Cisco Firewall Video Mentor (Video Learning)

  • Published: May 13, 2008
  • Copyright 2008
  • Dimensions: 7-1/2x9-1/8
  • Pages: 112
  • Edition: 1st
  • DVD
  • ISBN-10: 1-58720-198-4
  • ISBN-13: 978-1-58720-198-1

Register your product to gain access to bonus material or receive a coupon.

More Information

Audio & VideoDescriptionDownloadsReviewsSample Content

Product Description

“ The Cisco Firewall Video Mentor is an outstanding aide in learning to configure and understand the Cisco Adaptive Security Appliance. Whether you are a newcomer to the ASA or operationally experienced, these videos clearly explain and demonstrate how to configure and manage the ASA from the commandline and from the ASDM GUI.”

—Mark Macumber, Systems Engineer, Cisco

 

Cisco Firewall Video Mentor is a unique video product that provides you with more than five hours of personal visual instruction from best-selling author and lead network engineer David Hucaby. In the 16 videos presented on the DVD, David walks you through common Cisco® firewall configuration and troubleshooting tasks. Designed to develop and enhance hands-on skills, each 10–30 minute video guides you through essential configuration tasks on the Cisco ASA and FWSM platforms and shows you how to verify that firewalls are working correctly.

 

Lab Layout:

Each video lab presents objectives, dynamic lab topology diagrams, command syntax overviews, and video captures of command-line input and GUI configuration. All of this is coupled with thorough audio instruction by an industry expert making learning easy and engaging.

 

Network Animation:

Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.

Command-Line Interface (CLI) Video:

 

Video screencasts of ASA and FWSM CLI and the ASDM GUI demonstrate command entry, configuration techniques, and device response.

 

 

This video product is part of the Cisco Press® Video Mentor Series. The video products in this series present expert training from industry-leading instructors and technologists. This dynamic learning environment combines animations, screencasts, and audio instruction to help users bridge the gap between conceptual knowledge and hands on application.

 

 

System Requirements:

  • Microsoft Windows XP, 2000, or Vista
  • Apple OS 9 or later
  • Linux operating systems that have a web browser with Flash 7 or later plug-in
  • Speakers or headphones
  • Color display with a minimum 1024x768 resolution
  • 1 GHz or faster CPU recommended
  • DVD drive

Customer Reviews

7 of 7 people found the following review helpful
5.0 out of 5 stars Hucaby R-O-C-K-S!!! This one is a winner., July 26, 2008
By 
Darby B Weaver Jr. (Orlando, Florida United States) - See all my reviews
This review is from: Cisco Firewall Video Mentor (Video Learning) (Paperback)
I'm a fairly seasoned Cisco PIX/ASA Firewall Administrator. I've been around for a few years supporting several enterprise/campus networks and worked for a few Fortune 500 companies as the Firewall Administrator.

I love this product. Especially the clear and concise explanations for using multiple contexts.

These explanations are very clear and very much build on the previous topic. The author is clear and smooth in his expert delivery of the topic.

This is excellent. I own most of his books and I've used them on the job. But I never heard Huccaby deliver this material. He's top notch and clearly an expert's expert.

I think this product is an excellent value and would highly recommend it to anyone who supports with the Cisco ASA or the Cisco FWSM (Firewall Service Module).

Good job David.

Thanks for an excellent product I can easily recommend to others.

My sincerest compliments.

Darby Weaver
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


6 of 6 people found the following review helpful
5.0 out of 5 stars Cisco Firewall Video Mentor, June 13, 2008
This review is from: Cisco Firewall Video Mentor (Video Learning) (Paperback)
Cisco Firewall Video Mentor by David Hucaby published by Cisco Press (ISBN-13: 978-1-58720-198-1 / ISBN-10: 1-58720-198-4) covers various firewall configuration tasks associated with Cisco's Adaptive Security Appliance (ASA) through 16 instructional videos (also referred to as Lab 1 through Lab 16). A printed, ninety (90) page booklet accompanies the DVD. The booklet is also available in PDF format on the DVD. The booklet covers all 16 labs and is consistently formatted. The booklet format for each lab contains 4 sections. The first section describes the objectives of the lab. The second section contains the steps performed in the lab to complete the objectives. The third section contains the initial configuration prior to starting the lab. The fourth section is used as a reference to the video presentation of the lab.

