Cisco Firewall Video Mentor (Video Learning)

Cisco Firewall Video Mentor (Video Learning)

Your browser doesn't support playback of this video. Please download the file to view it.

Add To My Wish List
  • Copyright 2008
  • Edition: 1st
  • DVD
  • ISBN-10: 1-58720-198-4
  • ISBN-13: 978-1-58720-198-1

Register your product to gain access to bonus material or receive a coupon.

  • Buy Lessons
  • Description
  • Downloads
  • Sample Content
  • Updates

DRM-Free Video Downloads. Purchase and immediately download individual lessons from this video. Make your lesson selections below and click on the Buy button.

Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec. Requires the free QuickTime Player software.

Lesson 1

Lab 1, Initial Configuration, Downloadable Version

Lab 1, “Initial Configuration”: This lab demonstrates how a new firewall can be configured for

the first time. The command-line interface (CLI) is used while the computer is connected to the

firewall console.

Duration: 00:17:45  File Size: 35 MB

View example View example
$9.99

Lesson 2

Lab 2, Configuring Interfaces, Downloadable Version

Lab 2, “Configuring Interfaces”: This lab shows how the firewall mode (transparent or routed) is

set. Then a variety of firewall interfaces, both physical and logical, are configured.

Duration: 00:25:41  File Size: 53 MB

View example View example
$9.99

Lesson 3

Lab 3, Setting Up Routing, Downloadable Version

Lab 3, “Setting Up Routing”: In this lab, sources of routing information are configured. Static

routes, default routes, standby ISPs, and the OSPF dynamic routing protocol are all demonstrated.

Duration: 00:20:28  File Size: 53 MB

View example View example
$9.99

Lesson 4

Lab 4, Firewall Administration over the Network, Downloadable Version

Lab 4, “Firewall Administration over the Network”: This lab shows how a firewall can be configured

for remote management through Telnet, SSH, and ASDM sessions.

Duration: 00:18:50  File Size: 47 MB

View example View example
$9.99

Lesson 5

Lab 5, Using Multiple Security Contexts, Downloadable Version

Lab 5, “Using Multiple Security Contexts”: This lab demonstrates how a single physical firewall

platform can be configured to run multiple instances of virtual firewalls or security contexts.

Duration: 00:25:23  File Size: 52 MB

View example View example
$9.99

Lesson 6

Lab 6, Using Failover for High Availability, Downloadable Version

Lab 6, “Using Failover for High Availability”: In this lab, two firewalls are configured as a

failover pair. This enables them to operate in a redundant fashion, increasing their availability during

a failure.

Duration: 00:32:00  File Size: 75 MB

View example View example
$9.99

Lesson 7

Lab 7: Failover in Action, Downloadable Version

Lab 7, “Failover in Action”: This lab demonstrates several different kinds of failures, triggering

the failover operation presented in Lab 6. A “hitless” upgrade is also shown, in which the operating

system of each firewall in a failover pair is upgraded without impacting the traffic passing

through.

Duration: 00:22:27  File Size: 89 MB

View example View example
$9.99

Lesson 8

Lab 8: Setting Up Address Translation and Connection Limits, Downloadable Version

Lab 8, “Setting Up Address Translation and Connection Limits”: This lab shows examples of

six different ways to configure address translation on a firewall.

Duration: 00:22:48  File Size: 37 MB

View example View example
$9.99

Lesson 9

Lab 9: Setting Up Firewall Rules, Downloadable Version

Lab 9, “Setting Up Firewall Rules”: In this lab, security policies are defined through access list

configuration. Furthermore, access lists are configured in a more organized, compact fashion with

object groups.

Duration: 00:28:03  File Size: 73 MB

View example View example
$9.99

Lesson 10

Lab 10: Setting Up a DMZ, Downloadable Version

Lab 10, “Setting Up a DMZ”: This lab demonstrates how additional interfaces can be added to a

firewall, beyond the simple “inside” and “outside” interfaces.

Duration: 00:16:00  File Size: 33 MB

View example View example
$9.99

Lesson 11

Lab 11: Setting Up Logins, Downloadable Version

Lab 11, “Setting Up Logging”: In this lab, a firewall is configured to generate and send logging

messages to a collection point. After they are collected, the messages can be analyzed, or they can

become a record for an audit trail.

Duration: 00:23:11  File Size: 77 MB

View example View example
$9.99

Lesson 12

Lab 12: Using MPF to Control Layer 3/4 Connections, Downloadable Version

Lab 12, “Using MPF to Control Layer 3/4 Connections”: This lab demonstrates how the

Modular Policy Framework (MPF) is used to define a policy that sets connection limits on UDP

and TCP connections.

