ASA Firewall

ASA Firewall

Course Description

Choose ASA Perimeter Security technologies/features to implement HLD based on given security requirements Choose the correct ASA model to implement HLD based on given performance requirements Create and test initial ASA appliance configurations using CLI Determine which ASA licenses will be required based on given requirements

Complex Operations Support:

Optimize ASA Perimeter Security features performance, functions, and configurations Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 stateful inspection, QoS policies, cut-thru proxy, threat detection, botnet detection/filter using CLI and/or ASDM Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM Configure, verify and troubleshoot High Availability ASAs (A/S and A/An FO) operations using CLI and/or ASDM Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASA using CLI and/or ASDM Configure, verify and troubleshoot ASA transparent firewall operations using CLI Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM Describe Advanced Troubleshooting Advanced ASA security perimeter configuration/software/hardware troubleshooting using CLI and/or ASD fault finding and repairing Duration: 1 Month.

Physical Devices available for ASA Firewall Training.

Modes of Training Available.

Course outline for ASA-Firewall:

ASA Product Family CLI

Controlling Traffic through the ASA

Modular Policy Framework

Virtual Private Networks (VPNs)

Advanced Features of the ASA