Based on our enhanced FIREWALL v2 and VPN v2 courses, this exclusive, lab—based course is designed to provide you with the most Adaptive Security Appliance (ASA) 8.4—based lab experience possible in just five days.
A typical day will begin with an informal white board lecture by the instructor, covering topics associated with the day’s labs. Afterwards, you will be free to work on the labs at your own pace and to experiment in the lab environment. Of course, the instructor will remain available to assist as needed.
Learning Objectives
Bootstrap the security appliance, prepare the security appliance for configuration via the ASDM, and launch and navigate ASDM
Perform essential security appliance configuration using ASDM and the CLI
Configure dynamic and static address translations in the security appliance using ASDM
Configure switching and routing on the security appliance using ASDM
Configure access control lists, filter malicious active codes, and filter URLs to meet the requirements of the security policy using ASDM
Troubleshooting using the packet tracer
Configure object groups and AAA using ASDM
Configure a modular policy using ASDM
Configure the security appliance to support a site—to—site VPN using ASDM
Use ASDM to configure the security appliance to provide secure connectivity using remote access VPNs
Configure the security appliance to run in transparent firewall mode
Enable, configure, and manage multiple contexts to meet security policy requirements
Use advanced NAT features such as auto NAT and manual NAT
Use advanced modular policy framework for deep packet inspection of application protocols such as HTTP and FTP
Configure the security appliance to segment traffic with VLANs
Configure the IPSec VPN Client using digital certificates
Configure the advanced Easy VPN Server features of the ASA
Determine the necessary configuration for the ASA 5505 to be a VPN hardware client
Enable clientless SSL VPNs with the security appliance
Enable AnyConnect SSL VPN client with the security appliance
Enable the Cisco Secure Desktop with the security appliance to increase the security posture of SSL VPN connections
Enable Dynamic Access Policy with the Cisco Secure Desktop
Configure, inspect, and filter traffic with the Content Security and Control SSM
Configure the AIP—SSM to identify and alert for common attacks