Duration: 00:20:57  File Size: 50 MB

View example View example
$9.99

Lesson 13

Lab 13: Using MPF to Perform QoS Queuing and Policing, Downloadable Version

Lab 13, “Using MPF to Perform QoS Queuing and Policing”: In this lab, the MPF is used to

configure priority queuing policies that handle specific types of traffic more efficiently than other

traffic. In addition, policing is used to limit the bandwidth used by certain types of traffic

Duration: 00:19:09  File Size: 49 MB

View example View example
$9.99

Lesson 14

Lab 14: Using MPF to Tune Application Inspection Engines, Downloadable Version

Lab 14, “Using MPF to Tune Application Inspection Engines”: This lab shows how a firewall

can be configured to change how it inspects traffic related to specific applications.

Duration: 00:18:35  File Size: 48 MB

View example View example
$9.99

Lesson 15

Lab 15: Testing Security Policies with Packet Tracer, Downloadable Version

Lab 15, “Testing Security Policies with Packet Tracer”: This lab demonstrates the Packet Tracer

tool and how it can be used to verify a firewall’s configuration. A virtual packet is sent from one

interface to another, with a graphical display showing what happens to the packet at each step

along the way.

Duration: 00:11:34  File Size: 31 MB

View example View example
$9.99

Lesson 16

Lab 16: Capturing Traffic, Downloadable Version

Lab 16, “Capturing Traffic”: In this lab, a firewall is configured to capture traffic for further

analysis. Both the CLI and ASDM are used to configure a capture session and to display the packets

captured.

Duration: 00:19:30  File Size: 71 MB

View example View example
$9.99

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

Actual product comes full screen and in high resolution.

“ The Cisco Firewall Video Mentor is an outstanding aide in learning to configure and understand the Cisco Adaptive Security Appliance. Whether you are a newcomer to the ASA or operationally experienced, these videos clearly explain and demonstrate how to configure and manage the ASA from the commandline and from the ASDM GUI.”

—Mark Macumber, Systems Engineer, Cisco

Cisco Firewall Video Mentor is a unique video product that provides you with more than five hours of personal visual instruction from best-selling author and lead network engineer David Hucaby. In the 16 videos presented on the DVD, David walks you through common Cisco® firewall configuration and troubleshooting tasks. Designed to develop and enhance hands-on skills, each 10–30 minute video guides you through essential configuration tasks on the Cisco ASA and FWSM platforms and shows you how to verify that firewalls are working correctly.

Lab Layout:

Each video lab presents objectives, dynamic lab topology diagrams, command syntax overviews, and video captures of command-line input and GUI configuration. All of this is coupled with thorough audio instruction by an industry expert making learning easy and engaging.

Network Animation:

Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.

Command-Line Interface (CLI) Video:

Video screencasts of ASA and FWSM CLI and the ASDM GUI demonstrate command entry, configuration techniques, and device response.

This video product is part of the Cisco Press® Video Mentor Series. The video products in this series present expert training from industry-leading instructors and technologists. This dynamic learning environment combines animations, screencasts, and audio instruction to help users bridge the gap between conceptual knowledge and hands on application.

System Requirements:

  • Microsoft Windows XP, 2000, or Vista
  • Apple OS 9 or later
  • Linux operating systems that have a web browser with Flash 7 or later plug-in
  • Speakers or headphones
  • Color display with a minimum 1024x768 resolution
  • 1 GHz or faster CPU recommended
  • DVD drive