The author uses the Command Line Interface (CLI) to demonstrate how to configure various tasks and many times uses the Graphical User Interface (GUI)... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


4 of 4 people found the following review helpful
5.0 out of 5 stars Excellent learning tool for the cisco firewall devices, September 29, 2008
This review is from: Cisco Firewall Video Mentor (Video Learning) (Paperback)
The Cisco Firewall Video Mentor (ISBN:1587201984) by David Hucaby is a step-by-step video training guide for configuring the PIX or ASA firewall and is a must for beginner and intermediate level engineers. Hucaby is a natural at teaching and the video and audio make for a smooth learning experience. It comes with a handy 90 page book that follows labs but is also a great command and process reference guide to keep at your desk.

Hucaby moves along fairly quickly so you never get bored and it's easy to stop the video if you need to do a bit more research. Because he moves at a perfect speed, I found myself watching areas that I was already familiar with because I wanted to see if there was something he might do differently. I never felt as though I had wasted my time after finishing any of the sections.

One thing I really like about this is you can be completely new to Cisco and he gives you the essential tools you need to know to hit the ground running. I feel... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 6 customer reviews...

Sample Pages

Download the sample pages

Table of Contents

Lab 1 Initial Configuration 1

Scenario 1

Initial Configurations 1

Video Presentation Reference 1

Step 1: Connect to the Firewall Console 2

Step 2: Explore the CLI Modes 2

Step 3: Search the CLI Output 3

Step 4: Set the Firewall Hostname and Domain Name 4

 

Lab 2 Configuring Interfaces 5

Scenario 5

Initial Configurations 5

Video Presentation Reference 5

Step 1: Set the Firewall Mode 6

Step 2: Configure Interface Parameters 6

Step 3: Configure a Physical Interface 6

Step 4: Configure a Redundant Interface 7

Step 5: Configure a Logical VLAN Interface 8

 

Lab 3 Setting Up Routing 11

Scenario 11

Initial Configurations 11

Video Presentation Reference 12

Step 1: Configure Static Routes 12

Step 2: Configure a Default Route 12

Step 3: Configure the Standby ISP 13

Step 4: Use a Dynamic Routing Protocol 14

 

Lab 4 Firewall Administration over the Network 15

Scenario 15

Initial Configurations 15

Video Presentation Reference 16

Step 1: Set Up Telnet Access 16

Step 2: Set Up SSH Access 17

Step 3: Set Up ASDM Access 17

Step 4: View ASDM Session Demonstration 18

 

Lab 5 Using Multiple Security Contexts 19

Scenario 19

Initial Configurations 19

Video Presentation Reference 19

Step 1: Enable Multiple Context Mode 19

Step 2: Create New Security Contexts 20

Step 3: Administer Contexts Through the CLI 22

Step 4: Configure Security Contexts and Their Interfaces 22

Step 5: Learn Context Arrangement 23

 

Lab 6 Using Failover for High Availability 25

Scenario 25

Initial Configurations 25

Video Presentation Reference 29

Step 1: Identify the Failover Role 29

Step 2: Set Up LAN-Based Failover 29

Step 3: Set Up Stateful Failover 31

Step 4: Tune the Unit Failover Threshold 31

Step 5: Set Up the Active-Active Failover Groups 32

Step 6: Define Context Interface Addresses 32

Step 7: Assign Contexts to the Two Failover Groups 34

Step 8: Bootstrap the Secondary Firewall Unit 35

Monitoring Failover Operation 35

 

Lab 7 Failover in Action 37

Scenario 37

Initial Configurations 38

Video Presentation Reference 38

Scenario 1: Physical Interface Failure 38

Scenario 2: Logical Interface Failure 38

Scenario 3: Failover Unit Failure 39

Scenario 4: Hitless Code Upgrade 39

 

Lab 8 Setting Up Address Translation and Connection Limits 45

Scenario 45

Initial Configurations 45

Video Presentation Reference 46

Step 1: Configure Static NAT 46

Step 2: Configure Policy NAT 47

Step 3: Configure Identity NAT 48

Step 4: Configure NAT Exemption 48

Step 5: Configure Dynamic NAT and PAT 49

Step 6: Set UDP and TCP Connection Limits 50

 

Lab 9 Setting Up Firewall Rules 51

Scenario 51

Initial Configurations 51

Video Presentation Reference 52

Step 1: Configure an Access List for the Inside Interface 52

Step 2: Configure an Access List for the Outside Interface 52

Step 3: Configure a Network Object Group 53

Step 4: Configure an Enhanced Service Object Group 54

Step 5: Configure an Access List to Use the Object Groups 55

 

