Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide
|
|
- Berniece Potter
- 5 years ago
- Views:
Transcription
1 Deploying Cisco ASA Firewall Features (FIREWALL) v1.0 Global Knowledge European Remote Labs Instructor Guide Revision Draft /03/2011
2 1. Contents 1. Contents.2 2. Introduction.3 3. Remote Labs Topology, Connections and setup.3 4. Initial Lab Configuration Set-up.5 5. Lab Clear Down / Set-up Procedure.5 6. Lab Exercises.6 Lab 2:...6 Lab 3: 9 Lab 4: Lab 6: Copyright Global Knowledge - Revision Draft /03/2011 Page 2
3 2. Introduction xxxxxxxx Support Contact Details: Web Support Portal: Telephone: +44 (0) Remote Labs Topology, Connections and Setup xxxxx Copyright Global Knowledge - Revision Draft /03/2011 Page 3
4 4. Initial Lab Configuration Set-up PC Logins Load the Base configurations for all devices from the Device Management tool on the Instructor Web Access page. All PC s will have been reset to default, prior to the lab being available for use. It is recommended for the ASA s to first run the Erase Device then Load Base Config occasionally a previous class may not have cleared down correctly and the Erase will ensure no configuration corruption. Note: The initial configuration for the Pod ASA Firewalls will ensure that the correct starting IOS and ASDM files are loaded. It is also sufficient to test basic connectivity (see Lab 2-1, Task 1 in Lab Notes section below). The Core Router is used as an NTP Master Clock ensure that the Router clock is set to the current time. The Pod Client and Server logins are: administrator / cisco The Shared Server logins are: Instructor Login: administrator / globalk Student Login: studentx / cisco123 (where X is the Pod number). Note: The issue with launching the Shared Server from the Web page link for the Students has now been resolved and should work OK via the link. Core Device Logins Core Router logins are: VTY password: cisco Instructor Enable password: globalk Core Switch Instructor Enable password: globalk Copyright Global Knowledge - Revision Draft /03/2011 Page 4
5 5. Lab Clear Down Procedure Load the Base configurations for all devices from the Device Management tool on the Instructor Web Access page. Notify Remote Lab Support that you have finished using the equipment by replying to the End of Course Confirmation , which will have been sent to you during the class. Please do NOT reply to the End of Course Confirmation for any other purpose this may cause confusion and your rack may be disconnected or cleared as a result..!! Should you have not received the above , please send an to the Support address (Section 2 above), confirming the Course and Rack used, that you have completed the class and finished using the equipment. Copyright Global Knowledge - Revision Draft /03/2011 Page 5
6 6. Lab Exercises Lab 2-1: Configuring Basic Connectivity Task 1 Pre-Lab Steps: The ASA firewalls start with a base configuration, which will ensure that the correct starting IOS is loaded and also provide sufficient configuration to test connectivity to the Pod Client PC, Pod DMZ Server and the Core Router. To test, from the ASA, ping the following devices (where X is the Pod number): Client PC: DMZ Server: Core Router: 10.0.X X X.2 Task 2 Step 2: Additionally, set the interface Speed to 100 and Duplex to full. For all occasions throughout the labs, where an interface is to be configured, please set the speed and duplex as above. This will ensure correct operation and data speeds. If left to auto, incorrect operation can result, e.g. ASDM is very slow to load up, etc. Task 3 The starting ASDM version is 6.1(3). Do NOT install the Desktop icons when asked. Once ASDM is upgraded to version 6.2(5)53, they will no longer operate. always launch ASDM via a Web browser to Task 4 - Steps 2 & 3: Reminder to set speed to 100 and duplex to full. Task 5 All OK Task 6 All OK Copyright Global Knowledge - Revision Draft /03/2011 Page 6
