NW
NW NW
Networldz
Networldz
Instant Messengers. Networldz99@yahoo.com Networldz99@hotmail.com Networldz99@gmail.com
NW NW
NW
NW
  HYDERABAD
+91-9000544423
+9140 - 40045060
NW
  BANGALORE
Email : info@networldz.com
nw
CCNA TRAINING INDIA,CCNA TRAINING BANGLORE,CCNA TRAINING HYDERABAD,CCNA TRAINING CHENNAI,CCNA TRAINING BOMBAY,CCNA TRAINING  DELHI,CCNP TRAINING INDIA,CCSP TRAINING INDIA,CCVP TRAINING INDIA,CCVP TRAINING BANGLORE,CCVP TRAINING HYDERABAD,CCVP TRAINING  CHENNAI,CCVP TRAINING  BOMBAY,CCVP TRAINING DELHI,IPCC TRAINING INDIA,IPCC ENTERPRISE TRAINING INDIA,IPCC TRAINING BANGLORE,IPCC TRAINING HYDERABAD.IPCC TRAINING DUBAI,CCVP TRAINING RIYAD,CCVP TRAINING OMAN,CCSP TRAINING OMAN,CCIP TRAINING HYDERABAD,CVPI TRAINING OMAN,CVPI TRAINING BANGLORE,CCNA VOICE TRAINING INDIA,CCNA VOICE TRAINING HYDERABAD,VOICE TRAINING INDIA,VOICE TRAINING BANGLORE,VOICE TRAINING DUBAI,VOICE TRAINING RIYAD,CISCO CERTIFICATION TRAINING,INDIA,VOCIE TRAINING OMANSECURITY TRAINING BANGLORE,SECURITY TRAINING HYDERABAD,SECURITY TRAINING INDIA,CCVP TRAINING  LONDON,CCIE VOCIE TRAINING INDIA,BEST CCIE VOICE TRAINING INDIA,GOOD CCIE VOICE TRAINING INDIA,CCIE SECURITY TRAINING INDIA,CCIE VOICE TRAINING BANGLORE,CCIE VOICE TRAINING HYDERABAD,CISCO ICM TRAINING INDIA,ICM TRAINING BANGLORE,ICM TRAINING HYDERABAD.UNITY TRAINING INDIA,UNITY TRAINING BANGLORE.
 
NW NW NW
NW
NW
NW
 
 
News@ CISCO
 
 
More news
 
 
Examination Info.
 
readmore
 
CISCO Training Course Details
 
 
SNAF v1.0 - Securing Networks with ASA Fundamentals
 
Duration:

Description

 

Securing Networks with ASA Fundamentals (SNAF) v1.0 is a five-day, instructor-led, lab-intensive course, which will be delivered by Cisco Learning Partners. This task-oriented course teaches the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security Appliances.

This course updates Securing Networks with PIX and ASA (SNPA) v5.0. In SNAF 1.0, the ASDM 6.0 graphical user interface (GUI) is used for configuration and monitoring. Although all lessons and labs are now GUI-based, the commands for each configuration task are also presented in the lessons for those who prefer to configure the security appliance via the command line interface (CLI). In SNAF 1.0, lessons have been updated to cover new features in Cisco ASA and PIX Security Appliance Software Version 8.0(2), including the following:

  • Threat detection
  • Secure logging
  • Remote command execution in failover pairs
  • Redundant interfaces
  • Modular policy framework enhancements
  • Access control list renaming capability
  • FTP support for SSL VPN
  • Onscreen keyboard for the SSL VPN
  • Administrator-defined customization of all SSL VPN user-visible content
  • Personal bookmarks for SSL VPN users

Objectives

  • Explain the functions of the three types of firewalls used to secure today’s computer networks.
  • Describe the technology and features of Cisco security appliances.
  • Given diagrams of networks protected by Cisco Adaptive Security Appliances (ASAs) and Cisco PIX Security Appliances, explain how each appliance protects network devices from attacks and why each is an appropriate choice for the example network.
  • Given a PC and a Cisco 5520 ASA, bootstrap the security appliance, prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM), and launch and navigate ASDM.
  • Given a PC and a Cisco 5520 ASA, use ASDM and the CLI to perform essential security appliance configuration.
  • Given a PC and a Cisco 5520 ASA, use ASDM to configure dynamic and static address translations in the security appliance.
  • Given a PC and a Cisco 5520 ASA, use ASDM to configure switching and routing on the security appliance.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure access control lists, filter malicious active codes, and filter URLs to meet the requirements of the security policy.
  • Given a PC and a Cisco 5520 ASA, use the packet tracer for troubleshooting.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure object groups that meet the requirements of the security policy.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure AAA as needed to meet the requirements of the security policy.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure a modular policy that supports the security policy.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure protocol inspection to meet the requirements of the security policy.
  • Given a PC, a Cisco 5520 ASA, and a security policy, use ASDM and the CLI to configure threat detection to meet the requirements of the security policy.
  • Given a student PC, a Cisco 5520 ASA, and a security policy, use ASDM to configure the security appliance to support a site-to-site VPN that meets the requirements of the security policy.
  • Given a student PC and a Cisco 5520 ASA, use ASDM to configure the security appliance to provide secure connectivity using remote access VPNs.
  • Given a PC, a Cisco 5520 ASA, and a security policy, configure the security appliance to run in transparent firewall mode as needed to meet the requirements of the security policy.
  • Given a PC, a Cisco 5520 ASA, and a security policy, enable, configure, and manage multiple contexts as needed to meet the requirements of the security policy.
  • Given a PC, a Cisco 5520 ASA, and a network topology, select and configure the type of failover that best suits the network topology.
  • Given a PC, a Cisco 5520 ASA, and a security policy, monitor and manage an installed security appliance.

