1 / 1

Agenda – Sophos NSG Training

Agenda – Sophos NSG Training. DAY ONE Part One – Overview & Basics Chapter 1: ASG Overview Architecture Configuration Workflow Installation & # Wizard Chapter 2: WebAdmin Interface Dashboard Interface Functions Chapter 3: Definitions Network Definitions Service Definitions

kitra
Download Presentation

Agenda – Sophos NSG Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agenda – Sophos NSG Training DAY ONE Part One – Overview & Basics Chapter 1: ASG Overview • Architecture • Configuration Workflow • Installation & #Wizard Chapter 2: WebAdmin Interface • Dashboard • Interface Functions Chapter 3: Definitions • Network Definitions • Service Definitions • #Time Event Definitions Chapter 4: Basic System Configuration ## • Licensing • System Settings • Up2Date Service • NTP Server • ASG Configuration Backup • User Portal • Customization Part Two – Network Settings & Security Chapter 5: Network Settings • Interfaces • DNS • #DHCP • Static Routing • VLAN • #Link Aggregation • Uplink Balancing (Failover & Multipath) • #Bridging • Policy Routing • Quality of Service Chapter 6: Network Security • Packet Filtering • Network Address Translation • #Server Load Balancing DAY TWO Chapter 6*: VoIP Security • #H.323 • #SIP Chapter 7*:IM/P2PSecurity ## • Instant Messaging • Peer-to-Peer Chapter 8*: Intrusion Protection ## • Configuration Part Three – User Authentication & Proxies Chapter 7: Local User Authentication • Local Users ## • User Groups ## • Authentication methods Chapter 8: Web Security • HTTP/S Proxy • HTTP/S Profiles ## • URL Filter Groups • Authentication Setup (e.g. AD) • #FTP Proxy Chapter 9: E-mail Security • SMTP Proxy • Anti-Spam features • SMTP Profiles ## • Mail Manager • User Portal ## • #POP3 Proxy • Quarantine Management • DAY THREE • Part Four - VPN • Chapter 10: Site-to-Site VPN • SSL-VPN • IPSec configuration with PSK • IPSec Policy Management ## • #RSA Site to Site VPN • #X.509 Site to Site VPN • Chapter 11: Remote Access • SSL-VPN • #L2TP over IPSec • #PPTP • #IPSec • Part Five – System Management & Reporting • Chapter 12: System Management • Support Tools ## • #Advanced Tools • #SNMP • Remote Syslog ## • Central Management ## • Chapter 13: Reporting ## • Hardware, Network • Executive Report • Part Six – High Availability • Chapter 14: High Availability & Clustering • Active/Passive HA • Clustering

More Related