New Skills

New Training: Implement Advanced Security Features with Meraki MX Firewalls

by Team Nuggets
New Training: SD-Access Automation with DNA Center Platform picture: A
Follow us
Published on March 2, 2021

In this 6-video skill, CBT Nuggets trainer Knox Hutchinson teaches you how to deploy security features from the Meraki cloud dashboard. Learn how to configure Layer 3 and Layer 7 firewall rules on a Meraki MX next-generation firewall (NGFW). Gain an understanding of inbound NAT and PAT, AMP, IDS, IPS, and content filtering. Watch this new Cisco training.

Learn Cisco with one of these courses:

This training includes:

  • 6 videos

  • 15 minutes of training

You’ll learn these topics in this skill:

  • The Intelligent Firewall

  • Layer 3 Firewall Configuration

  • Layer 7 Firewall Configuration

  • Inbound Firewall Rules

  • Threat Protection and Content Filtering

  • Summarizing Meraki Firewall Features

Layer 3 vs Layer 7 Firewalls: What’s the Difference?

Today, there are two primary strategies for monitoring, passing, and removing data as it passes through a firewall. Categorized into Layer 3 (Network Firewalls), and Layer 7 (Application Firewalls), these firewall configurations work at different transportation layers to determine what data is permissible to enter a given network.

Layer 3 Firewalls or the Network Firewall is designed to permit data transmission based on IP Address, port number, and service protocols. This firewall protocol is designed to accept traffic from certain IPs known as whitelisting and blocking other IPs known as blacklisting.

Layer 7 Firewalls or Application Firewalls permit data transmission through the firewall based on the application that is sending that data. For example, Layer 7 Firewalls may permit communication via a deemed safe application and deny application communication such as SQL injections.

As organizations look to maximize their network's security, it's often both the use of Layer 3 and Layer 7 Firewalls working in tandem that mitigate malicious attacks in the most effective manner.


Download

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.


Don't miss out!Get great content
delivered to your inbox.

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522