SlideShare uma empresa Scribd logo
1 de 2
Cisco® Deploying Cisco® ASA VPN Solutions (VPN)

Duration:
5. Day(s)
Overview:
This course supports network security engineers goals in choosing, configuring, and
troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site-
to-site VPN features to reduce risk to IT infrastructure and its applications.

At Course Completion:
Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN
subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco
ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco
ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced
Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic
and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and
certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters
Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0)
Prerequisite(s) or equivalent knowledge:
   Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1)
   Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2)
   Cisco® Implementing Cisco® IOS Network Security (IINS)


Outline:
  Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying
  Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture
      Deploying Cisco ASA VPN Solutions (VPN)
      Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
      Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN
      Configuration Concepts
  Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Deploying Basic Site-to-Site IPsec VPNs
      Deploying Certificate Authentication in Site-to-Site IPsec VPNs
      Deploying the Cisco IPsec VPN Client
      Deploying Basic Easy VPN Solutions
      Deploying Advanced Authentication in Cisco Easy VPN Solutions
      Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware
      Client
      Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN
      Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site-
      to-Site VPN
      Lab 2-3: Deploying Basic Easy VPN
      Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication
      Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy
      VPN Client
  Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
VPN Solutions
   Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution
   Advanced Deployment of the Cisco AnyConnect VPN Client
   Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs
   Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local
   Password Authentication
   Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA
   Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management
Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN
Solutions
   Deploying a Basic Clientless VPN Solution
   Deploying Advanced Application Access for Clientless SSL VPN
   Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN
   Customizing the Clientless SSL VPN User Interface and Portal
   Lab 4-1: Configuring Basic Clientless VPN Access
   Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs
   Lab 4-3: Customizing the SSL VPN Portal
Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions
   Deploying VPN Authorization, Access Control, and Accounting
   Deploying Cisco Secure Desktop in SSL VPNs
   Deploying Dynamic Access Policies
   Deploying High Availability and High Performance in SSL and IPsec VPNs
   Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters
   Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs
   Lab 5-3: Configuring a Load Balancing SSL VPN Cluster

Mais conteúdo relacionado

Mais de bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
Security+
Security+Security+
Security+bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 

Mais de bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
Security+
Security+Security+
Security+
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Deploying cisco routers asa vpn solutions

  • 1. Cisco® Deploying Cisco® ASA VPN Solutions (VPN) Duration: 5. Day(s) Overview: This course supports network security engineers goals in choosing, configuring, and troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site- to-site VPN features to reduce risk to IT infrastructure and its applications. At Course Completion: Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0) Prerequisite(s) or equivalent knowledge: Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1) Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2) Cisco® Implementing Cisco® IOS Network Security (IINS) Outline: Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture Deploying Cisco ASA VPN Solutions (VPN) Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN Configuration Concepts Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Deploying Basic Site-to-Site IPsec VPNs Deploying Certificate Authentication in Site-to-Site IPsec VPNs Deploying the Cisco IPsec VPN Client Deploying Basic Easy VPN Solutions Deploying Advanced Authentication in Cisco Easy VPN Solutions Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware Client Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site- to-Site VPN Lab 2-3: Deploying Basic Easy VPN Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy VPN Client Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
  • 2. VPN Solutions Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution Advanced Deployment of the Cisco AnyConnect VPN Client Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local Password Authentication Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN Solutions Deploying a Basic Clientless VPN Solution Deploying Advanced Application Access for Clientless SSL VPN Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN Customizing the Clientless SSL VPN User Interface and Portal Lab 4-1: Configuring Basic Clientless VPN Access Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs Lab 4-3: Customizing the SSL VPN Portal Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions Deploying VPN Authorization, Access Control, and Accounting Deploying Cisco Secure Desktop in SSL VPNs Deploying Dynamic Access Policies Deploying High Availability and High Performance in SSL and IPsec VPNs Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs Lab 5-3: Configuring a Load Balancing SSL VPN Cluster