NW
NW NW
Networldz
Networldz
Instant Messengers. Networldz99@yahoo.com Networldz99@hotmail.com Networldz99@gmail.com
NW NW
NW
NW
  HYDERABAD
+91-9000544423
+9140 - 40045060
NW
  BANGALORE
Email : info@networldz.com
nw
CCNA TRAINING INDIA,CCNA TRAINING BANGLORE,CCNA TRAINING HYDERABAD,CCNA TRAINING CHENNAI,CCNA TRAINING BOMBAY,CCNA TRAINING  DELHI,CCNP TRAINING INDIA,CCSP TRAINING INDIA,CCVP TRAINING INDIA,CCVP TRAINING BANGLORE,CCVP TRAINING HYDERABAD,CCVP TRAINING  CHENNAI,CCVP TRAINING  BOMBAY,CCVP TRAINING DELHI,IPCC TRAINING INDIA,IPCC ENTERPRISE TRAINING INDIA,IPCC TRAINING BANGLORE,IPCC TRAINING HYDERABAD.IPCC TRAINING DUBAI,CCVP TRAINING RIYAD,CCVP TRAINING OMAN,CCSP TRAINING OMAN,CCIP TRAINING HYDERABAD,CVPI TRAINING OMAN,CVPI TRAINING BANGLORE,CCNA VOICE TRAINING INDIA,CCNA VOICE TRAINING HYDERABAD,VOICE TRAINING INDIA,VOICE TRAINING BANGLORE,VOICE TRAINING DUBAI,VOICE TRAINING RIYAD,CISCO CERTIFICATION TRAINING,INDIA,VOCIE TRAINING OMANSECURITY TRAINING BANGLORE,SECURITY TRAINING HYDERABAD,SECURITY TRAINING INDIA,CCVP TRAINING  LONDON,CCIE VOCIE TRAINING INDIA,BEST CCIE VOICE TRAINING INDIA,GOOD CCIE VOICE TRAINING INDIA,CCIE SECURITY TRAINING INDIA,CCIE VOICE TRAINING BANGLORE,CCIE VOICE TRAINING HYDERABAD,CISCO ICM TRAINING INDIA,ICM TRAINING BANGLORE,ICM TRAINING HYDERABAD.UNITY TRAINING INDIA,UNITY TRAINING BANGLORE.
 
NW NW NW
NW
NW
NW
 
 
News@ CISCO
 
 
More news
 
 
Examination Info.
 
readmore
 
CISCO Training Course Details
 
 
FWSM v3.1 - Firewall Services Module Configuration & Deployment
 
Duration:

Description

 

The Cisco Firewall Service Module course focuses on how to take advantage of the latest developments in protecting your network using the Firewall Service Module v3.x on the Catalyst 6500 platform. Through lectures and intensive lab exercises, students will learn how to install, configure, upgrade and troubleshoot the Cisco Firewall Service Module (FWSM) v.3x.

Objectives

After completing this course the student should be able to:

  • Cisco FWSM v3.x technology and features
  • Cisco Firewall Services Module (FWSM) overview
  • Getting Started with Cisco FWSM v3.x
  • Translations and Connections
  • Access Control Lists and Content Filtering
  • Object Grouping
  • Authentication, Authorization, and Accounting
  • Modular Policy Framework
  • Advanced Protocol Handling
  • Configuring Transparent Firewall
  • Configuring Security Contexts
  • Failover
  • Managing FWSM v3.x

Prerequisites

CCNA certification and be familiar with the PIX Firewall fundamentals, in addition, to routing and switching concepts and corresponding management protocols prior to taking this course. You should also have hands-on experience with intermediate-level router and switch configuration & troubleshooting tasks.

Who Should Attend

Security administrators and network personnel who are responsible for Firewall Service Module install, set-up or design. This is a course, which will present and demonstrate the latest features of the Cisco Firewall Service Module v3.x on the Catalyst 6500 platform.

 
Course Outline
 

Lesson 1: Cisco FWSM Technology and Features
This lesson introduces the general functionality provided by firewalls and FWSM.