7 Lab 2-2: Configuring Management Features Task 1 Step 3: DO NOT use the ASDM to TFTP the files to the ASA. Although the transfer will work OK, many times the IOS will then fail to load. Instead use command line to TFTP the files across to the ASA. copy tftp: disk0: Additionally, if the file already exists in flash, it should first be deleted it has been found that a pre-existing file in flash may cause the file corruption on TFTP transfer. Should the reload fail, do the following: Reboot the ASA via the Power Management tool on the Instructor Web page. Press ESC when prompted during the boot process. Enter: boot disk0:/asa803-k8.bin Wait for the ASA to reboot and then TFTP the files again via the command line. Task 2 Step 1: The old 6.1(3) ASDM may have been left open, if so, close all windows and reopen via a Web Browser (any desktop icon will fail). Note: The correct time for the NTP Master Core Router should have been set prior to this lab. Task 3 Step 4: via Logging Filters Task 4 All OK Task 5 Step 5: The ASA command required is: crypto key generate rsa modulus 2048 Task 6 Step 9: Supply the User credentials of student / cisco Copyright Global Knowledge - Revision Draft /03/2011 Page 7
8 Lab 3-1: Configuring Basic Access Control Task 2 All OK Task 3 Step 2: Note that this step is to configure incorrect IP address for the Shared Server HOWEVER the DMZ network SHOULD be X.0 /24. This allows for a failure test to be performed first. Then the correct IP address for the Shared Server is configured. Task 4 All OK. Lab 3-2: Tuning Basic Cisco ASA Adaptive Security Appliance Stateful Inspection Features Task 2 All OK Task 3 All OK Lab 3-3: Configuring Application-Layer Policies Task 2 All OK Except, during testing it was not possible to block the PNG image file. Currently not sure if this is a lab step problem or an issue with the Web Site build. Further testing is on-going. Does not affect any other lab steps so can safely move on. Copyright Global Knowledge - Revision Draft /03/2011 Page 8
9 Lab 3-4: Configuring Advanced Access Controls Task 2 All OK Task 3 A reboot of the ASA may be required before logging output is seen. Task 4 All OK Task 5 Botnet This is an optional task. Skip this task as we do not currently have the BOTNET licenses. Lab 3-5: Configuring User-Based Policies (Cut-Through Proxy) Task 2 All OK Task 3 All OK Task 4 All OK On completion, ensure that all AAA configuration is removed. The simplest method is to use the command line: clear configure aaa Lab 4-1: Configuring Cisco ASA Adaptive Security Appliance NAT Task 2 All OK Task 3 All OK. Student Telnet password for the Core Router is: cisco Copyright Global Knowledge - Revision Draft /03/2011 Page 9
10 Lab 4-2: Configuring Transparent Firewall Mode Task 1 Step 1: Record the Client PC IP settings first to allow later reconfiguration. Use the PC interface marked CLASS LAB INTERFACE. Task 2 Step 2: ENSURE that the configuration has been properly saved to flash BEFORE setting the firewall to transparent mode. (It is intended that a recovery configuration will be supplied, to be loaded via the Device Management tool in case of accidents..). Task 3 Reminder to set interface speed and duplex. Task 4 If the ping to the Core Router fails, try clearing the ARP cache on the ASA Firewall (see note in Lab Guide at the top of Page 100). Task 5 Note: Ensure that the ASA is configured to provide ASDM version 6.2(5)53: asdm image disk0:/asdm-625.bin Step 14: The source network is incorrect in the Answer Key. It should be X.0/24 Task 6 Step 3: Only restore the configurations on the odd numbered Pod ASA s (1, 3, 5 & 7) as the even numbered Pod ASA s will be used as Failover Devices during the next lab. Client PC IP addressing is: IP Address: 10.0.X Default Gateway: 10.0.X.1 Copyright Global Knowledge - Revision Draft /03/2011 Page 10
11 Lab 5-1: Deploying a Cisco ASA Adaptive Security Appliance Active/Standby Failover Setup Load the Lab 5-1 configurations to Core Switches 1 and 2, ASA s 2, 4, 6 and 8 as required. At this stage, students will be paired up in order to provide the required pair of ASA s for the Failover Labs (lab 5-1 and Lab 5-2). The pairs are set as follows: Pod 1 & 2, Pod 3 & 4, Pod 5 & 6, Pod 7 & 8 Note: Loading the Lab 5-1 configurations on the Even numbered Pod ASA s (2, 4, 6 & 8) will erase any remaining configuration. At this point students should switch their Web Access page view from the drop-down menu at the top right of the page select Lab 5-1 Active/Standby Failover Note: Both the even and odd numbered pod ASA s are now shown, HOWEVER the PC s used for this lab (Lab 5-1) and the next lab (Lab 5-2) will be only the odd numbered Pod PC s. e.g. For the Pod 1 / 2 pair, the PC s are from Pod 1, for the Pod 3 / 4 pair, the Pc s are from Pod 3 etc. Access the Core Router and ensure that the ARP Cache is cleared: clear arp Ensure ALL Pod ASA s are running with IOS version 8.2(2) and that the ASDM image is set to version 6.2(5)53. Failover will fail unless both ASA s in a pair are running identical IOS and ASDM images. Task 2 All OK Task 3 Step 5: show ip and show fail. Step 7: Using ls in FTP fails as this has not been permitted during earlier lab steps. pwd will work to prove the connection. As an alternative, telnet to the Core Router on X.2 would prove the test successfully. Step 9: Also, review the Syslog output on the DMZ server for failover messages. Copyright Global Knowledge - Revision Draft /03/2011 Page 11
