Solved

Firewall Configuration Video

Posted on 2013-06-24
3
761 Views
Last Modified: 2013-07-02
Hello Experts,
I am looking for some videos for configuring firewall (Cisco,Junier,Cyberoam). There are videos on internet about how to setup Exchange server,Active Directory,etc but I have never find a video relating to firewall configuration. Trainsignal and cbtnuggets has many videos where they show how to configuring above in the live environment. I am looking for similar videos for firewall configuration.
Regards.
0
Comment
Question by:ibu1
  • 2
3 Comments
 
LVL 23

Accepted Solution

by:
tailoreddigital earned 500 total points
ID: 39272261
0
 
LVL 12

Author Comment

by:ibu1
ID: 39273823
Hello,
I forgot to mention not to include youtube videos as solutions. I have already seen these youtube videos. I need something like trainsignal in which the training are based on the need of the company. The similar example is how it shows how to install exchange server and their in house migration,etc. I am in need of similar videos.
0
 
LVL 12

Author Comment

by:ibu1
ID: 39286727
Hello,
There is no video on internet which show real scenario firewall configuration.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
File Sharing Using Windows 2012 Server 12 90
ASA Shunning internal IP 10 37
Migrate Cisco ASA 5510 and 5515 K9? 12 64
Stand Alone IT Service Provison 2 49
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now