Prerequisites

  • Cisco CCNA® certification or the equivalent knowledge
  • Basic knowledge of the Microsoft Windows operating system
  • Familiarity with networking and security terms and concepts

Who Should Attend

The primary and secondary audience for this course is as follows:

  • Cisco customers who implement and maintain Cisco ASA security appliances
  • Cisco channel partners who sell, implement, and maintain ASA security appliances
  • Cisco engineers who support the sale of ASA security appliances
 
Course Outline
 
  • Lesson 1: Introducing Cisco Security Appliance Technology and Features
    • Firewalls
    • Security Appliance Overview
  • Lesson 2: Introducing the Cisco ASA and PIX Security Appliance Families
    • Models and Features of Cisco Security Appliances
    • ASA Licensing
  • Lesson 3: Getting Started with Cisco Security Appliances
    • User Interface
    • File Management
    • Security Appliance Security Levels
    • ASDM Overview and Operating Requirements
    • Preparing to Use ASDM
    • Navigating ASDM Windows
  • Lesson 4: Configuring a Security Appliance
    • Basic Security Appliance Configuration
    • Examining Security Appliance Status
    • Time Setting and NTP Support
    • Syslog Configuration
  • Lesson 5: Configuring Translations and Connection Limits
    • Transport Protocols
    • Network Address Translation
    • Port Address Translation
    • Static Translations
    • SYN Cookies and Connection Limits
    • Connections and Translations
  • Lesson 6: Using ACLs and Content Filtering
    • ACLs
    • Malicious Active Code Filtering
    • URL Filtering
    • Packet Tracer
  • Lesson 7: Configuring Object Grouping
    • Overview of Object Grouping
    • Configuring Object Groups and Using Them in ACLs
  • Lesson 8: Switching and Routing on Cisco Security Appliances
    • VLAN Capabilities
    • Static Routing
    • Dynamic Routing
  • Lesson 9: Configuring AAA for Cut-Through Proxy
    • Introduction to AAA
    • Configuring the Local User Database
    • Installing Cisco Secure ACS for Windows
    • Cut-Through Proxy Authentication Configuration
    • Authentication Prompts and Timeouts
    • Authorization Configuration
    • Accounting Configuration
  • Lesson 10: Configuring the Cisco Modular Policy Framework
    • Modular Policy Framework Overview
    • Class Map Overview
    • Policy Map Overview
    • Using ASDM to Configure a Modular Policy
    • Configuring a Management Policy
    • Displaying Modular Policy Framework Commands
  • Lesson 11: Configuring Advanced Protocol Handling
    • Advanced Protocol Handling
    • Protocol Application Inspection
    • Multimedia Support
  • Lesson 12: Configuring Threat Detection
    • Threat Detection Overview
    • Basic Threat Detection
    • Scanning Threat Detection
    • Configuring and Viewing Threat Detection Statistics
  • Lesson 13: Configuring Site-to-Site VPNs Using Pre-Shared Keys
    • Secure VPNs
    • How IPsec Works
    • Prepare to Configure an IPsec VPN
    • Configuring a Site-to-Site VPN Using Pre-shared Keys
    • Modifying the Site-to-Site VPN Configuration
    • Test and Verify VPN Configuration
  • Lesson 14: Configuring Security Appliance Remote-Access VPNs
    • Introduction to Cisco Easy VPN
    • Overview of Cisco VPN Client
    • Configuring Remote Access VPNs
    • Configuring Users and Groups
  • Lesson 15: Configuring the Cisco ASA Security Appliance for SSL VPN
    • SSL VPN Overview
    • Using the SSL VPN Wizard to Configure Clientless SSL VPN
    • Verifying Clientless SSL VPN Operations
  • Lesson 16: Configuring Transparent Firewall Mode
    • Transparent Firewall Mode Overview
    • How Data Traverses a Security Appliance in Transparent Mode
    • Configuring Transparent Firewall Mode
    • Monitoring and Maintaining Transparent Firewall Mode
  • Lesson 17: Configuring Security Contexts
    • Security Context Overview
    • Enabling Multiple Context Mode
    • Configuring Security Contexts
    • Managing Security Contexts
  • Lesson 18: Configuring Failover
    • Understanding Failover
    • Configuring Redundant Interfaces
    • LAN-Based Active/Standby Failover Configuration
    • Active/Active Failover Configuration
    • Remote Command Execution
  • Lesson 19: Managing the Security Appliance
    • Managing System Access
    • Configuring Command Authorization
    • Managing Configurations
    • Managing Images and Activation Keys
 
 
 
Back Top
NW
NW
NW
NW NW NW
 
NW
NW