  • Explain the functions of the three types of firewalls used to secure today’s computer networks
  • Discuss the technology and features of Cisco FWSM
  • There is no lab with this lesson.
Lesson 2: Cisco Firewall Services Module (FWSM) overview
This lesson discusses the similarities and differences between an FWSM and a security appliance. The focus is on initializing the FWSM in a Cisco Catalyst switch.
  • Describe the FWSM features and benefits
  • Explain the similarities and differences between the FWSM and other Cisco Security Appliances
  • Describe a typical deployment scenario for the FWSM
  • Configure the switch VLANs
  • Assign VLAN-group to a FWSM
  • Configure the FWSM interfaces
  • Lab 2: Configure the Catalyst 6500 switch to interact with the FWSM
Lesson 3: Getting Started with Cisco FWSM
This lesson describes how to get started with configuring a security appliance.
  • User Interface
  • File Management
  • FWSM Security Levels
  • Basic FWSM Configuration
  • Examining FWSM Status
  • Time Setting
  • Syslog Configuration
  • Lab 3: Configure the FWSM and Execute General Maintenance Commands
Lesson 4: Translations and Connections
This lesson discusses FWSM translations and connections, how the FWSM processes TCP and User Datagram Protocol (UDP) traffic, and how to configure dynamic and static address translations in a security appliance.
  • Transport Protocols
  • Network Address Translation
  • Port Address Translation
  • Static Command
  • TCP Intercept and Connection Limits
  • Connections and Translations
  • Configuring Multiple Interfaces
  • Lab 4: Configuring Access Through the Security Appliance
Lesson 5: Access Control Lists and Content Filtering
This lesson discusses how to control access through the FWSM using access control lists (ACLs). A general discussion of ACLs is provided, along with detailed examples of special use ACLs. The lesson also discusses how to configure the FWSM to filter malicious active codes and how to configure URL filtering.
  • ACLs
  • Malicious Active Code Filtering
  • URL Filtering
  • Lab 5: Configure ACLs on the Security Appliance
Lesson 6: Object Grouping
This lesson introduces object grouping concepts and how to use the object-group command to configure object grouping. The various types of object groups are explained, and the use and configuration of nested object groups are covered in the final sections.
  • Overview of Object Grouping
  • Getting Started with Object Groups
  • Configuring Object Groups
  • Nested Object Groups
  • Lab 6: Configure Object Groups
Lesson 7: Authentication, Authorization, and Accounting
This lesson introduces FWSM authentication, authorization, and accounting (AAA) and how to configure AAA.
  • Introduction to AAA
  • FWSM Access Authentication Configuration
  • FWSM Cut-Through Authentication Configuration
  • Authorization Configuration
  • Accounting Configuration
  • There is no lab with this lesson.
Lesson 8: Modular Policy Framework
This lesson introduces modular policy framework and describes how to configure a modular policy.
  • Modular Policy Overview
  • Configuring a Class Map
  • Configuring a Policy Map
  • Configuring a Service Policy
  • There is no lab with this lesson.
Lesson 9: Advanced Protocol Handling
This lesson introduces FWSM advanced protocol handling. The lesson describes how to configure protocol inspection to include configuring an inspection modular policy, defining an FTP map, defining an HTTP map, and describing a number of the inspection protocols supported by the security appliance.
  • Advanced Protocol Handling
  • FTP Application Inspection
  • HTTP Application Inspection
  • Protocol Application Inspection
  • Multimedia Support
  • Lab 9: Configure and Test Advanced Protocol Inspection on the Security Appliance
Lesson 10: Configuring Transparent Firewall
This lesson provides an overview and explanation of transparent firewall mode. Enabling of transparent firewall and monitoring and maintenance commands specific to the transparent firewall mode are also detailed.
  • Transparent Firewall Mode Overview
  • Enabling Transparent Firewall Mode
  • Monitoring and Maintaining Transparent Firewall Mode
  • Lab 10: Configure FWSM Transparent Firewall
Lesson 11: Configuring Security Contexts
This lesson explains the purpose of security contexts and details how to enable, configure, manage standard contexts and cascading contexts.
  • Security Context Overview
  • Enabling Multiple Context Mode
  • Configuring a Security Context
  • Managing Security Contexts
  • Lab 11: Configure Security Contexts
Lesson 12: Failover
This lesson introduces FWSM failover options and how to configure them.
  • Understanding Failover
  • Active/Standby LAN-Based Failover Configuration
  • Active/Active Failover Configuration
  • Lab 12: Configure Failover
Lesson 13: Managing FWSM
This lesson explains how to secure system access to the FWSM and how to configure and use local user authentication and command authorization. Password recovery and file management are also covered. The lesson concludes by explaining how to upgrade the FWSM image and activation keys.
  • FWSM Architecture and management from C6K
  • Managing System Access
  • Managing User Access Levels
  • Managing Software, Licenses, and Configurations
  • Image Upgrade and Activation Keys
  • Lab 13: Managing the Security Appliance
 
 
 
Back Top
NW
NW
NW
NW NW NW
 
NW
NW