we go to Allah. Sentry problem. Here we click on this one
10:33
on to quickly find the distributor's who have a single security Friday. The tournament Ever there is more interesting activity. They should a mask. Eight pills are the users.
10:46
So this is the users.
10:50
Be able this one going on this one.
10:54
Well, you can do
10:56
block it. We see filter back rocket Welcome.
11:03
So once the security and man determines this client is at a high risk they cannot review the information for you know, I'm brown Dash for
11:13
from here they can just copied the ikey address.
11:20
Move back to Iraqi Interface
11:24
Ranch one to go to dynamic control.
11:28
I'm your
11:30
dynamic access control
11:33
from the information we know about the system on the user from the key address we copy it is paste over here
11:43
used the tours of such as a live tours in Iraqi system of manager
11:50
to go to the root of the problem.
11:52
The last two security manager to go to the details over the problem.
12:05
Okay, this end of the demo
12:09
in this demonstration and we discovered global level troubleshooting that were security and Cline novel troubleshooting
12:16
Any questions? Feel free to contact me otherwise L CEO in the next video bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor