(CI-SNAF) Securing Networks with ASA Fundamentals

Kosmous Srl
Online

Chiedi il prezzo
Vuoi parlare del corso con un consulente?
Confronta questo corso con altri simili
Leggi tutto

Informazione importanti

  • Corso
  • Online
Descrizione

Il corso Cisco Securing Networks with ASA Fundamentals (SNAF) consente ai partecipanti di acquisire le conoscenze necessarie per configurare e gestire le appliance Cisco della famiglia ASA 5500. Il corso è stato migliorato grazie all’introduzione di laboratori più approfonditi, basati su una topologia disegnata per simulare al meglio un tipica rete di produzione. Questi laboratori guideranno i partecipanti attraverso diversi esercizi, che porteranno per esempio a configurare ACL e VPN sugli ASA. I laboratori utilizzano modelli 5520 della famiglia degli ASA, ma il contenuto del corso è applicabile a tutti i membri delle famiglie di ASA e PIX, dato che la sintassi dei comandi è praticamente identica. Inoltre il corso è stato aggiornato per coprire le molte nuove funzionalità introdotte dalla release 8.0 dell’Appliance Software. Il corso Cisco Securing Networks with ASA Fundamentals (SNAF) consente ai partecipanti di acquisire le conoscenze necessarie per configurare e gestire le appliance Cisco della famiglia ASA 5500. Il corso è stato migliorato grazie all’introduzione di laboratori più approfonditi, basati su una topologia disegnata per simulare al meglio un tipica rete di produzione. Questi laboratori guideranno i partecipanti attraverso diversi esercizi, che porteranno per esempio a configurare ACL e VPN sugli ASA. I laboratori utilizzano modelli 5520 della famiglia degli ASA, ma il contenuto del corso è applicabile a tutti i membri delle famiglie di ASA e PIX, dato che la sintassi dei comandi è praticamente identica. Inoltre il corso è stato aggiornato per coprire le molte nuove funzionalità introdotte dalla release 8.0 dell’Appliance Software.

Informazione importanti

Cosa impari in questo corso?

