Securing Networks with PIX and ASA

Level
Total time
Logo Hemsley Fraser

Need more information? Get more details on the site of the provider.

Starting dates and places

This product does not have fixed starting dates and/or places.

Description

Overview

Course duration: 5 days.

SNPA is a five day lab intensive instructor led course. This task-orientated course teaches the knowledge and skill needed to describe, configure, verify and manage the PIX and ASA security Appliances.

Recommended as preparation for exam(s): 642-522 SNPA. This course is part of the Cisco Certified Security Professional Certification and the Cisco Firewall Specialisation.

This course is run in partnership with Global Knowledge.

Is it right for me?

Cisco Customers, Channel Partners and System Engineers who sell, implement and maintain Cisco PIX and ASA security appliances.

Delegates are required to meet the following prerequisites:

  • CCNA certification o…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. Send an Email to info@springest.co.uk

Overview

Course duration: 5 days.

SNPA is a five day lab intensive instructor led course. This task-orientated course teaches the knowledge and skill needed to describe, configure, verify and manage the PIX and ASA security Appliances.

Recommended as preparation for exam(s): 642-522 SNPA. This course is part of the Cisco Certified Security Professional Certification and the Cisco Firewall Specialisation.

This course is run in partnership with Global Knowledge.

Is it right for me?

Cisco Customers, Channel Partners and System Engineers who sell, implement and maintain Cisco PIX and ASA security appliances.

Delegates are required to meet the following prerequisites:

  • CCNA certification or the equivalent knowledge
  • Basic knowledge of the Windows operating system.
  • Familiarity with networking and security terms and concepts.

What will I learn?

At the end of the course, delegates will be able to:

  • Describe security appliance features, models, components and benefits
  • Discuss Adaptive Security
  • Configure the PIX Firewall to statically and dynamically translate IP addresses
  • Configure the PIX Firewall to control inbound and outbound traffic
  • Configure object groups to simplify ACL configuration
  • Configure the PIX Firewall to send messages to a Syslog sever
  • Explain the routing functionality of the PIX Firewall
  • Configure content filtering on the PIX Firewall
  • Configure the PIX Firewall as a DHCP client
  • Configure special protocol handling on the PIX Firewall
  • Configure AAA on the PIX Firewall
  • Configure failover on the PIX Firewall
  • Configure the PIX Firewall’s IDS feature set
  • Configure a site-to-site VPN using the PIX Firewall
  • Configure a VPN Client-to-PIX Firewall VPN
  • Perform password recovery on the PIX Firewall
  • Upgrade PIX Firewall software images
  • Perform a PIX Firewall activation key upgrade
  • Configure command authorisation
  • Configure the PIX Firewall to send traps to a SNMP Network Management Station
  • Configure the PIX Firewall to permit SNMP traffic
  • Configure a secure connection to the PIX Firewall using SSH
  • Install the PIX Device Manager and use it to configure the PIX Firewall
  • Use the PIX Device Manager to monitor the PIX Firewall
  • Install the PIX Management Centre and use it to configure the PIX Firewall
  • Install the Auto Update Server and use it to update the PIX Firewall and configuration
  • Explain the similarities and differences between the PIX Firewall and the Catalyst 6500 Firewall Services Module
  • Perform basic Firewall Services Module configuration.

What will it cover?

Reviewing Cisco Firewall Technology Features

  • Firewalls
  • Security Appliance Overview

Cisco PIX and ASA Security Appliance Families

  • Cisco Pix Security Appliance Family
  • PIX Security Appliance Licensing
  • ASA 5500 Adaptive Security Appliance Licensing
  • Cisco Catalyst 6500/7600 Firewall Services Module

Getting Started with Cisco Security Appliance

  • User Interface
  • File Management
  • Adaptive Security Algorithm Security Levels
  • Basic Firewall Appliance Configuration
  • Examining the Firewall Appliance Status
  • Time Setting and NTP Support
  • Syslog Configuration

Virtual Private Network Configuration

  • Enabling a secure VPN
  • How IPSec Works
  • Configure VPN Connection Parameters
  • IPSec Configuration Tasks
  • Scale Security Appliance VPNs

Configuring Security Appliance Remote Access Using Cisco Easy VPN

  • Introduction to the Cisco Easy VPN
  • Overview of the Cisco VPN Client
  • How the Cisco easy VPN Works
  • Configuring Users and Groups
  • Configuring the Easy VPN Server for Extended Authentication
  • Configure Security Appliance Hub and Spoke VPNs
  • Cisco VPN Client Manual Configuration tasks
  • Working with the Cisco VPN Client

Configuring ASA for WebVPN

  • WebVPN Feature Overview
  • WebVPN End-User Interface
  • Configure WebVPN General Parameters
  • Configure WebVPN Servers and URLs
  • Configure WebVPN Port Forwarding
  • Configure WebVPN Email Proxy
  • Configure WebVPN Content Filters and ACLs

Configuring Transparent Firewall

  • Transparent Firewall Mode Overview
  • Enabling Transparent Firewall Mode
  • Monitoring and Maintaining Transparent Firewall.

Configuring Security Contexts

  • Security Context Overview
  • Enabling Multiple Context Mode
  • Configuring a Security Context
  • Managing Security Contexts Translations and Connections
  • Transport Protocols
  • Network Address Translation
  • Port Address Translation
  • Static Command
  • TCP Intercept and Connection Limits
  • Connections and Translations
  • Configuring Multiple Interfaces

Access Control Lists and Content Filtering

  • ACLs
  • Malicious Active Code Filtering
  • URL Filtering

Object Grouping

  • Overview of Object Grouping
  • Getting Started with Object Groups
  • Configure Object Groups
  • Configure Nested Object Groups

Authentication, Authorization, and Accounting.

  • Installation of Cisco Secure ACS for Windows 2000
  • Security Appliance Access Authentication Configuration Failover
  • Understanding Failover
  • Serial Cable-Based Failover Configuration
  • Active/Standby LAN –Based Failover Configuration
  • Active/Active Failover Configuration

Cisco Security Appliance Device Manager

  • Describe ASDM and its Capabilities
  • Explain ASDM hardware and software requirements
  • Prepare the Security Appliance to use ASDM
  • Navigate ASDM configuration windows.
  • Navigate ASDM monitor windows
  • Navigate ASDM multimode windows.

AIP- Security Services Module – Getting Started

  • AIP-SSM Overview
  • AIP-SSM SW Loading
  • Initial AIP ASDM Configuration
  • Configure a Security Policy on the ASA Security Appliance.

Managing Security Appliance

  • Managing System Access
  • Managing User Access Levels
  • Managing Software, Licenses, and Configurations
  • Image Upgrade and Activation Keys
  • Cut-through Proxy Authentication Configuration
  • Tunnel Access Authentication Configuration
  • Authorization Configuration
  • Downloadable ACLs
  • Accounting Configuration

Switching and Routing

  • Virtual LANS
  • Static and Dynamic Routing
  • OSPF
  • Multicast

Modular Policy Framework

  • Modular Policy Overview
  • Class-Map
  • Policy Map
  • Service Policy

Advanced Protocol Handling

  • Advanced Protocol Handling
  • FTP Application Inspection
  • HTTP Application Inspection
  • Protocol Application Inspection
  • Multimedia Support
There are no reviews yet.

    Share your review

    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

    There are no frequently asked questions yet. Send an Email to info@springest.co.uk