SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Cisco® Deploying Cisco® ASA Firewall Features (FIREWALL)

Duration:
 5Day(s)
Overview:
This course provides network security engineers with the knowledge and skills needed to
implement and maintain Cisco ASA adaptive security appliance-based perimeter solutions.

At Course Completion:
Skills the Student will Learn - Implement and maintain basic Cisco ASA adaptive security
appliance connectivity and device management plane features. - Implement and maintain data
plane access control features of the Cisco ASA adaptive security appliance product family. -
Implement and maintain Cisco ASA adaptive security appliance features that integrate it with the
local and global routing and switching infrastructure. - Implement and maintain Cisco ASA
adaptive security appliance virtualization and high availability features. - Evaluate Cisco ASA
adaptive security appliance SSM modules, their major features, and integrate them with the Cisco
ASA adaptive security appliance. Technical Features of the Course - Cisco ASA Adaptive Security -
Application-layer policies - Advanced access controls - NAT - Security appliance failover
Certification FIREWALL v1.0 is part of the CCNP Security track (FIREWALL v1.0 exam is 642-617
FIREWALL v1.0)
Prerequisite(s) or equivalent knowledge:
   Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1)
   Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2)
   Cisco® Implementing Cisco® IOS Network Security (IINS)
Prerequisite Comments:
   The knowledge and skills that a learner must have before attending this course: • Cisco
   Certified Network Associate (CCNA) certification or equivalent knowledge. • Cisco Certified
   Network Associate Security (CCNA Security) certification or equivalent knowledge. • Working
   knowledge of the Microsoft Windows operating system


Outline:
  Lesson 1: Introducing the Cisco ASA Adaptive Security Appliance
      Introducing Cisco ASA Adaptive Security Appliance Technology and Features
      Introducing the Cisco ASA Adaptive Security Appliance Family
  Lesson 2: Implementing Basic Connectivity and Device Management
      Getting Started with the Cisco ASA Adaptive Security Appliance and Cisco ASDM
      Configuring Interfaces and Static Routing
      Configuring Basic Device Management Features
      Configuring Management Access
      Lab 2-1: Configuring Basic Connectivity
Lab 2-2: Configuring Management Features
Lesson 3: Deploying Cisco ASA Adaptive Security Appliance Access Control Features
   Configuring Basic Access Control
   Using Cisco ASA Adaptive Security
   Appliance Modular Policy Framework
   Tuning Basic Stateful Inspection Features
   Appliance Stateful Inspection Features
   Configuring Application-Layer Policies
   Configuring Advanced Access Controls
   Configuring Resource Limits and Guarantees
   Configuring User-Based Policies (Cut-Through Proxy)
   Lab 3-1: Configuring Basic Access Control
   Lab 3-2: Tuning Basic Cisco ASA Adaptive Security
   Lab 3-3: Configuring Application-Layer Policies
   Lab 3-4: Configuring Advanced Access Controls
   Lab 3-5: Configuring User-Based Policies (Cut-Through Proxy)
Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Network Integration Features
   Deploying Network Address Translation
   Configuring Cisco ASA Adaptive Security Appliance Transparent Operation
   Lab 4-1: Configuring Cisco ASA Adaptive Security Appliance NAT
   Lab 4-2: Configuring Transparent Firewall Mode
Lesson 5: Deploying Cisco ASA Adaptive Security Appliance Virtualization and High
Availability Features
   Deploying Cisco ASA Adaptive Security Appliance Virtualization Features
   Deploying Cisco ASA Adaptive Security Appliance Redundant Interfaces
   Deploying Active/Standby High Availability Failover
   Deploying Active/Active High Availability Failover
   Lab 5-1: Deploying a Cisco ASA Adaptive Security Appliance Active/Standby Failover
   Lab 5-2: Deploying a Cisco ASA Adaptive Security Appliance Active/Active Failover
Lesson 6: Integrating Cisco ASA Adaptive Security Appliance Security Service Modules
   Introduction to Cisco ASA Adaptive Security Appliance Security Service Modules
   Integrating the Cisco ASA Adaptive Security Appliance AIP-SSM and AIP-SSC Modules
   Integrating the Cisco ASA Adaptive Security Appliance CSC-SSM Module

Weitere ähnliche Inhalte

Was ist angesagt?

