Escolar Documentos
Profissional Documentos
Cultura Documentos
www.inacom.com www.corebts.com
Lesson 5: Configuring Translations and Connection Lesson 11: Configuring Advanced Protocol Handling
Limits
• Advanced Protocol Handling
• Transport Protocols • Protocol Application Inspection
• Network Address Translation • Multimedia Support
• Port Address Translation
Lesson 12: Configuring Threat Detection
• Static Translations
• SYN Cookies and Connection Limits • Threat Detection Overview
• Connections and Translations • Basic Threat Detection
• Scanning Threat Detection
Lesson 6: Using ACLs and Content Filtering
• Configuring and Viewing Threat Detection Statistics
• ACLs
Lesson 13: Configuring Site-to-Site VPNs Using Pre-
• Malicious Active Code Filtering
Shared Keys
• URL Filtering
• Packet Tracer • Secure VPNs
• How IPsec Works
Lesson 7: Configuring Object Grouping
• Prepare to Configure an IPsec VPN
• Overview of Object Grouping • Configuring a Site-to-Site VPN Using Pre-shared
• Configuring Object Groups and Using Them in ACLs Keys
• Modifying the Site-to-Site VPN Configuration
Lesson 8: Switching and Routing on Cisco Security
• Test and Verify VPN Configuration
Appliances
Lesson 14: Configuring Security Appliance Remote-
• VLAN Capabilities
Access VPNs
• Static Routing
• Dynamic Routing • Introduction to Cisco Easy VPN
• Overview of Cisco VPN Client
Lesson 9: Configuring AAA for Cut-Through Proxy
• Configuring Remote Access VPNs
• Introduction to AAA • Configuring Users and Groups
• Configuring the Local User Database
Lesson 15: Configuring the Cisco ASA Security
• Installing Cisco Secure ACS for Windows Appliance for SSL VPN
• Cut-Through Proxy Authentication Configuration
• Authentication Prompts and Timeouts • SSL VPN Overview
• Authorization Configuration • Using the SSL VPN Wizard to Configure Clientless
• Accounting Configuration SSL VPN
• Verifying Clientless SSL VPN Operations
Lesson 10: Configuring the Cisco Modular Policy
Framework Lesson 16: Configuring Transparent Firewall Mode
• Modular Policy Framework Overview • Transparent Firewall Mode Overview
• Class Map Overview • How Data Traverses a Security Appliance in
• Policy Map Overview Transparent Mode
• Using ASDM to Configure a Modular Policy • Configuring Transparent Firewall Mode
• Configuring a Management Policy • Monitoring and Maintaining Transparent Firewall
• Displaying Modular Policy Framework Commands Mode
www.inacom.com www.corebts.com
Lesson 17: Configuring Security Contexts
• Security Context Overview
• Enabling Multiple Context Mode
• Configuring Security Contexts
• Managing Security Contexts
Lesson 18: Configuring Failover
• Understanding Failover
• Configuring Redundant Interfaces
• LAN-Based Active/Standby Failover Configuration
• Active/Active Failover Configuration
• Remote Command Execution
Lesson 19: Managing the Security Appliance
• Managing System Access
• Configuring Command Authorization
• Managing Configurations
• Managing Images and Activation Keys
www.inacom.com www.corebts.com