Network Expert’s FIREWALL (ASA ver8.2/8.4/8.6)

Cisco Security Appliance Technology and Features

  • Firewalls
  • Security Appliance Overview

Cisco PIX Security Appliance and ASA Adaptive Security Appliance Families

  • Models and Features of Cisco Security Appliances
  • PIX Security Appliance Licensing
  • ASA Adaptive Security Appliance Licensing
  • Cisco Firewall Services Module

Getting Started with Cisco Security Appliances

  • User Interface
  • File Management
  • Security Appliance Security Levels
  • Basic Security Appliance Configuration
  • Examining Security Appliance Status
  • Time Setting and NTP Support
  • Syslog Configuration

Translations and Connections

  • Transport Protocols
  • Network Address Translation
  • Port Address Translation
  • Static NAT
  • Connections and Translations
  • Configuring Multiple Interfaces

Access Control Lists and Content Filtering

  • Malicious Active Code Filtering
  • URL Filtering
  • Botnet Filtering

Object Grouping

  • Overview of Object Grouping
  • Getting Started with Object Groups
  • Configuring Object Groups
  • Nested Object Groups

Authentication, Authorization, and Accounting

  • Installation of Cisco Secure ACS for Windows 2000
  • Security Appliance Access Authentication Configuration
  • Security Appliance Cut-Through Authentication Configuration
  • Tunnel Access Authentication Configuration
  • Authorization Configuration
  • Downloadable ACLs
  • Accounting Configuration

Switching and Routing

  • VLANs
  • Static and Dynamic Routing
  • OSPF
  • RIP
  • Route Redistribution

Modular Policy Framework

  • Modular Policy Overview
  • Configuring a Class Map
  • Configuring a Policy Map
  • Configuring a Service Policy

Advanced Protocol Handling

  • Advanced Protocol Handling
  • FTP Application Inspection
  • HTTP Application Inspection
  • Protocol Application Inspection

VPN Configuration

  • Secure VPNs
  • IPSec
  • Internet Key Exchange
  • Data Encryption Standard
  • Triple Data Encryption Standard
  • Advanced Encryption Standard
  • Diffie-Hellman
  • Message Digest 5
  • Secure Hash Algorithm-1
  • RSA Signature
  • Certificate Authority
  • Security Association
  • How IPSec Works
  • Configure VPN Connection Parameters
  • IPSec Configuration Tasks
  • Task 1: Prepare to Configure VPN Support
  • Create IKE Policies for a Purpose
  • Define IKE Policy Parameters
  • Task 2: Configure IKE Parameters
  • Task 3: Configure IPSec Parameters
  • Task 4: Test and Verify VPN Configuration
  • Scale Security Appliance VPNs

Configuring Security Appliance Remote Access

  • Introduction to Cisco Easy VPN
  • Overview of Cisco VPN Client
  • How Cisco Easy VPN Works
  • Configuring Users and Groups
  • Configuring the Easy VPN Server for Extended Authentication
  • Configure Security Appliance Hub-and-Spoke VPNs
  • Cisco VPN Client Manual Configuration Tasks
  • Transparent Tunneling
  • Allowing Local LAN Access
  • Adjusting the Peer Response Timeout Value
  • Working with the Cisco VPN Client

Configuring ASA for WebVPN

  • WebVPN Feature Overview
  • WebVPN End-User Interface
  • Configure WebVPN General Parameters
  • Configure WebVPN Servers and URLs
  • Configure WebVPN Port Forwarding
  • Configure Security Appliance Hub-and-Spoke VPNs
  • Configure WebVPN Content Filters and ACLs

Configuring Transparent Firewall

  • Transparent Firewall Mode Overview
  • Enabling Transparent Firewall Mode
  • Monitoring and Maintaining Transparent Firewall Mode

Configuring Security Contexts

  • Security Context Overview
  • Enabling Multiple Context Mode
  • Configuring a Security Context
  • Managing Security Contexts


  • Understanding Failover
  • Serial Cable-Based Failover Configuration
  • Active/Standby LAN-Based Failover Configuration
  • Active/Active Failover Configuration

Cisco Security Appliance Device Manager

  • ASDM Overview and Operating Requirements
  • Windows Requirements
  • General Guidelines
  • Prepare for ASDM
  • Navigating ASDM Configuration Windows
  • Navigating ASDM Multimode Windows

Managing Security Appliances

  • Managing System Access
  • Managing User Access Levels
  • Managing Software, Licenses, and Configurations
  • Image Upgrade and Activation Keys


We will contact you