SlideShare a Scribd company logo
1 of 2
Cisco® Deploying Cisco® ASA VPN Solutions (VPN)

Duration:
5. Day(s)
Overview:
This course supports network security engineers goals in choosing, configuring, and
troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site-
to-site VPN features to reduce risk to IT infrastructure and its applications.

At Course Completion:
Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN
subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco
ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco
ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced
Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic
and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and
certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters
Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0)
Prerequisite(s) or equivalent knowledge:
   Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1)
   Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2)
   Cisco® Implementing Cisco® IOS Network Security (IINS)


Outline:
  Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying
  Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture
      Deploying Cisco ASA VPN Solutions (VPN)
      Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
      Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN
      Configuration Concepts
  Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions
      Deploying Basic Site-to-Site IPsec VPNs
      Deploying Certificate Authentication in Site-to-Site IPsec VPNs
      Deploying the Cisco IPsec VPN Client
      Deploying Basic Easy VPN Solutions
      Deploying Advanced Authentication in Cisco Easy VPN Solutions
      Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware
      Client
      Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN
      Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site-
      to-Site VPN
      Lab 2-3: Deploying Basic Easy VPN
      Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication
      Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy
      VPN Client
  Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
VPN Solutions
   Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution
   Advanced Deployment of the Cisco AnyConnect VPN Client
   Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs
   Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local
   Password Authentication
   Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA
   Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management
Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN
Solutions
   Deploying a Basic Clientless VPN Solution
   Deploying Advanced Application Access for Clientless SSL VPN
   Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN
   Customizing the Clientless SSL VPN User Interface and Portal
   Lab 4-1: Configuring Basic Clientless VPN Access
   Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs
   Lab 4-3: Customizing the SSL VPN Portal
Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions
   Deploying VPN Authorization, Access Control, and Accounting
   Deploying Cisco Secure Desktop in SSL VPNs
   Deploying Dynamic Access Policies
   Deploying High Availability and High Performance in SSL and IPsec VPNs
   Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters
   Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs
   Lab 5-3: Configuring a Load Balancing SSL VPN Cluster

More Related Content

More from bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
Security+
Security+Security+
Security+bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 

More from bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
Security+
Security+Security+
Security+
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Deploying cisco routers asa vpn solutions

  • 1. Cisco® Deploying Cisco® ASA VPN Solutions (VPN) Duration: 5. Day(s) Overview: This course supports network security engineers goals in choosing, configuring, and troubleshooting the majority of Cisco ASA adaptive security appliance remote access and site- to-site VPN features to reduce risk to IT infrastructure and its applications. At Course Completion: Skills the Student will Learn - Evaluate the Cisco ASA adaptive security appliance VPN subsystem - Deploy Cisco ASA adaptive security appliance IPsec VPN solutions - Deploy Cisco ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions - Deploy Cisco ASA adaptive security appliance clientless remote access VPN solutions - Deploy advanced Cisco ASA adaptive security appliance VPN solutions Technical Features of the Course - Basic and certificate-based site-to-site VPNs - Cisco Easy VPN - Local password authentication and certificate authority for SSL VPNs - Clientless VPNs - Load balancing SSL VPN clusters Certification VPN v1.0 is part of the CCNP Security track (VPN v1.0 exam is 642-647 VPN v1.0) Prerequisite(s) or equivalent knowledge: Cisco® Interconnecting Cisco® Networking Devices Part 1 (ICND1) Cisco® Interconnecting Cisco® Networking Devices Part 2 (ICND2) Cisco® Implementing Cisco® IOS Network Security (IINS) Outline: Lesson 1: Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem; Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Evaluating the Cisco ASA Adaptive Security Appliance Software Architecture Deploying Cisco ASA VPN Solutions (VPN) Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Applying Common Cisco ASA Adaptive Security Appliance Remote Access VPN Configuration Concepts Lesson 2: Deploying Cisco ASA Adaptive Security Appliance IPsec VPN Solutions Deploying Basic Site-to-Site IPsec VPNs Deploying Certificate Authentication in Site-to-Site IPsec VPNs Deploying the Cisco IPsec VPN Client Deploying Basic Easy VPN Solutions Deploying Advanced Authentication in Cisco Easy VPN Solutions Deploying the Cisco ASA 5505 Adaptive Security Appliance as an Easy VPN Hardware Client Lab 2-1: Deploying a Basic Cisco ASA Adaptive Security Appliance IPsec Site-to-Site VPN Lab 2-2: Deploying a Certificate-Based Cisco ASA Adaptive Security Appliance IPsec Site- to-Site VPN Lab 2-3: Deploying Basic Easy VPN Lab 2-4: Deploying Advanced Easy VPN Server with Certificate-based Authentication Lab 2-5: Deploying the Cisco ASA 5505 Adaptive Security Appliance as a Hardware Easy VPN Client Lesson 3: Deploying Cisco ASA Adaptive Security Appliance AnyConnect Remote Access
  • 2. VPN Solutions Deploying a Basic Cisco AnyConnect Full Tunnel SSL VPN Solution Advanced Deployment of the Cisco AnyConnect VPN Client Deploying Advanced Authentication in AnyConnect Full Tunnel SSL VPNs Lab 3-1: Configuring a Basic Cisco AnyConnect Full Tunnel SSL VPN Using Local Password Authentication Lab 3-2: Configuring a Basic AnyConnect Full Tunnel SSL VPN Using the Local CA Lab 3-3: Deploying the Cisco AnyConnect Client with Centralized Management Lesson 4: Deploying Cisco ASA Adaptive Security Appliance Clientless Remote Access VPN Solutions Deploying a Basic Clientless VPN Solution Deploying Advanced Application Access for Clientless SSL VPN Deploying Advanced Authentication and Single Sign-On in a Clientless SSL VPN Customizing the Clientless SSL VPN User Interface and Portal Lab 4-1: Configuring Basic Clientless VPN Access Lab 4-2: Configuring Advanced Application Access in Clientless SSL VPNs Lab 4-3: Customizing the SSL VPN Portal Lesson 5: Deploying Advanced Cisco ASA Adaptive Security Appliance VPN Solutions Deploying VPN Authorization, Access Control, and Accounting Deploying Cisco Secure Desktop in SSL VPNs Deploying Dynamic Access Policies Deploying High Availability and High Performance in SSL and IPsec VPNs Lab 5-1: Deploying SSL VPN Access Policies and Authorization Parameters Lab 5-2: Deploying Cisco Secure Desktop and DAP in SSL VPNs Lab 5-3: Configuring a Load Balancing SSL VPN Cluster