SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Cisco® Deploying Cisco® ASA VPN Solutions (VPN)

Duration:
5. Day(s)
Overview:
This course supports network security engineers goals in choosing, configuring, and
troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site-
to-site VPN features to reduce risk to IT infrastructure and its applications.

At Course Completion:
Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN
subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco
ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco
ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced
Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic
and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and
certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters
Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0)
Prerequisite(s) or equivalent knowledge:
   Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1)
   Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2)
   Cisco® Implementing Cisco® IOS Network Security (IINS)


Outline:
  Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying
  Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture
      Deploying Cisco ASA VPN Solutions (VPN)
      Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
      Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN
      Configuration Concepts
  Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Deploying Basic Site-to-Site IPsec VPNs
      Deploying Certificate Authentication in Site-to-Site IPsec VPNs
      Deploying the Cisco IPsec VPN Client
      Deploying Basic Easy VPN Solutions
      Deploying Advanced Authentication in Cisco Easy VPN Solutions
      Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware
      Client
      Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN
      Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site-
      to-Site VPN
      Lab 2-3: Deploying Basic Easy VPN
      Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication
      Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy
      VPN Client
  Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
VPN Solutions
   Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution
   Advanced Deployment of the Cisco AnyConnect VPN Client
   Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs
   Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local
   Password Authentication
   Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA
   Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management
Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN
Solutions
   Deploying a Basic Clientless VPN Solution
   Deploying Advanced Application Access for Clientless SSL VPN
   Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN
   Customizing the Clientless SSL VPN User Interface and Portal
   Lab 4-1: Configuring Basic Clientless VPN Access
   Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs
   Lab 4-3: Customizing the SSL VPN Portal
Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions
   Deploying VPN Authorization, Access Control, and Accounting
   Deploying Cisco Secure Desktop in SSL VPNs
   Deploying Dynamic Access Policies
   Deploying High Availability and High Performance in SSL and IPsec VPNs
   Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters
   Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs
   Lab 5-3: Configuring a Load Balancing SSL VPN Cluster

Weitere ähnliche Inhalte

Mehr von bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
Security+
Security+Security+
Security+bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 

Mehr von bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
Security+
Security+Security+
Security+
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 

Kürzlich hochgeladen

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Kürzlich hochgeladen (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Deploying cisco routers asa vpn solutions

  • 1. Cisco® Deploying Cisco® ASA VPN Solutions (VPN) Duration: 5. Day(s) Overview: This course supports network security engineers goals in choosing, configuring, and troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site- to-site VPN features to reduce risk to IT infrastructure and its applications. At Course Completion: Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0) Prerequisite(s) or equivalent knowledge: Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1) Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2) Cisco® Implementing Cisco® IOS Network Security (IINS) Outline: Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture Deploying Cisco ASA VPN Solutions (VPN) Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN Configuration Concepts Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Deploying Basic Site-to-Site IPsec VPNs Deploying Certificate Authentication in Site-to-Site IPsec VPNs Deploying the Cisco IPsec VPN Client Deploying Basic Easy VPN Solutions Deploying Advanced Authentication in Cisco Easy VPN Solutions Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware Client Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site- to-Site VPN Lab 2-3: Deploying Basic Easy VPN Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy VPN Client Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
  • 2. VPN Solutions Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution Advanced Deployment of the Cisco AnyConnect VPN Client Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local Password Authentication Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN Solutions Deploying a Basic Clientless VPN Solution Deploying Advanced Application Access for Clientless SSL VPN Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN Customizing the Clientless SSL VPN User Interface and Portal Lab 4-1: Configuring Basic Clientless VPN Access Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs Lab 4-3: Customizing the SSL VPN Portal Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions Deploying VPN Authorization, Access Control, and Accounting Deploying Cisco Secure Desktop in SSL VPNs Deploying Dynamic Access Policies Deploying High Availability and High Performance in SSL and IPsec VPNs Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs Lab 5-3: Configuring a Load Balancing SSL VPN Cluster