Deploying Cisco ASA Firewall Solutions Training v2.0

Print Friendly, PDF & Email


This course is aimed at providing network security engineers with the knowledge and skills needed to implement and maintain Cisco ASA adaptive security appliance-based perimeter solutions. You will learn to reduce risk to the IT infrastructure and applications using Cisco ASA adaptive security appliance features, and you will learn how to provide detailed operations support for the Cisco ASA adaptive security appliance.

Duration: 5 days

Deploying Cisco ASA Firewall Solutions Training v2.0 Related Courses


Customize It

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience / Target Group

• Anyone who implements and maintains Cisco ASA firewalls
• Network security specialists and technicians
• Candidates seeking CCNP Security certification


After completing this course, attendees will be able to:

• Configure auto and manual network address translation (NAT)
• Technology and features of the Cisco ASA
• Cisco ASA product family
• How ASAs and Cisco PIX Security Appliances protect network devices from attacks
• Bootstrap the security appliance
• Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)
• Launch and navigate ASDM
• Perform essential security appliance configuration using ASDM and the CLI
• Integrate the ASA with Cisco Secure ACS for TACACS+ command authorization
• Integrate the ASA with Cisco Secure ACS for RADIUS network access control
• Configure auto and manual network address translation (NAT)
• Configure access policy based on the Global Access Control List (ACL)
• Configure access policy based on interface ACLs
• Use object groups to simplify ACL complexity and maintenance
• Use the Modular Policy Framework to provide unique policies to specific data flows
• Handle advanced protocols with application inspection
• Deep packet inspection of application layer traffic
• Troubleshoot with TCPping, Syslog, Packet Tracer, and packet capture
• Configure access control based on authenticated users
• Configure the security appliance to run in transparent firewall mode
• Enable, configure, and manage multiple contexts to meet security policy requirements
• Select and configure the type of failover that best suits the network topology
• Monitor and manage an installed security appliance