Cisco Firewall Video Mentor (Video Learning)

Cisco Firewall Video Mentor (Video Learning)

4 (2 ratings by Goodreads)
By (author) 

List price: US$69.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

" The Cisco Firewall Video Mentor is an outstanding aide in learning to configure and understand the Cisco Adaptive Security Appliance. Whether you are a newcomer to the ASA or operationally experienced, these videos clearly explain and demonstrate how to configure and manage the ASA from the commandline and from the ASDM GUI."-Mark Macumber, Systems Engineer, Cisco Cisco Firewall Video Mentor is a unique video product that provides you with more than five hours of personal visual instruction from best-selling author and lead network engineer David Hucaby. In the 16 videos presented on the DVD, David walks you through common Cisco (R) firewall configuration and troubleshooting tasks. Designed to develop and enhance hands-on skills, each 10-30 minute video guides you through essential configuration tasks on the Cisco ASA and FWSM platforms and shows you how to verify that firewalls are working correctly. Lab Layout:Each video lab presents objectives, dynamic lab topology diagrams, command syntax overviews, and video captures of command-line input and GUI configuration. All of this is coupled with thorough audio instruction by an industry expert making learning easy and engaging. Network Animation:Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.Command-Line Interface (CLI) Video: Video screencasts of ASA and FWSM CLI and the ASDM GUI demonstrate command entry, configuration techniques, and device response. This video product is part of the Cisco Press (R) Video Mentor Series. The video products in this series present expert training from industry-leading instructors and technologists. This dynamic learning environment combines animations, screencasts, and audio instruction to help users bridge the gap between conceptual knowledge and hands on application. System Requirements:Microsoft Windows XP, 2000, or Vista Apple OS 9 or later Linux operating systems that have a web browser with Flash 7 or later plug-in Speakers or headphones Color display with a minimum 1024x768 resolution 1 GHz or faster CPU recommended DVD drive
show more

Product details

  • Mixed media product | 112 pages
  • 190.5 x 223.52 x 27.94mm | 362.87g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587201984
  • 9781587201981
  • 2,524,909

