Pre-Production Design
• Choose ASA Perimeter Security technologies/features to implement HLD based on given security requirements • Choose the correct ASA model to implement HLD based on given performance requirements • Create and test initial ASA appliance configurations using CLI • Determine which ASA licenses will be required based on given requirements
Complex Operations Support
• Optimize ASA Perimeter Security features performance, functions, and configurations • Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 stateful inspections, QoS policies, cut-thru proxy, threat detection, botnet detection/ filter using CLI and/or ASDM • Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM • Configure, verify and troubleshoot High Availability ASAs (A/S and A/A FO) operations using CLI and/or ASDM • Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASA using CLI and/or ASDM • Configure, verify and troubleshoot ASA transparent firewall operations using CLI • Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM
Describe Advanced Troubleshooting
• Advanced ASA security perimeter configuraiton/software/hardware troubleshooting using CLI and/or ASD fault finding and repairing
|