Cisco ASA Firewall Deployment (ASAFW)

Seminarinformationen

Seminar - Ziel

This courses teaches students the implementation of both basic and advanced security solutions using the Cisco ASA Appliance by an in depth review of its broad feature set. After the course students will be able to design, impement and troubleshoot a secure and efficient Cisco ASA solution in their IT infrastructure. The course covers the following topics:

  • Overview of the basic Firewall technology, features, hardware models and licensing of the Cisco ASA solution.
  • Implementation and troubleshoot administrator access on the Cisco ASA
  • Network integration of the Cisco ASA by using the provided network features
  • Configuring and troubleshooting access priviliges with the Cisco ASA
  • Configuring and troubleshooting service policies
  • Configuring and troubleshooting identity based firewall features
  • Configuration and troubleshooting of failover and virtualization on the Cisco ASA

Teilnehmer - Zielgruppe

  • Security administrators responsible for design, implementation and troubleshooting of Firewalls.
  • Cisco customers who need detailed knowledge of the Cisco ASA Appliance

Kurs - Voraussetzungen

  • Solid knowledge of networking technologies and operating systems (e.g. CCNA)
  • Basic knowledge of Cisco network security

Seminardauer

  • 5 Tage
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Cisco ASA Adaptive Security Appliance Essentials

Evaluating Cisco ASA Adaptive Security Appliance Technologies

  • Firewalls and Security Domains
  • Firewall Technologies
  • Cisco ASA Adaptive Security Appliance Features
  • Summary

Identifying Cisco ASA Adaptive Security Appliance Families

  • Cisco ASA Adaptive Security Appliance Hardware
  • Cisco ASA 5500-X Hardware modules
  • Cisco ASA 5500-X Software modules
  • Summary

Identifying Cisco ASA Adaptive Security Appliance Licensing Options

  • Cisco ASA Adaptive Security Appliance Licensing Options
  • Cisco ASA Adaptive Security Appliance Licensing Requirements
  • Summary

Basic Connectivity and Device Management

Preparing the ASA for Network Integration

  • Managing the Cisco ASA Adaptive Security Appliance Boot Process
  • Managing the Cisco ASA Adaptive Security Appliance Using the CLI
  • Managing the Cisco ASA Adaptive Security Appliance Using Cisco ASDM
  • Navigating Basic Cisco ASDM Features
  • Managing the Cisco ASA Adaptive Security Appliance Basic Upgrade

Managing Basic Cisco ASA Adaptive Security Appliance Network Settings

  • Managing Cisco ASA Adaptive Security Appliance Security Levels
  • Configuring and Verifying Basic Connectivity Parameters
  • Configuring and Verifying Interface VLANs
  • Configuring a Default Route
  • Configuring and Verifying the Cisco ASA Security Appliance DHCP Server
  • Troubleshooting Basic Connectivity

Configuring Cisco ASA Adaptive Security Appliance Device Management Features

  • Configuring and Verifying Basic Device Management Settings
  • File System Management Overview
  • Managing Cisco ASA Software and Feature Activation
  • Configuring and Verifying Time Settings
  • Configuring and Verifying Event and Session Logging
  • Configuring and Verifying Remote Management Channels
  • Configuring and Verifying AAA for Management Access
  • Troubleshooting AAA for Management Access

Network Integration

Configuring ASA NAT Features

  • NAT on Cisco ASA Software Version 8.3 and Later
  • NAT Changes in Cisco Software Version 8.3 and Later
  • Cisco ASA Software Version 8.3 and Later: Object Introduction
  • NAT Table Changes: Cisco ASA Software Version 8.3 and Later
  • Order of Operation: Cisco ASA Software Version 8.3 and Later
  • Configuring Object (Auto) NAT
  • Configuration Scenario
  • Configuring Static Translations Using Auto NAT
  • Configuring the Auto NAT Traffic Direction
  • Configuring Auto NAT: Static Port (Optional)
  • Static Translations Version 8.3 and Later
  • Configuring Dynamic Translations Using Auto NAT
  • Dynamic Translations Version 8.3 and Later
  • Show xlate command
  • Configuring Manual NAT
  • Configuration Scenario
  • Overlapping Networks Configuration Scenario
  • Configuring Translations Using Manual NAT After Auto NAT
  • NAT Table Cisco ASA Software Version 8.3 and Later
  • Manual Static NAT: Unidirectional Rule
  • Manual NAT: Inserting Rule in Specific Location
  • General Deployment Guidelines
  • Tuning and Troubleshooting NAT on the ASA
  • Tuning Translation Idle Timeout (Optional)
  • Tuning Per-Session PAT
  • NAT Route-Lookup
  • Tuning Proxy-ARP
  • Static NAT DNS Rewrite Overview
  • Troubleshooting Flow
  • Packet Tracer Tool
  • Verify NAT configuration
  • Syslog Messages
  • Packet Processing Flow Diagram