ASA

Programma

  • Introducing Cisco Security Appliance Technology and Features
    • Functions of the three types of firewalls that are used to secure modern computer networks
    • Technology and features of Cisco security appliances
  • Cisco Adaptive Security Appliance and PIX Security Appliance Families
    • Cisco ASA security appliance models
    • Cisco ASA security appliance licensing options
  • Getting Started with Cisco Security Appliances
    • Four main access modes
    • Security appliance file management system
    • Security appliance security levels
    • ASDM requirements and capabilities
    • Use the CLI to configure and verify basic network settings, and prepare the security
    • appliance for configuration via ASDM
    • Verify security appliance configuration and licensing via ASDM
  • Essential Security Appliance Configuration
    • Configure a security appliance for basic network connectivity
    • Verify the initial configuration
    • Set the clock and synchronize the time on security appliances
    • Configure the security appliance to send syslog messages to a syslog server
  • Configuring Translations and Connection Limits
    • Function of TCP and UDP protocols within the security appliance
    • Function of static and dynamic translations
    • Configure dynamic address translation
    • Configure static address translation
    • Set connection limits
  • Using ACLs and Content Filtering
    • Configure the basic function of ACLs
    • Configure additional functions of ACLs
    • Configure active code filtering (ActiveX and Java applets)
    • Configure the security appliance for URL filtering
    • Use the packet tracer for troubleshooting
  • Configuring Object Grouping
    • Object grouping feature of the security appliance and its advantages
    • Configure object groups and use them in ACLs
  • Switching and Routing on Security Appliances
    • Configure logical interfaces and VLANs
    • Configure static routes and static route tracking
    • Dynamic routing capabilities of Cisco security appliances
    • Configure passive RIP routing
  • Configuring AAA for Cut-Through Proxy
    • Define and compare AAA
    • Install and configure Cisco Secure ACS
    • Configure the local user database
    • Define and configure cut-through proxy authentication
    • Define and configure user authorization using downloadable ACLs
    • Define and configure accounting
  • Configuring the Cisco Modular Policy Framework
    • Cisco Modular Policy Framework feature for security appliances
    • Functionality of class maps
    • Functionality of policy maps
    • Functionality of service policies
    • Use ASDM to configure a service policy rule
  • Configuring Advanced Protocol Handling
    • Need for advanced protocol handling
    • How the security appliance implements inspection of common network applications
    • Issues with multimedia applications and how the security appliance supports multimedia call control and audio sessions
  • Configuring Threat Detection
    • Threat detection and statistics
    • Configure basic threat detection and scanning threat detection
    • Configure and view threat detection statistics
  • Configuring Site-to-Site VPNs Using Pre-Shared Keys
    • How security appliances enable a secure VPN
    • Perform the tasks necessary to configure security appliance IPsec support
    • Commands to configure security appliance IPsec support
    • Configure a VPN between security appliances
  • Configuring Security Appliance Remote Access VPNs
    • Cisco Easy VPN
    • Cisco VPN Client
    • Configure an IPSec Remote Access VPN
    • Configure Users and Groups
  • Configuring Cisco Security Appliances for SSL VPN
    • SSL VPN and its purpose
    • Use the SSL VPN Wizard to configure a basic clientless SSL VPN connection
    • Configure SSL VPN policies
    • Verify SSL VPN operations
    • Customize the clientless SSL VPN portal
  • Configuring Transparent Firewall Mode
    • Purpose of transparent firewall mode
    • How data traverses a security appliance in transparent mode
    • Enable transparent firewall mode
    • Monitor and maintain transparent firewall mode
  • Configuring Security Contexts
    • Purpose of security contexts
    • Enable and disable multiple context mode
    • Configure a security context
    • Manage a security context
  • Configuring Failover
    • Difference between hardware and stateful failover
    • Difference between active/standby and active/active failover
    • Security appliance failover hardware requirements
    • Configure redundant interfaces
    • How active/standby failover works
    • Security appliance roles of primary, secondary, active, and standby
    • How active/active failover works
    • Configure active/standby cable-based and LAN-based failover
    • Configure active/active failover
    • Use remote command execution
  • Managing Security Appliances
    • Configure Telnet access to the security appliance
    • Configure SSH access to the security appliance
    • Configure command authorization
    • Recover security appliance passwords using general password recovery procedures
    • Use TFTP to install and upgrade the software image on the security appliance
  • Introducing Cisco Security Appliance Technology and Features
    • Functions of the three types of firewalls that are used to secure modern computer networks
    • Technology and features of Cisco security appliances
  • Cisco Adaptive Security Appliance and PIX Security Appliance Families
    • Cisco ASA security appliance models
    • Cisco ASA security appliance licensing options
  • Getting Started with Cisco Security Appliances
    • Four main access modes
    • Security appliance file management system
    • Security appliance security levels
    • ASDM requirements and capabilities
    • Use the CLI to configure and verify basic network settings, and prepare the security
    • appliance for configuration via ASDM
    • Verify security appliance configuration and licensing via ASDM
  • Essential Security Appliance Configuration
    • Configure a security appliance for basic network connectivity
    • Verify the initial configuration
    • Set the clock and synchronize the time on security appliances
    • Configure the security appliance to send syslog messages to a syslog server
  • Configuring Translations and Connection Limits
    • Function of TCP and UDP protocols within the security appliance
    • Function of static and dynamic translations
    • Configure dynamic address translation
    • Configure static address translation
    • Set connection limits
  • Using ACLs and Content Filtering
    • Configure the basic function of ACLs
    • Configure additional functions of ACLs
    • Configure active code filtering (ActiveX and Java applets)
    • Configure the security appliance for URL filtering
    • Use the packet tracer for troubleshooting
  • Configuring Object Grouping
    • Object grouping feature of the security appliance and its advantages
    • Configure object groups and use them in ACLs
  • Switching and Routing on Security Appliances
    • Configure logical interfaces and VLANs
    • Configure static routes and static route tracking
    • Dynamic routing capabilities of Cisco security appliances
    • Configure passive RIP routing
  • Configuring AAA for Cut-Through Proxy
    • Define and compare AAA
    • Install and configure Cisco Secure ACS
    • Configure the local user database
    • Define and configure cut-through proxy authentication
    • Define and configure user authorization using downloadable ACLs
    • Define and configure accounting
  • Configuring the Cisco Modular Policy Framework
    • Cisco Modular Policy Framework feature for security appliances
    • Functionality of class maps
    • Functionality of policy maps
    • Functionality of service policies
    • Use ASDM to configure a service policy rule
  • Configuring Advanced Protocol Handling
    • Need for advanced protocol handling
    • How the security appliance implements inspection of common network applications
    • Issues with multimedia applications and how the security appliance supports multimedia call control and audio sessions
  • Configuring Threat Detection
    • Threat detection and statistics
    • Configure basic threat detection and scanning threat detection
    • Configure and view threat detection statistics
  • Configuring Site-to-Site VPNs Using Pre-Shared Keys
    • How security appliances enable a secure VPN
    • Perform the tasks necessary to configure security appliance IPsec support
    • Commands to configure security appliance IPsec support
    • Configure a VPN between security appliances
  • Configuring Security Appliance Remote Access VPNs
    • Cisco Easy VPN
    • Cisco VPN Client
    • Configure an IPSec Remote Access VPN
    • Configure Users and Groups
  • Configuring Cisco Security Appliances for SSL VPN
    • SSL VPN and its purpose
    • Use the SSL VPN Wizard to configure a basic clientless SSL VPN connection
    • Configure SSL VPN policies
    • Verify SSL VPN operations
    • Customize the clientless SSL VPN portal
  • Configuring Transparent Firewall Mode
    • Purpose of transparent firewall mode
    • How data traverses a security appliance in transparent mode
    • Enable transparent firewall mode
    • Monitor and maintain transparent firewall mode
  • Configuring Security Contexts
    • Purpose of security contexts
    • Enable and disable multiple context mode
    • Configure a security context
    • Manage a security context
  • Configuring Failover
    • Difference between hardware and stateful failover
    • Difference between active/standby and active/active failover
    • Security appliance failover hardware requirements
    • Configure redundant interfaces
    • How active/standby failover works
    • Security appliance roles of primary, secondary, active, and standby
    • How active/active failover works
    • Configure active/standby cable-based and LAN-based failover
    • Configure active/active failover
    • Use remote command execution
  • Managing Security Appliances
    • Configure Telnet access to the security appliance
    • Configure SSH access to the security appliance
    • Configure command authorization
    • Recover security appliance passwords using general password recovery procedures
    • Use TFTP to install and upgrade the software image on the security appliance

Confronta questo corso con altri simili
Leggi tutto