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
300-208 Dumps
300-208 Dumps300-208 Dumps
300-208 Dumpsmason210
 
Cisco Security Agent - Eric Vanderburg
Cisco Security Agent - Eric VanderburgCisco Security Agent - Eric Vanderburg
Cisco Security Agent - Eric VanderburgEric Vanderburg
 
Security at the Speed of the Network
Security at the Speed of the NetworkSecurity at the Speed of the Network
Security at the Speed of the NetworkHantzley Tauckoor
 
SoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSuresh Paulraj
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionDejan Jeremic
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectRobb Boyd
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsOPNFV
 
Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseIT Tech
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Enterprise Security APIs
Enterprise Security APIsEnterprise Security APIs
Enterprise Security APIsAdam Migus
 
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...MehtabRohela
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Improve Your Network Security w/ 4 Firewall Optimizing Techniques
Improve Your Network Security w/ 4 Firewall Optimizing TechniquesImprove Your Network Security w/ 4 Firewall Optimizing Techniques
Improve Your Network Security w/ 4 Firewall Optimizing TechniquesSeculert
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 

Was ist angesagt? (20)

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
CiscoLetter
CiscoLetterCiscoLetter
CiscoLetter
 
300-208 Dumps
300-208 Dumps300-208 Dumps
300-208 Dumps
 
Cisco Security Agent - Eric Vanderburg
Cisco Security Agent - Eric VanderburgCisco Security Agent - Eric Vanderburg
Cisco Security Agent - Eric Vanderburg
 
Security at the Speed of the Network
Security at the Speed of the NetworkSecurity at the Speed of the Network
Security at the Speed of the Network
 
Network security
Network securityNetwork security
Network security
 
SoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabs
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
 
Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterprise
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Enterprise Security APIs
Enterprise Security APIsEnterprise Security APIs
Enterprise Security APIs
 
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
CiscoCertificate
CiscoCertificateCiscoCertificate
CiscoCertificate
 
Improve Your Network Security w/ 4 Firewall Optimizing Techniques
Improve Your Network Security w/ 4 Firewall Optimizing TechniquesImprove Your Network Security w/ 4 Firewall Optimizing Techniques
Improve Your Network Security w/ 4 Firewall Optimizing Techniques
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 

Andere mochten auch

Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniingbestip
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outlinebestip
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outlinebestip
 
Pmit project management fundamentals for it projects
Pmit project management fundamentals for it projectsPmit project management fundamentals for it projects
Pmit project management fundamentals for it projectsbestip
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument controlbestip
 
6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environmentsbestip
 

Andere mochten auch (6)

Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniing
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outline
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outline
 
Pmit project management fundamentals for it projects
Pmit project management fundamentals for it projectsPmit project management fundamentals for it projects
Pmit project management fundamentals for it projects
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument control
 
6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments
 

Ähnlich wie Deploying cisco asa firewall features

Ccna sec
Ccna secCcna sec
Ccna secshg4916
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overviewali raza
 
Arrow ecs education_cis_sise
Arrow ecs education_cis_siseArrow ecs education_cis_sise
Arrow ecs education_cis_siseCMR WORLD TECH
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Linkedin Promo
Linkedin PromoLinkedin Promo
Linkedin Promofiliani
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Elite Training Consultacy
Elite Training ConsultacyElite Training Consultacy
Elite Training ConsultacyEliteTraining
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
 
Ccna security comparison
Ccna security comparisonCcna security comparison
Ccna security comparisonthongams2000
 

Ähnlich wie Deploying cisco asa firewall features (20)

Ccna sec
Ccna secCcna sec
Ccna sec
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Arrow ecs education_cis_sise
Arrow ecs education_cis_siseArrow ecs education_cis_sise
Arrow ecs education_cis_sise
 
Ccna security
Ccna securityCcna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Linkedin Promo
Linkedin PromoLinkedin Promo
Linkedin Promo
 
Ccnp cursus
Ccnp cursusCcnp cursus
Ccnp cursus
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Elite Training Consultacy
Elite Training ConsultacyElite Training Consultacy
Elite Training Consultacy
 
Abhishek_Resume
Abhishek_Resume Abhishek_Resume
Abhishek_Resume
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
 