Table of contents

Lab 1 Initial Configuration 1Scenario 1Initial Configurations 1Video Presentation Reference 1Step 1: Connect to the Firewall Console 2Step 2: Explore the CLI Modes 2Step 3: Search the CLI Output 3Step 4: Set the Firewall Hostname and Domain Name 4 Lab 2 Configuring Interfaces 5Scenario 5Initial Configurations 5Video Presentation Reference 5Step 1: Set the Firewall Mode 6Step 2: Configure Interface Parameters 6Step 3: Configure a Physical Interface 6Step 4: Configure a Redundant Interface 7Step 5: Configure a Logical VLAN Interface 8 Lab 3 Setting Up Routing 11Scenario 11Initial Configurations 11Video Presentation Reference 12Step 1: Configure Static Routes 12Step 2: Configure a Default Route 12Step 3: Configure the Standby ISP 13Step 4: Use a Dynamic Routing Protocol 14 Lab 4 Firewall Administration over the Network 15Scenario 15Initial Configurations 15Video Presentation Reference 16Step 1: Set Up Telnet Access 16Step 2: Set Up SSH Access 17Step 3: Set Up ASDM Access 17Step 4: View ASDM Session Demonstration 18 Lab 5 Using Multiple Security Contexts 19Scenario 19Initial Configurations 19Video Presentation Reference 19Step 1: Enable Multiple Context Mode 19Step 2: Create New Security Contexts 20Step 3: Administer Contexts Through the CLI 22Step 4: Configure Security Contexts and Their Interfaces 22Step 5: Learn Context Arrangement 23 Lab 6 Using Failover for High Availability 25Scenario 25Initial Configurations 25Video Presentation Reference 29Step 1: Identify the Failover Role 29Step 2: Set Up LAN-Based Failover 29Step 3: Set Up Stateful Failover 31Step 4: Tune the Unit Failover Threshold 31Step 5: Set Up the Active-Active Failover Groups 32Step 6: Define Context Interface Addresses 32Step 7: Assign Contexts to the Two Failover Groups 34Step 8: Bootstrap the Secondary Firewall Unit 35Monitoring Failover Operation 35 Lab 7 Failover in Action 37Scenario 37Initial Configurations 38Video Presentation Reference 38Scenario 1: Physical Interface Failure 38Scenario 2: Logical Interface Failure 38Scenario 3: Failover Unit Failure 39Scenario 4: Hitless Code Upgrade 39 Lab 8 Setting Up Address Translation and Connection Limits 45Scenario 45Initial Configurations 45Video Presentation Reference 46Step 1: Configure Static NAT 46Step 2: Configure Policy NAT 47Step 3: Configure Identity NAT 48Step 4: Configure NAT Exemption 48Step 5: Configure Dynamic NAT and PAT 49Step 6: Set UDP and TCP Connection Limits 50 Lab 9 Setting Up Firewall Rules 51Scenario 51Initial Configurations 51Video Presentation Reference 52Step 1: Configure an Access List for the Inside Interface 52Step 2: Configure an Access List for the Outside Interface 52Step 3: Configure a Network Object Group 53Step 4: Configure an Enhanced Service Object Group 54Step 5: Configure an Access List to Use the Object Groups 55 Lab 10 Setting Up a DMZ 57Scenario 57Initial Configurations 57Video Presentation Reference 58Step 1: Consider Connections from the Inside Toward the DMZ 59Step 2: Consider Connections from the DMZ Toward the Outside 59Step 3: Consider Connections from the Outside Toward the DMZ 59Step 4: Consider Connections from the DMZ Toward the Inside 60Step 5: Review the DMZ Access List for Conflicting Entries 60 Lab 11 Setting Up Logging 63Scenario 63Initial Configurations 63Video Presentation Reference 64Step 1: Send Logging Messages to the Internal Buffer 65Step 2: Send Logging Messages to an ASDM Session 65Step 3: Send Logging Messages to a Syslog Server 66 Lab 12 Using MPF to Control Layer 3/4 Connections 67Scenario 67Initial Configurations 67Video Presentation Reference 68Step 1: Classify Interesting Traffic with a Class Map 69Step 2: Define a Policy with a Policy Map 69Step 3: Apply the Policy 70Step 4: Monitor the Policy 70Lab 13 Using MPF to Perform QoS Queuing and Policing 71 Scenario 71Initial Configurations 71Video Presentation Reference 72Step 1: Send Traffic to the Priority Queue 72Step 2: Use a Policer to Limit Bandwidth 73 Lab 14 Using MPF to Tune Application Inspection Engines 75Scenario 75Initial Configurations 75Video Presentation Reference 76Step 1: Enable an Inspection Engine 76Step 2: Change the Inspection Engine Listening Port 77Step 3: Use an Inspection Policy Map 77Step 4: Use an Inspection Regex Match 78 Lab 15 Testing Security Policies with Packet Tracer 79Scenario 79Initial Configurations 79Video Presentation Reference 83Step 1: Send an Outbound ICMP Packet Through a Static Address Translation 83Step 2: Send an Outbound ICMP Packet Through a Dynamic Address Translation 83Step 3: Send an Inbound ICMP Packet 84Step 4: Send an Outbound TCP Packet Through an Application Inspection Engine 84 Lab 16 Capturing Traffic 85Scenario 85Initial Configurations 85Video Presentation Reference 89Step 1: Configure a Raw Data Capture Through the CLI 89Step 2: Configure an ASP Drop Capture Through the CLI 89Step 3: Copy the Capture Buffer to an External Host 90Step 4: Configure a Capture Session with ASDM 90
show more

About David Hucaby

David Hucaby, CCIE (R) No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco (R) Catalyst (R), ASA/PIX (R)/FWSM security, and VPN product lines. David was one of the beta reviewers of the ASA/PIX 7.0 and 8.0 operating system software. David has a B.S. and M.S. in electrical engineering from the University of Kentucky and has worked in the IT field for 19 years. He lives in Kentucky with his wife Marci and two daughters.
show more

Rating details

2 ratings
4 out of 5 stars
5 0% (0)
4 100% (2)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X