Lesson 1: Introducing Cisco Security Appliance Technology and Features
- Firewalls
- Security Appliance Essentials
Lesson 2: Introducing the Cisco ASA and PIX Security Appliance Families
- Models and Features of Cisco Security Appliances
- Cisco ASA Security Appliance Licensing
Lesson 3: Getting Started with Cisco Security Appliances
- User Interface
- File Management
- Security Appliance Security Levels
- Cisco ASDM Essentials and Operating Requirements
- Preparing to Use Cisco ASDM
- Navigating Cisco ASDM Windows
Lesson 4: Configuring a Security Appliance
- Basic Security Appliance Configuration
- Examining Security Appliance Status
- Time Setting and NTP Support
- Syslog Configuration
Lesson 5: Configuring Translations and Connection Limits
- Transport Protocols
- Understanding NAT
- Understanding PAT
- Static Translations
- TCP SYN Cookies and Connection Limits
- Connections and Translations
Lesson 6: Using ACLs and Content Filtering
- ACL Configuration
- Malicious Active Code Filtering
- URL Filtering
- Packet Tracer
Lesson 7: Configuring Object Grouping
- Essentials of Object Grouping
- Configuring and Using Object Groups
Lesson 8: Switching and Routing on Cisco Security Appliances
- VLAN Capabilities
- Static Routing
- Dynamic Routing
Lesson 9: Configuring AAA for Cut-Through Proxy
- Introduction to AAA
- Configuring the Local User Database
- Installation of Cisco Secure ACS for Windows 2000
- Cut-Through Proxy Authentication Configuration
- Authentication Prompts and Timeouts
- Authorization Configuration
- Accounting Configuration
Lesson 10: Configuring the Cisco Modular Policy Framework
- Modular Policy Framework Overview
- Class Map Overview
- Policy Map Overview
- Configuring Modular Policies with Cisco ASDM
- Configuring a Policy for Management Traffic
- Displaying Modular Policy Framework Components
Lesson 11: Configuring Advanced Protocol Handling
- Advanced Protocol Handling
- Protocol Application Inspection
- Multimedia Support
Lesson 12: Configuring Threat Detection
- Threat Detection Overview
- Basic Threat Detection
- Scanning Threat Detection
- Configuring and Viewing Threat Detection Statistics
Lesson 13: Configuring Site-to-Site VPNs Using Pre-Shared Keys
- Secure VPNs
- How IPsec Works
- Preparing to Configure an IPsec VPN
- Configuring a Site-to-Site VPN Using Pre-Shared Keys
- Modifying the Site-to-Site VPN Configuration
- Test and Verify VPN Configuration
Lesson 14: Configuring Security Appliance Remote-Access VPNs
- Introduction to Cisco Easy VPN
- Overview of Cisco VPN Client
- Configuring Remote-Access VPNs
- Configuring Users and Groups
Lesson 15: Configuring the Cisco ASA Security Appliance for SSL VPN
- SSL VPN Overview
- Using the SSL VPN Wizard to Configure Clientless SSL VPN
- Verifying Clientless SSL VPN Operations
Lesson 16: Configuring Transparent Firewall Mode
- Transparent Firewall Mode Overview
- Traversing a Security Appliance in Transparent Mode
- Configuring Transparent Firewall Mode
- Monitoring and Maintaining Transparent Firewall Mode
Lesson 17: Configuring Security Contexts
- Security Context Overview
- Enabling Multiple Context Mode
- Configuring Security Contexts
- Managing Security Contexts
Lesson 18: Configuring Failover
- Understanding Failover
- Configuring Redundant Interfaces
- Active/Standby LAN-Based Failover Configuration
- Active/Active Failover Configuration
- Remote Command Execution
Lesson 19: Managing the Security Appliance
- Managing System Access
- Configuring Command Authorization
- Managing Configurations
- Managing Images and Activation Keys
|