12 Task 4 All OK Task 5 All OK Lab 5-2: Deploying a Cisco ASA Adaptive Security Appliance Active/Active Failover Setup Load the Lab 5-2 configurations to the Core Router, Core Switches 1 and 2. Students are asked to erase the ASA configurations as part of the initial lab steps, however, if preferred, the Erase Device configuration script can be used instead. Task 1 Verify that all ASA s now have a Blank configuration and all are running IOS version 8.2(2) and ASDM version 6.2(5)53. Task 2 Set all interfaces for speed and duplex. Note: The X for the ASA2 is the Odd numbered Pod number NOT the even pod number e.g. Pod 1 not Pod 2, Pod 3 not Pod 4 etc Task 3 All OK Task 4 Initial Answer key output example for the show fail command shows the initial stae when the ASA1 is Active for both groups. The second show fail command is the output after the ASA2 has been configured to be Active for Group 2. Task 5 All OK Task 6 All OK Copyright Global Knowledge - Revision Draft /03/2011 Page 12
Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide
Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0 Global Knowledge European Remote Labs Instructor Guide 1. Contents 1. Contents... 2 2. Introduction... 3 3. Remote Labs Topology, Connections and
More informationChapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM
Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights
More informationChapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM
Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.
More informationChapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM
Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All
More informationLab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard
Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Verify that the
More informationLab Student Lab Orientation
Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and
More informationLab Student Lab Orientation
Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and
More informationTroubleshooting. Testing Your Configuration CHAPTER
82 CHAPTER This chapter describes how to troubleshoot the ASA and includes the following sections: Testing Your Configuration, page 82-1 Reloading the ASA, page 82-8 Performing Password Recovery, page
More informationPIX/ASA 7.x to 7.x Upgrade a Software Image using ASDM or CLI Configuration Example
PIX/ASA 7.x to 7.x Upgrade a Software Image using ASDM or CLI Configuration Example Document ID: 69984 Introduction Prerequisites Requirements Components Used Related Products Conventions Upgrade a Software
More informationRelease Notes for the Cisco ASA Services Module, Version 8.5(x)
Release s for the Cisco ASA Services Module, Version 8.5(x) Released: July 7, 2011 Updated: September 4, 2012 This document contains release information for the Cisco ASA Services Module (ASASM) Version
More informationPIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example
PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Download Software Upgrade a Software
More informationTroubleshooting the Security Appliance
CHAPTER 43 This chapter describes how to troubleshoot the security appliance, and includes the following sections: Testing Your Configuration, page 43-1 Reloading the Security Appliance, page 43-6 Performing
More informationThis document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration:
More informationDevice Interface IP Address Subnet Mask Default Gateway
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP Fa0/0 172.20.1.129 255.255.255.128 N/A S0/0/0 172.20.1.1 255.255.255.128 N/A Fa0/0 172.20.0.129 255.255.255.128
More informationUpgrade ASA and ASDM Cisco ASA Firewall
Upgrade ASA and ASDM Cisco ASA Firewall Complete these steps to upgrade a software image on the ASA 5500 using ASDM. 1. Select Tools > Upgrade Software... from the Home window of the ASDM. 2. Select the
More informationUpgrading Software and Firmware
APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.1.0, page B-2 Upgrading
More informationLab 1.3.2: Review of Concepts from Exploration 1 - Challenge
Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge Topology Diagram Learning Objectives Upon completion of this lab, you will be able to: Create a logical topology given network requirements
