This topic is a chance to discuss more about Firepower Threat Defense (FTD) and its best troubleshooting practices. This session will provide you with a better understanding of the capabilities that FTD offers, which include its superior threat defense and lower cost capabilities. Enhance your security troubleshooting skills and reduce restoration time with tips and recommendations from Cisco Technical Assistance Center (TAC) engineers.
Ask questions from Tuesday, September 19th to Friday 29th , 2017
Aastha Bhardwajhas been an Escalation Engineer in the Firepower TAC team of Cisco Systems at the RTP offices for the past five years. Aastha has over eight years of experience in the Network Security domain. She works with product engineers and customers to resolve complex issues and defects, and also to drive product enhancement. She has created several documents and delivered training to Cisco customers and partners to improve better adoption and operational skills. Aastha holds a CCIE Certification in Security (#46900), as well as the Sourcefire Certified Expert (SFCE#126176) certification. She holds a Bachelor’s Degree in Information Technology from India. In her spare time, she loves to cook and travel around the world.
Dinkar Sharma has been a Customer Support Engineer for the TAC Firewall team at Cisco Systems since February 2012. He has over eight years of experience in the security area and works with the engineering team to facilitate testing on Beta Images. His expertise in security covers technologies and products such as Cisco Adaptive Security Appliance (ASA), Cisco NGFW, Intrusion Prevention System (IPS), and Firepower. Many of the documents he has written are published on cisco.com. Dinkar holds a CCIE Certification in Security (#47755). He holds a Bachelor’s Degree in Computer Science and a Master’s Degree in Marketing Management from Symbiosis University at Pune India.
Aastha and Dinkar might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Contact CenterCommunity
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...