Lesson 1: Cisco FWSM Technology and Features
This lesson introduces the general functionality provided by firewalls and FWSM.
- Explain the functions of the three types of firewalls used to secure today’s computer networks
- Discuss the technology and features of Cisco FWSM
- There is no lab with this lesson.
Lesson 2: Cisco Firewall Services Module (FWSM) overview
This lesson discusses the similarities and differences between an FWSM
and a security appliance. The focus is on initializing the FWSM in a
Cisco Catalyst switch. - Describe the FWSM features and benefits
- Explain the similarities and differences between the FWSM and other Cisco Security Appliances
- Describe a typical deployment scenario for the FWSM
- Configure the switch VLANs
- Assign VLAN-group to a FWSM
- Configure the FWSM interfaces
- Lab 2: Configure the Catalyst 6500 switch to interact with the FWSM
Lesson 3: Getting Started with Cisco FWSM
This lesson describes how to get started with configuring a security appliance.
- User Interface
- File Management
- FWSM Security Levels
- Basic FWSM Configuration
- Examining FWSM Status
- Time Setting
- Syslog Configuration
- Lab 3: Configure the FWSM and Execute General Maintenance Commands
Lesson 4: Translations and Connections
This lesson discusses FWSM translations and connections, how the FWSM
processes TCP and User Datagram Protocol (UDP) traffic, and how to
configure dynamic and static address translations in a security
appliance.
- Transport Protocols
- Network Address Translation
- Port Address Translation
- Static Command
- TCP Intercept and Connection Limits
- Connections and Translations
- Configuring Multiple Interfaces
- Lab 4: Configuring Access Through the Security Appliance
Lesson 5: Access Control Lists and Content Filtering This
lesson discusses how to control access through the FWSM using access
control lists (ACLs). A general discussion of ACLs is provided, along
with detailed examples of special use ACLs. The lesson also discusses
how to configure the FWSM to filter malicious active codes and how to
configure URL filtering. - ACLs
- Malicious Active Code Filtering
- URL Filtering
- Lab 5: Configure ACLs on the Security Appliance
Lesson 6: Object Grouping
This lesson introduces object grouping concepts and how to use the
object-group command to configure object grouping. The various types of
object groups are explained, and the use and configuration of nested
object groups are covered in the final sections. - Overview of Object Grouping
- Getting Started with Object Groups
- Configuring Object Groups
- Nested Object Groups
- Lab 6: Configure Object Groups
Lesson 7: Authentication, Authorization, and Accounting
This lesson introduces FWSM authentication, authorization, and accounting (AAA) and how to configure AAA.
- Introduction to AAA
- FWSM Access Authentication Configuration
- FWSM Cut-Through Authentication Configuration
- Authorization Configuration
- Accounting Configuration
- There is no lab with this lesson.
Lesson 8: Modular Policy Framework
This lesson introduces modular policy framework and describes how to configure a modular policy.
- Modular Policy Overview
- Configuring a Class Map
- Configuring a Policy Map
- Configuring a Service Policy
- There is no lab with this lesson.
Lesson 9: Advanced Protocol Handling
This lesson introduces FWSM advanced protocol handling. The lesson
describes how to configure protocol inspection to include configuring
an inspection modular policy, defining an FTP map, defining an HTTP
map, and describing a number of the inspection protocols supported by
the security appliance.
- Advanced Protocol Handling
- FTP Application Inspection
- HTTP Application Inspection
- Protocol Application Inspection
- Multimedia Support
- Lab 9: Configure and Test Advanced Protocol Inspection on the Security Appliance
Lesson 10: Configuring Transparent Firewall This
lesson provides an overview and explanation of transparent firewall
mode. Enabling of transparent firewall and monitoring and maintenance
commands specific to the transparent firewall mode are also detailed. - Transparent Firewall Mode Overview
- Enabling Transparent Firewall Mode
- Monitoring and Maintaining Transparent Firewall Mode
- Lab 10: Configure FWSM Transparent Firewall
Lesson 11: Configuring Security Contexts
This lesson explains the purpose of security contexts and details how
to enable, configure, manage standard contexts and cascading contexts.
- Security Context Overview
- Enabling Multiple Context Mode
- Configuring a Security Context
- Managing Security Contexts
- Lab 11: Configure Security Contexts
Lesson 12: Failover
This lesson introduces FWSM failover options and how to configure them.
- Understanding Failover
- Active/Standby LAN-Based Failover Configuration
- Active/Active Failover Configuration
- Lab 12: Configure Failover
Lesson 13: Managing FWSM This lesson explains
how to secure system access to the FWSM and how to configure and use
local user authentication and command authorization. Password recovery
and file management are also covered. The lesson concludes by
explaining how to upgrade the FWSM image and activation keys.
- FWSM Architecture and management from C6K
- Managing System Access
- Managing User Access Levels
- Managing Software, Licenses, and Configurations
- Image Upgrade and Activation Keys
- Lab 13: Managing the Security Appliance
|