More informationLaboration 2 Troubleshooting Switching and First-Hop Redundancy
Laboration 2 Troubleshooting Switching and First-Hop Redundancy Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1
More informationLab 9.6.3: EIGRP Troubleshooting Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 172.18.64.1 255.255.192.0 N/A HQ S0/0/0 209.165.202.129 255.255.255.252 N/A S0/0/1 209.165.202.133 255.255.255.252
More informationSkills Assessment Student Training
Skills Assessment Student Training Topology Assessment Objectives Part 1: Initialize Devices (6 points, 5 minutes) Part 2: Configure Device Basic Settings (33 points, 20 minutes) Part 3: Configure Switch
More informationASACAMP - ASA Lab Camp (5316)
ASACAMP - ASA Lab Camp (5316) Price: $4,595 Cisco Course v1.0 Cisco Security Appliance Software v8.0 Based on our enhanced FIREWALL and VPN courses, this exclusive, lab-based course is designed to provide
More informationConfigure the ASA for Dual Internal Networks
Configure the ASA for Dual Internal Networks Document ID: 119195 Contributed by Dinkar Sharma, Bratin Saha, and Prashant Joshi, Cisco TAC Engineers. Aug 05, 2015 Contents Introduction Prerequisites Requirements
More informationChapter 10 - Configure ASA Basic Settings and Firewall using ASDM
Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Time: 20 minutes Given an IP address and mask of (address / mask), design an IP addressing scheme that satisfies the following requirements. Network address/mask
More informationLaboration 1 Examine the Topology and Basic Troubleshooting Commands
Laboration 1 Examine the Topology and Basic Troubleshooting Commands Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page
More information202 Lab Introduction Connecting to the Lab Environment
202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned
More informationSet the Hostname, Domain Name, and the Enable and Telnet
This chapter describes how to configure basic settings on the ASA that are typically required for a functioning configuration. Set the Hostname, Domain Name, and the Enable and Telnet Passwords, page 1
More informationPacket Tracer - Configure Cisco Routers for Syslog, NTP, and SSH Operations (Instructor Version)
Packet Tracer - Configure Cisco Routers for Syslog, NTP, and SSH Operations (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
More informationPassword Recovery Procedure for the PIX
Password Recovery Procedure for the PIX Document ID: 8529 Introduction Prerequisites Requirements Components Used Conventions Step by Step Procedure PIX With a Floppy Drive PIX Without a Floppy Drive Sample
More informationCisco ASA 5500 LAB Guide
INGRAM MICRO Cisco ASA 5500 LAB Guide Ingram Micro 4/1/2009 The following LAB Guide will provide you with the basic steps involved in performing some fundamental configurations on a Cisco ASA 5500 series
More informationLab : OSPF Troubleshooting Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 10.10.0.1 255.255.252.0 N/A HQ S0/0/0 172.16.7.1 255.255.255.252 N/A S0/0/1 172.16.7.5 255.255.255.252 N/A
More informationCisco - ASA Lab Camp v9.0
Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment
More informationSymantec NetBackup Appliances Hands-On Lab
Symantec NetBackup Appliances Hands-On Lab Description NetBackup Appliances Hands On Lab This lab assumes a prerequisite knowledge of NetBackup, specifically configuring storage units, creating backup
More informationExam Actual. Higher Quality. Better Service! QUESTION & ANSWER
Higher Quality Better Service! Exam Actual QUESTION & ANSWER Accurate study guides, High passing rate! Exam Actual provides update free of charge in one year! http://www.examactual.com Exam : 642-617 Title
More informationIdentity Firewall. About the Identity Firewall
This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History
More informationChapter 10 Lab B: Configuring ASA Basic Settings and Firewall Using ASDM
Chapter 10 Lab B: Configuring ASA Basic Settings and Firewall Using ASDM Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of Fast Ethernet interfaces. All contents are Copyright 1992
More informationLab Configure Cisco IOS Firewall CBAC
Lab 3.8.3 Configure Cisco IOS Firewall CBAC Objective Scenario Topology Estimated Time: 50 minutes Number of Team Members: Two teams with four students per team. In this lab, students will complete the
More informationASA/PIX Security Appliance
