Collect NSO NED Trace File
3:22
This video demonstrates the process of configuring NSO NED trace file collection and generating a trace that documents the absence of certain configuration commands. Tags: NSO,NED,trace,logs
Related Videos
In Government
-
Play video Configure FTD High Availability Using Secure Firewall Device Manager (FDM)
Configure FTD High Availability Using Secure Firewall Device Manager (FDM)
This video describes the steps to configure FTD High Availability Using Secure Firewall Device Manager (FDM) Tags: firepower, security
5:42
-
Play video Configure Remote Backup for Cisco Secure Firewall Management Center Using SMB storage
Configure Remote Backup for Cisco Secure Firewall Management Center Using SMB storage
Configure Remote Backup for Cisco Secure Firewall Management Center Using SMB storage
2:52
-
Play video Configure Power Policy on UCS X9508 Chassis
Configure Power Policy on UCS X9508 Chassis
This video describes how to configure Power Policy on UCS X9508 Chassis Tags: portal, cxtacvideos, dcucs https://www.cisco.com/c/en/us/td/docs/unified_computing/Intersight/b_Intersight_Managed_Mode_Configuration_Guide/m-chassis-policies.html
6:57
-
Play video Secure the Use of GenAI Models with Cisco Secure Access
Secure the Use of GenAI Models with Cisco Secure Access
The increased use of AI can increase productivity, but it also introduces new identity, data protection, and legal risks. See how you can enable the productive use of AI while protecting against sensitive data loss or unacceptable use.
1:33
-
Play video Unleashing secure global connectivity in the agentic AI era
Unleashing secure global connectivity in the agentic AI era
Hear from Cisco experts about the challenges service providers face in delivering secure global connectivity in the AI era, and how Agile Services Networking unlocks the ability to offer new services that are easier to monetize.
2:26
-
Play video Enforce ZTNA Policies in the Cloud or On-premise with Cisco Secure Access
Enforce ZTNA Policies in the Cloud or On-premise with Cisco Secure Access
See how to get flexible traffic routing and policy enforcement locations on ZTNA applications to optimized performance and data security See how to get app level control over the traffic routing and policy enforcement location for ZTNA applications.
1:22