1 / 80

Chapter 9: Implementing the Cisco Adaptive Security Appliance

Chapter 9: Implementing the Cisco Adaptive Security Appliance. CCNA Security v2.0. 9.0 Introduction 9.1 Introduction to the ASA 9.2 ASA Firewall Configuration 9.3 Summary. Chapter Outline. Section 9.1: Introduction to the ASA. Upon completion of this section, you should be able to:

jacob
Download Presentation

Chapter 9: Implementing the Cisco Adaptive Security Appliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 9:Implementing the Cisco Adaptive Security Appliance CCNA Security v2.0

  2. 9.0 Introduction 9.1 Introduction to the ASA 9.2 ASA Firewall Configuration 9.3 Summary Chapter Outline

  3. Section 9.1:Introduction to the ASA Upon completion of this section, you should be able to: • Compare ASA solutions to other routing firewall technologies. • Explain ASA 5505 operation with the default configuration.

  4. Topic 9.1.1:ASA Solutions

  5. ASA Firewall Models Small Office and Branch Office ASA Models

  6. ASA Firewall Models (Cont.) Internet Edge Models

  7. ASA Firewall Models (Cont.) Enterprise Data Center Models

  8. Advanced ASA Firewall Feature ASA Virtualization

  9. Advanced ASA Firewall Feature (Cont.) High Availability

  10. Advanced ASA Firewall Feature (Cont.) Identity Firewall

  11. Advanced ASA Firewall Feature (Cont.) ASA Threat Control

  12. Review of Firewalls in Network Design Permitted Traffic DeniedTraffic

  13. ASA Firewall Modes of Operation Routed Mode Transparent Mode

  14. ASA Licensing Requirements Base License Specifics

  15. ASA Licensing Requirements (Cont.) Security Plus License Specifics

  16. ASA Licensing Requirements show version Command Output

  17. Topic 9.1.2:Basic ASA Configuration

  18. Overview of ASA 5505 ASA 5505 Back Panel ASA 5505 Front Panel

  19. ASA Security Levels Security Level Control: • Network Access • Inspection Engines • Application Filtering

  20. ASA 5505 Deployment Scenarios ASA Deployment in a Small Branch ASA Deployment in a Small Business

  21. ASA 5505 Deployment Scenarios (Cont.) ASA Deployment in an Enterprise

  22. Section 9.2:ASA Firewall Configuration Upon completion of this section, you should be able to: • Explain what ASA firewall services are enabled using the default configuration. • Configure an ASA to provide basic firewall services. • Configure object groups on an ASA. • Configure access lists with object groups on an ASA. • Configure an ASA to provide NAT services. • Configure access control using the local database and AAA server. • Explain how the Cisco Modular Framework (MPF) is used to configure ASA policies.

  23. Topic 9.2.1:The ASA Firewall Configuration

  24. Introduce Basic ASA Settings Base License Specifics Security Plus License Specifics

  25. Introduce Basic ASA Settings (Cont.) show version Command Output

  26. ASA Default Configuration ASA 5505 Default Configuration Overview.

  27. ASA Interactive Setup Initialization Wizard Entering the ASA 5505 Setup Initialization Wizard

  28. Topic 9.2.2:Configuring Management Settings and Services

  29. Enter Global Configuration Mode Entering Global Configuration Mode Example

  30. Configuring Basic Settings ASA Basic Configuration Commands

  31. Configuring Basic Settings (Cont.) Configuring Basic Settings Enabling AES Encryption Example

  32. Configuring Logical VLAN Interfaces Local VLAN Interface Commands Configuring IP Addresses on VLAN Interfaces

  33. Configuring Logical VLAN Interfaces (Cont.) Configuring VLAN Interfaces Example

  34. Assigning Layer 2 Ports to VLANs Configuring Layer 2 Ports Example Verifying VLAN Port Assignment Example

  35. Assigning Layer 2 Ports to VLANs (Cont.) Verifying Interfaces Example Verifying IP Addresses Example

  36. Configuring a Default Static Route

  37. Configuring Remote Access Services Telnet Configuration Commands Telnet Configuration Commands Example

  38. Configuring Remote Access Services (Cont.) SSH Configuration Commands Configuring SSH Access Example

  39. Configuring Network Time Protocol Services NTP Authentication Commands Configuring NTP Example

  40. Configuring DHCP Services DHCP Server Commands Configuring DHCP Server Example

  41. Topic 9.2.3:Object Groups

  42. Introduction to Objects and Object Groups

  43. Configuring Network Objects Network Object Commands Configuring a Network Object Example

  44. Configuring Service Objects Service Object Options Example

  45. Configuring Service Objects (Cont.) Common Service Object Commands Configuring a Service Object Example

  46. Object Groups

  47. Configuring Common Object Groups Network Object Group Example ICMP-type Object Group Example

  48. Configuring Common Object Groups (Cont.) Services Object Group Example

  49. Configuring Common Object Groups (Cont.) Services Object Group Example

  50. Topic 9.2.4:ACLS

More Related