I N D E X A AAA, implementing, 27 28 access to ASA/PIX Security Appliance monitoring, 150 151 securing, 147 150 to websites, blocking, 153 155 access control, 30 access policies, creating for web and mail
More informationUniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL
UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL Contents: UniNets CCNA Security LAB MANUAL Section 1 Securing Layer 2 Lab 1-1 Configuring Native VLAN on a Trunk Links Lab 1-2 Disabling
More informationExam Name: Implementing Cisco Edge Network Security Solutions
Vendor: Cisco Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network Security Solutions Version: Demo QUESTION 1 The Cisco ASA must support dynamic routing and terminating VPN traffic. Which three
More informationLab Configuring the PIX Security Appliance as a DHCP Server
Lab 8.5.3 Configuring the PIX Security Appliance as a DHCP Server Objective Scenario Topology Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students
More informationManaging Services Modules
CHAPTER 58 This chapter describes how to manage the following module types: Security Services Cards (SSCs) Security Services Modules (SSMs) Security Services Processors (SSPs) Modules run advanced security
More informationSkills Assessment Student Practice
Skills Assessment Student Practice Topology Assessment Objectives Part 1: Develop the IPv4 Address Scheme (15 points, 20 minutes) Part 2: Initialize and Reload Devices (10 points, 5 minutes) Part 3: Configure
More informationLab - Install Windows 7 or Vista
Introduction In this lab, you will install the Windows 7 or Vista operating system. Recommended Equipment A computer with a blank hard disk drive Windows 7 or Vista installation DVD or USB flash drive
More informationFundamentals of Network Security v1.1 Scope and Sequence
Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
More informationConfiguring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3
Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 From Cisco s website, here are the minimum requirements for CCP 2.7 and CCP 2.8: The following info comes from many
More informationMultiple Context Mode
This chapter describes how to configure multiple security contexts on the Cisco ASA. About Security Contexts, page 1 Licensing for, page 12 Prerequisites for, page 13 Guidelines for, page 14 Defaults for,
More informationUpgrading the Server Software
APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining
More informationDeploying Cisco ASA Firewall Solutions (FIREWALL v1.0)
Cisco 642-617 Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) Version: 4.8 QUESTION NO: 1 Which Cisco ASA feature enables the ASA to do these two things? 1) Act as a proxy for the server and generate
More informationSet the Hostname, Domain Name, and the Enable and Telnet
This chapter describes how to configure basic settings on the ASA that are typically required for a functioning configuration. Set the Hostname, Domain Name, and the Enable and Telnet Passwords, page 1
More informationLab - Connect to a Router for the First Time
Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable
More informationTable of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example
Table of Contents IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example...1 Document ID: 63881...1 Introduction...1 Prerequisites...2 Requirements...2 Components Used...2 Conventions...2
More informationImplementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
More informationRelease Notes for Cisco ASDM Version 5.2(5)
May 2010 This document contains release information for Cisco ASDM Version 5.2(5) on the Cisco ASA 5500. It includes the following sections: New Features, page 1 System Requirements, page 1 Upgrading ASDM,
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 642-618 EXAM QUESTIONS & ANSWERS Number: 642-618 Passing Score: 800 Time Limit: 120 min File Version: 39.6 http://www.gratisexam.com/ CISCO 642-618 EXAM QUESTIONS & ANSWERS Exam Name: Deploying Cisco
More informationReimage Procedures. Firepower 2100 Series Software Reimage and Disaster Recovery
Firepower 2100 Series Software Reimage and Disaster Recovery Procedures, page 1 Firepower 2100 Series Software Reimage and Disaster Recovery Procedures In some cases, you may want to reset your system
More informationASA 8.x to 9.x Migration with FirePOWER Services
ASA 8.x to 9.x Migration with FirePOWER Services Lab Guide Version 1.0 Another offering from team MIDAS November 17 th, 2014 2 Table of Contents Introduction... 3 Logical Topology... 4 Physical Topology...
