1. Securing
Networks with PIX and ASA
1. Cisco PIX Firewall
Technology and Features
• Firewalls
• PIX Firewall models
2. Cisco PIX Firewall
Family
• PIX Firewall models
• PIX services module
• PIX Firewall licensing
3. Getting Started
with the Cisco PIX Firewall
• User interface
• Examining the PIX Firewall status
• ASA security levels
• Basic PIX Firewall configuration
• Syslog configuration
• DHCP server configuration
• PPPoE and the PIX Firewall
4. Translations
and Connections
• Transport Protocols
• Network Address Translation
• Configuring DNS Support
• Port Address Translations
5. Access Control
Lists and Content Filtering
• ACLS
• Converting Conduits to ACLS
• Using ACLS
6. Object Grouping
• Overview of object grouping
• Getting started with object groups
• Configuring object groups
• Nested object groups
7. Advanced Protocol
Handling
• Advanced protocols
• Multimedia support
8. Attack Guards,
Intrusion Detection, and Shunning
• Attack guards
• Intrusion detection
9. Authentication,
Authorization, and Accounting
• Introduction
• Installation of CSACS for Windows Server
• Authentication configuration
• Downloadable ACLS
10. Failover
• Understanding failover
• Serial failover configuration
• LAN-based failover configuration
11. Virtual Private
Networks
• PIX Firewall enables a secure VPN
• Prepare to configure VPN support
• Configure IKE parameter
• Configure IPSec parameters
• Test and verify VPN configuration
• Cisco VPN Client
• Scale PIX Firewall VPNs
12. System Maintenance
• Remote access
• Command authorization
13. Cisco PIX Device
Manager
• PDM overview
• Prepare for PDM
• Using PDM to configure the PIX Firewall
• Using PDM to create a site-to-site VPN
• Using PDM to create a remote access VPN
14. Enterprise PIX
Firewall Management
• Configuring access and translation rules
• Reporting, tools, and administration
15. Enterprise PIX
Firewall Maintenance
• Introduction to the auto update server
• PIX Firewall and AUS communication settings
• Devices, images, and assignments
• Reports and administration
16. Firewall Services
Module
• FWSM overview
• Using PDM with the FWSM
2. Securing
Cisco Network Devices
1. Introduction
1.1 Security Policy
1.2 Types of Attacks
1.3 Components Used for Defense in Depth
1.4 Physical Security
2. Securing IOS Router
2.1 Control Administrative Access to Cisco IOS Router
2.2 Disabling Unused Services
2.3 Secure Physical Access to the Router
2.4 Access List
2.5 Logging
3. Authentication,
Authorization and Accounting
3.1 Introduction
3.2 Cisco Secure Access Control Server
3.3 AAA Authentication
4. Securing
LAN Switching
4.1 Control Administrative Access to Cisco Switch
4.2 VLAN
4.3 Private VLAN
4.4 Port Security
4.5 802.1x Authentication
5. VPN and
IPSec
5.1 VPN Solutions
5.2 IPSec Communication Modes
5.3 Protocols for Securing Packet Flows
5.4 Protocols for Key Exchange
5.5 Basic Site to Site Configuration for Cisco IOS (For Reference Only)
6. Cisco
IDS and IPS
6.1 Worms Atttacks
6.2 Cisco IDS
6.3 Cisco IPS Device Manager
6.4 CSA (Cisco Security Agent)
6.5 Cisco IOS Intrusion Detection System (IDS) – For Reference Only
6.6 Cisco IOS Intrusion Prevention System (IPS) – For Reference Only
|