SlideShare une entreprise Scribd logo
1  sur  2
Cisco® Deploying Cisco® ASA VPN Solutions (VPN)

Duration:
5. Day(s)
Overview:
This course supports network security engineers goals in choosing, configuring, and
troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site-
to-site VPN features to reduce risk to IT infrastructure and its applications.

At Course Completion:
Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN
subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco
ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco
ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced
Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic
and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and
certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters
Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0)
Prerequisite(s) or equivalent knowledge:
   Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1)
   Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2)
   Cisco® Implementing Cisco® IOS Network Security (IINS)


Outline:
  Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying
  Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture
      Deploying Cisco ASA VPN Solutions (VPN)
      Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
      Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN
      Configuration Concepts
  Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Deploying Basic Site-to-Site IPsec VPNs
      Deploying Certificate Authentication in Site-to-Site IPsec VPNs
      Deploying the Cisco IPsec VPN Client
      Deploying Basic Easy VPN Solutions
      Deploying Advanced Authentication in Cisco Easy VPN Solutions
      Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware
      Client
      Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN
      Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site-
      to-Site VPN
      Lab 2-3: Deploying Basic Easy VPN
      Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication
      Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy
      VPN Client
  Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
VPN Solutions
   Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution
   Advanced Deployment of the Cisco AnyConnect VPN Client
   Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs
   Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local
   Password Authentication
   Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA
   Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management
Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN
Solutions
   Deploying a Basic Clientless VPN Solution
   Deploying Advanced Application Access for Clientless SSL VPN
   Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN
   Customizing the Clientless SSL VPN User Interface and Portal
   Lab 4-1: Configuring Basic Clientless VPN Access
   Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs
   Lab 4-3: Customizing the SSL VPN Portal
Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions
   Deploying VPN Authorization, Access Control, and Accounting
   Deploying Cisco Secure Desktop in SSL VPNs
   Deploying Dynamic Access Policies
   Deploying High Availability and High Performance in SSL and IPsec VPNs
   Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters
   Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs
   Lab 5-3: Configuring a Load Balancing SSL VPN Cluster

Contenu connexe

Plus de bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
Security+
Security+Security+
Security+bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 

Plus de bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
Security+
Security+Security+
Security+
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Deploying cisco routers asa vpn solutions

  • 1. Cisco® Deploying Cisco® ASA VPN Solutions (VPN) Duration: 5. Day(s) Overview: This course supports network security engineers goals in choosing, configuring, and troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site- to-site VPN features to reduce risk to IT infrastructure and its applications. At Course Completion: Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0) Prerequisite(s) or equivalent knowledge: Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1) Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2) Cisco® Implementing Cisco® IOS Network Security (IINS) Outline: Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture Deploying Cisco ASA VPN Solutions (VPN) Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN Configuration Concepts Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Deploying Basic Site-to-Site IPsec VPNs Deploying Certificate Authentication in Site-to-Site IPsec VPNs Deploying the Cisco IPsec VPN Client Deploying Basic Easy VPN Solutions Deploying Advanced Authentication in Cisco Easy VPN Solutions Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware Client Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site- to-Site VPN Lab 2-3: Deploying Basic Easy VPN Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy VPN Client Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
  • 2. VPN Solutions Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution Advanced Deployment of the Cisco AnyConnect VPN Client Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local Password Authentication Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN Solutions Deploying a Basic Clientless VPN Solution Deploying Advanced Application Access for Clientless SSL VPN Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN Customizing the Clientless SSL VPN User Interface and Portal Lab 4-1: Configuring Basic Clientless VPN Access Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs Lab 4-3: Customizing the SSL VPN Portal Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions Deploying VPN Authorization, Access Control, and Accounting Deploying Cisco Secure Desktop in SSL VPNs Deploying Dynamic Access Policies Deploying High Availability and High Performance in SSL and IPsec VPNs Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs Lab 5-3: Configuring a Load Balancing SSL VPN Cluster