More informationRouter pod documentation
Router pod documentation Note: DO NOT USE COPY RUNNING STARTUP, as this may reset the privileged password. If you change the privileged password, and save the configuration, please tell your lecturer as
More informationChapter 5 Review Questions
Chapter 5 Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure
More informationUpgrade the ASA FirePOWER Module
This document describes how to upgrade the ASA FirePOWER module using ASDM or the Firepower Management Center, depending on your management choice. Refer to Upgrade the ASA Appliance or ASAv to determine
More informationDeploying Cisco ASA VPN Solutions v2.0 (VPN)
Deploying Cisco ASA VPN Solutions v2.0 (VPN) Course Overview: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is part of the curriculum path that leads to the Cisco CCNP Security certification.
More informationLab Configuring and Verifying Extended ACLs Topology
Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1
More informationRetake - Skills Assessment Student Training (Answer Key)
Retake - Skills Assessment Student Training (Answer Key) Name:. Topology Assessment Objectives Part 1: Develop the IPv4 Address Scheme (15 points, 0 minutes) Part 2: Configure Device IPv4 and Security
More informationPT Activity: Configuring a Zone-Based Policy Firewall (ZPF)
PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 R2 R3 Fa0/1 192.168.1.1 255.255.255.0
More informationBasic Router Pod Planning and Installation Guide
Basic Router Pod Planning and Installation Guide For Cisco Networking Academy CCNA 3.x Curriculum Document Version: 2005-09-03 Copyright 2005, Network Development Group, Inc. NETLAB Academy Edition and
More informationConfiguring the SMA 500v Virtual Appliance
Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance
More informationCCNA Security 1.0 Student Packet Tracer Manual
1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationObjectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks
More informationConfiguring the Hostname, Domain Name, Passwords, and Other Basic Settings
CHAPTER 5 Configuring the Hostname, Domain Name, Passwords, and Other Basic Settings This chapter describes how to configure basic settings on your ASA 1000V that are typically required for a functioning
More informationLab 7 Configuring Basic Router Settings with IOS CLI
Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.
More informationGetting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER
CHAPTER 2 This chapter describes how to access the command-line interface, configure the firewall mode, and work with the configuration. This chapter includes the following sections: with Your Platform
More informationDEPLOYING BASIC CISCO WIRELESS LANS (WDBWL)
[Type a quote from the document or the summary of an interesting point. You can position the text box anywhere in the document. Use the Drawing Tools tab to change the formatting of the pull quote text
More informationPIX/ASA: PPPoE Client Configuration Example
PIX/ASA: PPPoE Client Configuration Example Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Configure Network Diagram CLI Configuration ASDM Configuration
More informationThis study aid describes the purpose of security contexts and explains how to enable, configure, and manage multiple contexts.
Configuring Security Contexts Created by Bob Eckhoff This study aid describes the purpose of security contexts and explains how to enable, configure, and manage multiple contexts. Security Context Overview
More informationGetting Started. Access the Console for the Command-Line Interface. Access the Appliance Console
This chapter describes how to get started with your Cisco ASA. Access the Console for the Command-Line Interface, on page 1 Configure ASDM Access, on page 9 Start ASDM, on page 15 Factory Default Configurations,
More informationLab 8.5.2: Troubleshooting Enterprise Networks 2
Lab 8.5.2: Troubleshooting Enterprise Networks 2 Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 192.168.10.1 255.255.255.0 N/A R1 Fa0/1 192.168.11.1 255.255.255.0
More informationChapter 9 Lab A: Configuring ASA Basic Settings and Firewall Using CLI
A: Configuring ASA Basic Settings and Firewall Using CLI Topology Note: ISR G2 devices use GigabitEthernet interfaces instead of FastEthernet interfaces. 2015 Cisco and/or its affiliates. All rights reserved.
More informationCisco CISCO Securing Networks with ASA Advanced. Practice Test. Version
Cisco 642-515 CISCO 642-515 Securing Networks with ASA Advanced Practice Test Version 3.1 QUESTION NO: 1 Cisco 642-515: Practice Exam Which two statements correctly describe configuring active/active failover?
More informationInterconnecting Cisco Network Devices, Part 2 (ICND2) v2.0 Global Knowledge European n Remote Labs Instructor Guide Revision Draft 0.
