Get in Touch

Course Outline

Objectives:

At the end of this course, the student will be able to configure the ASA Firewalls to:

  • Allow configuration via console port, Telnet, and SSH.
  • Copy configurations and upgrade the OS image.
  • Authenticate users using RADIUS and local authentication.
  • Act as a DHCP Server, Client, and Relay.
  • Operate as a Routed or Transparent Firewall.
  • Operate in Failover mode.
  • Support VLANs.
  • Run routing protocols (OSPF and RIP) and exchange routing information with Cisco routers.
  • Support Access Control Lists and content filtering.
  • Support Object Grouping.
  • Establish Internet connections using NAT and PAT.
  • Set up site-to-site VPNs using IKE and IPsec.
  • Set up Remote Access VPNs using the Cisco Secure VPN client.
  • Set up Web VPNs.
  • Log access-list activity using a Syslog server.
  • Send traps to an SNMP Server.
  • Perform password recovery.

Practical Exercises

  • Lab Exercise 1: Basic Configuration of Cisco ASA.
  • Lab Exercise 2: Configure support for VLANs on ASA.
  • Lab Exercise 3: Connectivity via Telnet and Local/RADIUS authentication.
  • Lab Exercise 4: Configure Static and Dynamic routing on ASA.
  • Lab Exercise 5: Filter traffic using Access Control Lists.
  • Lab Exercise 6: Configure NAT on ASA.
  • Lab Exercise 7: Configure VPNs on ASA.
  • Lab Exercise 8: Configure Active/Standby Failover on ASA/Pix.
  • Lab Exercise 9: Password Recovery on Cisco ASA.

Equipment Used in Practical Exercises:

  • 4 Cisco ASA 5505 Firewalls running v8 of the CLI and capable of Active/Standby Failover. Pix 515E firewalls running v8 of the CLI, Cisco routers, switches, and hubs as required.

Requirements

  • Participants should be familiar with network technologies and have a good understanding of TCP/IP.
  • Previous experience with Cisco IOS is advantageous.
 28 Hours

Number of participants


Price per participant

Testimonials (6)

Upcoming Courses

Related Categories