Sample Pages

Download the sample pages

Table of Contents

Lab 1 Initial Configuration 1

Scenario 1

Initial Configurations 1

Video Presentation Reference 1

Step 1: Connect to the Firewall Console 2

Step 2: Explore the CLI Modes 2

Step 3: Search the CLI Output 3

Step 4: Set the Firewall Hostname and Domain Name 4

Lab 2 Configuring Interfaces 5

Scenario 5

Initial Configurations 5

Video Presentation Reference 5

Step 1: Set the Firewall Mode 6

Step 2: Configure Interface Parameters 6

Step 3: Configure a Physical Interface 6

Step 4: Configure a Redundant Interface 7

Step 5: Configure a Logical VLAN Interface 8

Lab 3 Setting Up Routing 11

Scenario 11

Initial Configurations 11

Video Presentation Reference 12

Step 1: Configure Static Routes 12

Step 2: Configure a Default Route 12

Step 3: Configure the Standby ISP 13

Step 4: Use a Dynamic Routing Protocol 14

Lab 4 Firewall Administration over the Network 15

Scenario 15

Initial Configurations 15

Video Presentation Reference 16

Step 1: Set Up Telnet Access 16

Step 2: Set Up SSH Access 17

Step 3: Set Up ASDM Access 17

Step 4: View ASDM Session Demonstration 18

Lab 5 Using Multiple Security Contexts 19

Scenario 19

Initial Configurations 19

Video Presentation Reference 19

Step 1: Enable Multiple Context Mode 19

Step 2: Create New Security Contexts 20

Step 3: Administer Contexts Through the CLI 22

Step 4: Configure Security Contexts and Their Interfaces 22

Step 5: Learn Context Arrangement 23

Lab 6 Using Failover for High Availability 25

Scenario 25

Initial Configurations 25

Video Presentation Reference 29

Step 1: Identify the Failover Role 29

Step 2: Set Up LAN-Based Failover 29

Step 3: Set Up Stateful Failover 31

Step 4: Tune the Unit Failover Threshold 31

Step 5: Set Up the Active-Active Failover Groups 32

Step 6: Define Context Interface Addresses 32

Step 7: Assign Contexts to the Two Failover Groups 34

Step 8: Bootstrap the Secondary Firewall Unit 35

Monitoring Failover Operation 35

Lab 7 Failover in Action 37

Scenario 37

Initial Configurations 38

Video Presentation Reference 38

Scenario 1: Physical Interface Failure 38

Scenario 2: Logical Interface Failure 38

Scenario 3: Failover Unit Failure 39

Scenario 4: Hitless Code Upgrade 39

Lab 8 Setting Up Address Translation and Connection Limits 45

Scenario 45

Initial Configurations 45

Video Presentation Reference 46

Step 1: Configure Static NAT 46

Step 2: Configure Policy NAT 47

Step 3: Configure Identity NAT 48

Step 4: Configure NAT Exemption 48

Step 5: Configure Dynamic NAT and PAT 49

Step 6: Set UDP and TCP Connection Limits 50

Lab 9 Setting Up Firewall Rules 51

Scenario 51

Initial Configurations 51

Video Presentation Reference 52

Step 1: Configure an Access List for the Inside Interface 52

Step 2: Configure an Access List for the Outside Interface 52

Step 3: Configure a Network Object Group 53

Step 4: Configure an Enhanced Service Object Group 54

Step 5: Configure an Access List to Use the Object Groups 55

Lab 10 Setting Up a DMZ 57

Scenario 57

Initial Configurations 57

Video Presentation Reference 58

Step 1: Consider Connections from the Inside Toward the DMZ 59

Step 2: Consider Connections from the DMZ Toward the Outside 59

Step 3: Consider Connections from the Outside Toward the DMZ 59

Step 4: Consider Connections from the DMZ Toward the Inside 60

Step 5: Review the DMZ Access List for Conflicting Entries 60

Lab 11 Setting Up Logging 63

Scenario 63

Initial Configurations 63

Video Presentation Reference 64

Step 1: Send Logging Messages to the Internal Buffer 65

Step 2: Send Logging Messages to an ASDM Session 65

Step 3: Send Logging Messages to a Syslog Server 66

Lab 12 Using MPF to Control Layer 3/4 Connections 67

Scenario 67

Initial Configurations 67

Video Presentation Reference 68

Step 1: Classify Interesting Traffic with a Class Map 69

Step 2: Define a Policy with a Policy Map 69

Step 3: Apply the Policy 70

Step 4: Monitor the Policy 70

Lab 13 Using MPF to Perform QoS Queuing and Policing 71

Scenario 71

Initial Configurations 71

Video Presentation Reference 72

Step 1: Send Traffic to the Priority Queue 72

Step 2: Use a Policer to Limit Bandwidth 73

Lab 14 Using MPF to Tune Application Inspection Engines 75

Scenario 75

Initial Configurations 75

Video Presentation Reference 76

Step 1: Enable an Inspection Engine 76

Step 2: Change the Inspection Engine Listening Port 77

Step 3: Use an Inspection Policy Map 77

Step 4: Use an Inspection Regex Match 78

Lab 15 Testing Security Policies with Packet Tracer 79

Scenario 79

Initial Configurations 79

Video Presentation Reference 83

Step 1: Send an Outbound ICMP Packet Through a Static Address Translation 83

Step 2: Send an Outbound ICMP Packet Through a Dynamic Address Translation 83

Step 3: Send an Inbound ICMP Packet 84

Step 4: Send an Outbound TCP Packet Through an Application Inspection Engine 84

Lab 16 Capturing Traffic 85

Scenario 85

Initial Configurations 85

Video Presentation Reference 89

Step 1: Configure a Raw Data Capture Through the CLI 89

Step 2: Configure an ASP Drop Capture Through the CLI 89

Step 3: Copy the Capture Buffer to an External Host 90

Step 4: Configure a Capture Session with ASDM 90

DVD

  • Sorry, this book is no longer in print.
Not for Sale

Downloadable Video

  • Your Price: $119.99
  • List Price: $149.99
  • About this video
  • Accessible from your Account page after purchase. Requires the free QuickTime Player software.

    Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.

Unlimited one-month access with your purchase
Free Safari Membership