Interconnecting Cisco Network Devices, Part 2 (ICND2) v2.0 Global Knowledge European Remote Labs Instructor Guide 1. Contents 1. Contents... 2 2. Introduction... 3 3. Remote Labs Topology, Connections
More informationINDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1
INDEX A active calls backup 105 restore 107 administration CLI 28 differences 29 GU and CLI 39 GUI 27 administrative privileges 84 administrator Cisco CallManager 29 Cisco Unity Express 29 password 35
More informationCounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance
CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to
More informationInstallation. Installation Overview. Installation and Configuration Taskflows CHAPTER
CHAPTER 4 Overview, page 4-1 Navigate the Wizard, page 4-7 Install and Configure Cisco Unified Presence, page 4-7 Perform a Fresh Multi-Node, page 4-15 Overview Cisco Unified Presence supports the following
More informationAccessing the WAN Chapter 4 - PART II Modified by Tony Chen 07/20/2008
Network Security Accessing the WAN Chapter 4 - PART II Modified by Tony Chen 07/20/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 642-617 Title : Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) Vendor : Cisco Version : DEMO
More informationLab Install Windows 8
Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the
More informationForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0
ForeScout CounterACT Single CounterACT Appliance Version 8.0 Table of Contents Welcome to CounterACT Version 8.0... 4 CounterACT Package Contents... 4 Overview... 5 1. Create a Deployment Plan... 6 Decide
More informationCisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2
Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2 The Cisco Network Analysis Module (NAM) is an integrated module that enables network managers
More informationCisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]
s@lm@n Cisco Exam 210-260 Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ] Cisco 210-260 : Practice Test Question No : 1 When an IPS detects an attack, which action can the IPS
More informationLab 7.5.1: Basic Wireless Configuration
Topology Diagram Learning Objectives Configure options in the Linksys Setup tab. Configure options in the Linksys Wireless tab. Configure options in the Linksys Administration tab. Configure options in
More informationOverview. ACE Appliance Device Manager Overview CHAPTER
1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager
More informationIntroduction to Networks: Case Study, Option 2
Introduction to Networks: Case Study, Option 2 Name: Name: Name: Academy username: Academy username: Academy username: Topology Diagram Assessment Objectives For an acceptable Case Study, the student must
More informationInstalling CMX 10.5 on Cisco MSE 3375
Installing CMX 10.5 on Cisco MSE 3375 Contents Introduction Prerequisites Requirements Components Used Installation CIMC configuration and KVM launch CMX image installation CMX initial setup CMX node installation
More informationLab Troubleshooting VTP Configuration
Lab 4.4.3 Troubleshooting VTP Configuration Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask S1 VLAN 99 172.17.99.11 255.255.255.0 S2 VLAN 99 172.17.99.12 255.255.255.0
More informationConfiguring Logging. Information About Logging CHAPTER
74 CHAPTER This chapter describes how to configure and manage logs for the ASA, and includes the following sections: Information About Logging, page 74-1 Licensing Requirements for Logging, page 74-5 Prerequisites
More informationLab Managing Router Configuration Files with Terminal Emulation Software
Lab Managing Router Configuration Files with Terminal Emulation Software Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A
More informationRecovery Procedure for Cisco Digital Media Manager 5.2
CHAPTER 1 Recovery Procedure for Cisco Digital Media Manager 5.2 Revised: May 3, 2010, This document provides the information that you require to recover from a software failure of the Cisco Digital Media
More informationNetwork Controller 3500 Quick Start Guide
Network Controller 3500 Quick Start Guide Firmware Version 1.00.82 1. Configuring the Controller 1.1. Connect to the Controller: The default LAN IP Address of the Controller is: IP: 192.168.1.1 Set you
More informationTo access the Startup Wizard, choose one of the following options: Wizards > Startup Wizard.
This chapter describes the ASDM, which guides you through the initial configuration of the Cisco ASA and helps you define basic settings. Access the, on page 1 Guidelines for the, on page 1 Screens, on
More informationHigh Availability on the SonicWALL TZ 210
High Availability on the SonicWALL TZ 210 Document Scope This document describes how to configure and manage the High Availability feature for the SonicWALL TZ 210 security appliance. This document contains
More information