Sep
01
This week enjoy free courses and training demos covering topics relevant to securing your personal and business networks. Lead by professionals from INE and eLearnSecurity, this training provides hands-on, interactive instruction which will allow for easier understanding and implementation of concepts.  Read More
Jul
09
Palo Alto Firewall Essentials, led by INE expert instructor Piotr Kaluzny, is now available. Read More
Aug
25
The first portion of INE's new CCIE Security Advanced Technologies Class for the 3.0 blueprint is now available in both streaming and download formats.  Subscribers to the All Access Pass already have access to this new course, and can upgrade to the download version for $159.  Non-subscribers can purchase the standalone download for $299, or subscribe to the AAP for just $159 per month.  Customers who have access to previous versions of the CCIE Security ATC will get access to the new... Read More
Aug
09
INE is proud to announce the upcoming release of our new CCIE Security Advanced Technologies Class and CCIE Security 5-Day Bootcamp. The 5-Day Bootcamp will be available in streaming and download format starting this weekend, followed shortly by the Advanced Technologies class. Both of these video series are included with the All Access Pass subscriptions, or can be purchased as standalone downloads.  Samples of both classes are available below. Read More
Jun
23
INE is proud to announce the upcoming release of the following new additions to our All Access Pass Video-on-Demand library: Read More
Sep
25
After returning from vacation, Bob (the optimistic firewall technician) decided that he wanted to take some time and get a little bit more familiar with firewall configuration. He was able to get permission to use some spare equipment for practice.   Read More
Apr
19
Modular Policy Framework (MPF) configuration defines set of rules for applying firewall features, such as traffic inspection, QoS etc. to the traffic transiting the firewall. MPF has many similarities to MQC (Modular QoS CLI) syntax found in Cisco IOS, but there are some major differences in the flow of operations, even though many commands look the same. The following post assumes basic understanding of ASA firewall and its configuration. It covers the basic logic of the MPF, but does not go... Read More
Jan
10
I. Security Fundamentals a. Why Needed? i. A closed network allows no connection to a public network; although security is still an issue due to a majority of attacks coming from inside networks today Read More
Sep
29
As I am sure you have already seen from the blog on setting up the security device as a Layer 2 device, there are many interesting changes that occur on a PIX or ASA when configured for transparent operations. This blog highlights the major changes and guidelines that you should keep in mind when you opt for this special mode of operation. Read More
Sep
28
This blog will examine the basic setup of the transparent firewall feature available with the PIX and the ASA. This blog was based on the PIX-525 running 7.2(4) code with a Restricted license in GNS3. Here is the topology that was used: Read More

Subscribe to INE Blog Updates

New Blog Posts!