Coconote
AI notes
AI voice & video notes
Try for free
🔒
Key Points from Secure Internet Access Webinar
Apr 1, 2025
📄
View transcript
🃏
Review flashcards
Secure Internet Access Webinar Notes
Introduction
Host:
Juan
Focus:
Secure Internet Access (SIA)
Agenda:
Introduction to secure access
Differences between package options
SIA components and configuration
Live demo
Q&A session
Technical Setup
Use the Q&A feature for questions.
Specialists available to answer during the webinar.
Overview of Secure Access
Security Service Edge (SSE):
Key for hybrid work strategies.
Post-pandemic:
Increased remote work makes security crucial.
Traffic Monitoring:
SSE acts as a security intermediary for both public and private traffic.
Packages Overview
Data Sheet:
Provides a detailed chart with differences between packages.
Advanced Features:
Layer 7 Cloud Delivered Firewall
IPS Protection
DLP and more.
Integration into Network Environment
Cloud-Based Solution:
Facilitates security without user intervention.
Utilizes umbrella component, CASB, zero trust, etc.
Public & Private Traffic Protection:
Secure Private Access: Zero trust principle for private resources.
Secure Internet Access: Works like Umbrella for public traffic.
Secure Internet Access Workflow
Traffic Sources:
Endpoint software on devices
VPN sessions using Secure Client AnyConnect
Configuration with IPSEC tunnels
Traffic Processing:
Encrypts, inspects, and sanitizes traffic.
Provides Internet as a Service.
Components of Secure Internet Access Rules
Elements:
Rule Name and Priority
Traffic Sources and Destinations
Actions: Allow, Block, Warn, Isolate
Web Profile for specific security configurations
Secure Internet Access Rule Configuration
Source Configuration:
Active Directory, IPSEC Tunnels
Destination Configuration:
Domains, IPs, Content Categories
Action Configuration:
Default: Everything allowed, recommend focusing on blocking.
Web Profile:
SSL Decryption, authentication, threat categories
Demo Overview
Objective:
Configure Secure Internet Access rule for traffic protection.
Steps:
Configure IPSEC Tunnel
Establish Internal Network and bind to IPSEC Tunnel
Configure Destinations and Security Categories
Deploy Web Profile with SSL settings
Secure Client Setup
Off-Premises Protection:
Download and install Cisco Secure Client
Enable web security for roaming devices
Activity Monitoring
Dashboard:
Access logs and activity search.
Log Management:
Review DNS and web traffic logs.
Resources
Documentation Site:
docs.ss.cisco.com
Service Status Portal
Data Sheet and Release Notes
Final Q&A
Feedback Request:
Complete survey upon exiting.
Promotion:
Future webinar on Secure Private Access.
Closing Remarks
Contact:
Questions addressed via email if not covered.
Feedback and Improvement:
Welcomed and encouraged.
📄
Full transcript