Course Outline

Objectives:

At the end of this course, participants will be able to configure ASA Firewalls to:

  • Allow configuration via console port, Telnet, and SSH.
  • Copy configurations and upgrade operating system images.
  • Authenticate users using RADIUS and local authentication methods.
  • Act as a DHCP server, client, or relay.
  • Operate in routed or transparent firewall modes.
  • Operate in failover mode for enhanced redundancy and reliability.
  • Support VLANs to enhance network segmentation and security.
  • Run routing protocols (OSPF and RIP) and exchange routing information with Cisco routers.
  • Support Access Control Lists (ACLs) and content filtering capabilities.
  • Support object grouping for simplified management of firewall policies.
  • Establish internet connections using Network Address Translation (NAT) and Port Address Translation (PAT).
  • Set up site-to-site Virtual Private Networks (VPNs) using Internet Key Exchange (IKE) and IPsec protocols.
  • Set up remote access VPNs using the Cisco Secure VPN client.
  • Configure web-based VPN solutions for secure remote access.
  • Log access-list activity using a Syslog server for enhanced monitoring and auditing.
  • Send traps to an SNMP server for proactive network management and alerting.
  • Perform password recovery procedures for secure and timely system access.

Practical Exercises:

  • Lab Exercise 1: Basic Configuration of Cisco ASA.
  • Lab Exercise 2: Configure support for VLANs on the ASA.
  • Lab Exercise 3: Establish connectivity via Telnet and configure local/RADIUS authentication.
  • Lab Exercise 4: Configure static and dynamic routing on the ASA.
  • Lab Exercise 5: Filter traffic using Access Control Lists (ACLs).
  • Lab Exercise 6: Configure Network Address Translation (NAT) on the ASA.
  • Lab Exercise 7: Configure Virtual Private Networks (VPNs) on the ASA.
  • Lab Exercise 8: Configure Active/Standby Failover on the ASA/Pix for enhanced reliability.
  • Lab Exercise 9: Perform password recovery procedures on the Cisco ASA.

Equipment Used in Practical Exercises:

  • 4 Cisco ASA 5505 Firewalls running version 8 of the Command Line Interface (CLI) and capable of Active/Standby Failover. Pix 515E firewalls running version 8 of the CLI, Cisco routers, switches, and hubs as required for comprehensive hands-on training.
This course is designed to equip participants with the skills necessary to effectively manage and secure network environments using ASA Firewalls, ensuring alignment with public sector workflows, governance, and accountability standards for government.

Requirements

  • Participants should possess a solid understanding of network technologies and a strong grasp of TCP/IP protocols.
  • Prior experience with Cisco IOS is beneficial for government applications.
 28 Hours

Number of participants


Price per participant

Testimonials (6)

Upcoming Courses

Related Categories