Lab 10 Setting Up a DMZ 57

Scenario 57

Initial Configurations 57

Video Presentation Reference 58

Step 1: Consider Connections from the Inside Toward the DMZ 59

Step 2: Consider Connections from the DMZ Toward the Outside 59

Step 3: Consider Connections from the Outside Toward the DMZ 59

Step 4: Consider Connections from the DMZ Toward the Inside 60

Step 5: Review the DMZ Access List for Conflicting Entries 60

 

Lab 11 Setting Up Logging 63

Scenario 63

Initial Configurations 63

Video Presentation Reference 64

Step 1: Send Logging Messages to the Internal Buffer 65

Step 2: Send Logging Messages to an ASDM Session 65

Step 3: Send Logging Messages to a Syslog Server 66

 

Lab 12 Using MPF to Control Layer 3/4 Connections 67

Scenario 67

Initial Configurations 67

Video Presentation Reference 68

Step 1: Classify Interesting Traffic with a Class Map 69

Step 2: Define a Policy with a Policy Map 69

Step 3: Apply the Policy 70

Step 4: Monitor the Policy 70

Lab 13 Using MPF to Perform QoS Queuing and Policing 71

 

Scenario 71

Initial Configurations 71

Video Presentation Reference 72

Step 1: Send Traffic to the Priority Queue 72

Step 2: Use a Policer to Limit Bandwidth 73

 

Lab 14 Using MPF to Tune Application Inspection Engines 75

Scenario 75

Initial Configurations 75

Video Presentation Reference 76

Step 1: Enable an Inspection Engine 76

Step 2: Change the Inspection Engine Listening Port 77

Step 3: Use an Inspection Policy Map 77

Step 4: Use an Inspection Regex Match 78

 

Lab 15 Testing Security Policies with Packet Tracer 79

Scenario 79

Initial Configurations 79

Video Presentation Reference 83

Step 1: Send an Outbound ICMP Packet Through a Static Address Translation 83

Step 2: Send an Outbound ICMP Packet Through a Dynamic Address Translation 83

Step 3: Send an Inbound ICMP Packet 84

Step 4: Send an Outbound TCP Packet Through an Application Inspection Engine 84

 

Lab 16 Capturing Traffic 85

Scenario 85

Initial Configurations 85

Video Presentation Reference 89

Step 1: Configure a Raw Data Capture Through the CLI 89

Step 2: Configure an ASP Drop Capture Through the CLI 89

Step 3: Copy the Capture Buffer to an External Host 90

Step 4: Configure a Capture Session with ASDM 90

DRM-Free Video Downloads. Purchase and immediately download individual lessons from this video. Make your lesson selections below and click on the Buy button.

Videos can be viewed on: Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.

Lesson 1

Lab 1, Initial Configuration, Downloadable Version

Lab 1, “Initial Configuration”: This lab demonstrates how a new firewall can be configured for

the first time. The command-line interface (CLI) is used while the computer is connected to the

firewall console.

Duration: 00:17:45  File Size: 35MB

View exampleView example
$2.99

Lesson 2

Lab 2, Configuring Interfaces, Downloadable Version

Lab 2, “Configuring Interfaces”: This lab shows how the firewall mode (transparent or routed) is

set. Then a variety of firewall interfaces, both physical and logical, are configured.

Duration: 00:25:41  File Size: 53MB

View exampleView example
$4.99

Lesson 3

Lab 3, Setting Up Routing, Downloadable Version

Lab 3, “Setting Up Routing”: In this lab, sources of routing information are configured. Static

routes, default routes, standby ISPs, and the OSPF dynamic routing protocol are all demonstrated.

Duration: 00:20:28  File Size: 53MB

View exampleView example
$2.99

Lesson 4

Lab 4, Firewall Administration over the Network, Downloadable Version

Lab 4, “Firewall Administration over the Network”: This lab shows how a firewall can be configured

for remote management through Telnet, SSH, and ASDM sessions.

Duration: 00:18:50  File Size: 47MB

View exampleView example
$2.99

Lesson 5

Lab 5, Using Multiple Security Contexts, Downloadable Version

Lab 5, “Using Multiple Security Contexts”: This lab demonstrates how a single physical firewall

platform can be configured to run multiple instances of virtual firewalls or security contexts.