Ccna security comparison
Ccna security comparisonCcna security comparison
Ccna security comparison
 

Mehr von bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
Security+
Security+Security+
Security+bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 

Mehr von bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
Security+
Security+Security+
Security+
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 

Deploying cisco asa firewall features

  • 1. Cisco® Deploying Cisco® ASA Firewall Features (FIREWALL) Duration: 5Day(s) Overview: This course provides network security engineers with the knowledge and skills needed to implement and maintain Cisco ASA adaptive security appliance-based perimeter solutions. At Course Completion: Skills the Student will Learn - Implement and maintain basic Cisco ASA adaptive security appliance connectivity and device management plane features. - Implement and maintain data plane access control features of the Cisco ASA adaptive security appliance product family. - Implement and maintain Cisco ASA adaptive security appliance features that integrate it with the local and global routing and switching infrastructure. - Implement and maintain Cisco ASA adaptive security appliance virtualization and high availability features. - Evaluate Cisco ASA adaptive security appliance SSM modules, their major features, and integrate them with the Cisco ASA adaptive security appliance. Technical Features of the Course - Cisco ASA Adaptive Security - Application-layer policies - Advanced access controls - NAT - Security appliance failover Certification FIREWALL v1.0 is part of the CCNP Security track (FIREWALL v1.0 exam is 642-617 FIREWALL v1.0) Prerequisite(s) or equivalent knowledge: Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1) Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2) Cisco® Implementing Cisco® IOS Network Security (IINS) Prerequisite Comments: The knowledge and skills that a learner must have before attending this course: • Cisco Certified Network Associate (CCNA) certification or equivalent knowledge. • Cisco Certified Network Associate Security (CCNA Security) certification or equivalent knowledge. • Working knowledge of the Microsoft Windows operating system Outline: Lesson 1: Introducing the Cisco ASA Adaptive Security Appliance Introducing Cisco ASA Adaptive Security Appliance Technology and Features Introducing the Cisco ASA Adaptive Security Appliance Family Lesson 2: Implementing Basic Connectivity and Device Management Getting Started with the Cisco ASA Adaptive Security Appliance and Cisco ASDM Configuring Interfaces and Static Routing Configuring Basic Device Management Features Configuring Management Access Lab 2-1: Configuring Basic Connectivity
  • 2. Lab 2-2: Configuring Management Features Lesson 3: Deploying Cisco ASA Adaptive Security Appliance Access Control Features Configuring Basic Access Control Using Cisco ASA Adaptive Security Appliance Modular Policy Framework Tuning Basic Stateful Inspection Features Appliance Stateful Inspection Features Configuring Application-Layer Policies Configuring Advanced Access Controls Configuring Resource Limits and Guarantees Configuring User-Based Policies (Cut-Through Proxy) Lab 3-1: Configuring Basic Access Control Lab 3-2: Tuning Basic Cisco ASA Adaptive Security Lab 3-3: Configuring Application-Layer Policies Lab 3-4: Configuring Advanced Access Controls Lab 3-5: Configuring User-Based Policies (Cut-Through Proxy) Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Network Integration Features Deploying Network Address Translation Configuring Cisco ASA Adaptive Security Appliance Transparent Operation Lab 4-1: Configuring Cisco ASA Adaptive Security Appliance NAT Lab 4-2: Configuring Transparent Firewall Mode Lesson 5: Deploying Cisco ASA Adaptive Security Appliance Virtualization and High Availability Features Deploying Cisco ASA Adaptive Security Appliance Virtualization Features Deploying Cisco ASA Adaptive Security Appliance Redundant Interfaces Deploying Active/Standby High Availability Failover Deploying Active/Active High Availability Failover Lab 5-1: Deploying a Cisco ASA Adaptive Security Appliance Active/Standby Failover Lab 5-2: Deploying a Cisco ASA Adaptive Security Appliance Active/Active Failover Lesson 6: Integrating Cisco ASA Adaptive Security Appliance Security Service Modules Introduction to Cisco ASA Adaptive Security Appliance Security Service Modules Integrating the Cisco ASA Adaptive Security Appliance AIP-SSM and AIP-SSC Modules Integrating the Cisco ASA Adaptive Security Appliance CSC-SSM Module