Duration: 00:25:23  File Size: 52MB

View exampleView example
$4.99

Lesson 6

Lab 6, Using Failover for High Availability, Downloadable Version

Lab 6, “Using Failover for High Availability”: In this lab, two firewalls are configured as a

failover pair. This enables them to operate in a redundant fashion, increasing their availability during

a failure.

Duration: 00:32:00  File Size: 75MB

View exampleView example
$4.99

Lesson 7

Lab 7: Failover in Action, Downloadable Version

Lab 7, “Failover in Action”: This lab demonstrates several different kinds of failures, triggering

the failover operation presented in Lab 6. A “hitless” upgrade is also shown, in which the operating

system of each firewall in a failover pair is upgraded without impacting the traffic passing

through.

Duration: 00:22:27  File Size: 89MB

View exampleView example
$4.99

Lesson 8

Lab 8: Setting Up Address Translation and Connection Limits, Downloadable Version

Lab 8, “Setting Up Address Translation and Connection Limits”: This lab shows examples of

six different ways to configure address translation on a firewall.

Duration: 00:22:48  File Size: 37MB

View exampleView example
$4.99

Lesson 9

Lab 9: Setting Up Firewall Rules, Downloadable Version

Lab 9, “Setting Up Firewall Rules”: In this lab, security policies are defined through access list

configuration. Furthermore, access lists are configured in a more organized, compact fashion with

object groups.

Duration: 00:28:03  File Size: 73MB

View exampleView example
$4.99

Lesson 10

Lab 10: Setting Up a DMZ, Downloadable Version

Lab 10, “Setting Up a DMZ”: This lab demonstrates how additional interfaces can be added to a

firewall, beyond the simple “inside” and “outside” interfaces.

Duration: 00:16:00  File Size: 33MB

View exampleView example
$2.99

Lesson 11

Lab 11: Setting Up Logins, Downloadable Version

Lab 11, “Setting Up Logging”: In this lab, a firewall is configured to generate and send logging

messages to a collection point. After they are collected, the messages can be analyzed, or they can

become a record for an audit trail.

Duration: 00:23:11  File Size: 77MB

View exampleView example
$4.99

Lesson 12

Lab 12: Using MPF to Control Layer 3/4 Connections, Downloadable Version

Lab 12, “Using MPF to Control Layer 3/4 Connections”: This lab demonstrates how the

Modular Policy Framework (MPF) is used to define a policy that sets connection limits on UDP

and TCP connections.

Duration: 00:20:57  File Size: 50MB

View exampleView example
$2.99

Lesson 13

Lab 13: Using MPF to Perform QoS Queuing and Policing, Downloadable Version

Lab 13, “Using MPF to Perform QoS Queuing and Policing”: In this lab, the MPF is used to

configure priority queuing policies that handle specific types of traffic more efficiently than other

traffic. In addition, policing is used to limit the bandwidth used by certain types of traffic

Duration: 00:19:09  File Size: 49MB

View exampleView example
$2.99

Lesson 14

Lab 14: Using MPF to Tune Application Inspection Engines, Downloadable Version

Lab 14, “Using MPF to Tune Application Inspection Engines”: This lab shows how a firewall

can be configured to change how it inspects traffic related to specific applications.

Duration: 00:18:35  File Size: 48MB

View exampleView example
$2.99

Lesson 15

Lab 15: Testing Security Policies with Packet Tracer, Downloadable Version

Lab 15, “Testing Security Policies with Packet Tracer”: This lab demonstrates the Packet Tracer

tool and how it can be used to verify a firewall’s configuration. A virtual packet is sent from one

interface to another, with a graphical display showing what happens to the packet at each step

along the way.

Duration: 00:11:34  File Size: 31MB

View exampleView example
$2.99

Lesson 16

Lab 16: Capturing Traffic, Downloadable Version

Lab 16, “Capturing Traffic”: In this lab, a firewall is configured to capture traffic for further

analysis. Both the CLI and ASDM are used to configure a capture session and to display the packets

captured.

Duration: 00:19:30  File Size: 71MB

View exampleView example
$2.99

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

DVD

This product currently is not for sale.

Buy

Downloadable Lessons   $69.99  $55.99

About this video

Accessible from your Account page after purchase. Requires the free QuickTime Player software.

Videos can be viewed on: Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.