Configuring ASA Basic Access Control Features

  • Connection Table and Local Host Table
  • Statefully Tracked Protocols
  • Examining the Connection Table
  • Basic Connection States
  • Administering the Connection Table
  • Local Host Table
  • Examining the Local Host Table
  • Administering the Local Host Table
  • State Table Logging
  • Configuring and Verifying Interface ACLs
  • Interface Access Rules Structure
  • Access Rule Statefulness
  • Configuring and Verifying Interface Access Rules and Interface Security Levels
  • Interface Access Rules Direction
  • Interface Access Rules Configuration Tasks
  • Task 1: Configure Access Rules on an Interface
  • Task 2: Optionally, Configure Time Ranges
  • Task 3: Optionally, Configure Time-Based Access Rules
  • Verify Access Rule Table
  • Interface Access Rules CLI Configuration
  • Verify Access Lists
  • Case Study: Access Rules on Three Interfaces
  • Managing Rules in Cisco ASDM
  • Managing Rules in the CLI
  • Implementation Guidelines
  • Configuring and Verifying Global ACLs
  • Case Study: Permit and Deny Specific Traffic
  • Configure Global ACL
  • Verify Global Configuration
  • View the Global ACL Configuration at the CLI
  • Configuring and Verifying Object Groups
  • Object Groups Configuration Tasks
  • Object Groups Configuration Scenario
  • Task 1: Optionally, Create Network Objects
  • Task 2: Create Network Object Groups
  • Task 3: Create Service Object Groups
  • Task 4: Use Object Groups in Access Rules
  • Object Groups CLI Configuration
  • Verifying Object Groups
  • Verifying Object Groups Using the CLI
  • Configuring and Verifying Public Servers
  • Configuring and Verifying Other Basic Access Controls
  • Cisco ASA Security Appliance uRPF Implementation
  • Configure uRPF on Cisco ASA Security Appliance Interfaces
  • Cisco ASA Security Appliance Shunning
  • Shunning CLI Configuration and Administration
  • Troubleshooting ACLs
  • Troubleshooting Flow
  • Syslog Messages
  • Correlate Access Rule to Log Messages
  • Using the Cisco ASDM Packet Tracer

Configuring ASA Routing Features

  • Static Routing
  • Static Routing Configuration Scenario
  • Create a Static or Default Route
  • Static Routing CLI Commands
  • Verify Static Routing
  • Policy Based Routing
  • Policy Based Routing Configuration
  • Management Routing
  • Multicast Support
  • IGMP vs. PIM
  • Cisco ASA Adaptive Security Appliance Multicast Features
  • Enabling Multicast Support
  • Multicast Support in ASDM

Configuring the ASA Transparent Firewall

  • Transparent Firewall Essentials
  • Transparent Firewall Configuration Tasks
  • Transparent Firewall Limitations
  • Transparent Firewall Outbound Data Flow
  • Transparent Firewall Outbound Data Flow with NAT
  • Transparent Firewall Inbound Data Flow
  • Configuring and Verifying Transparent Firewall Mode
  • Task 1: Change to Transparent Mode
  • Task 2: Configure BVIs
  • Task 3: Configure Interfaces
  • Task 4: Configure Management Access
  • Task 5: Configure Static Routes
  • Configuring and Verifying Transparent Firewall Layer 3 Through Layer 7 Access Controls
  • Transparent Firewall Default Security Policy
  • Allow Broadcast and Multicast Traffic
  • Allow Non-IP Traffic
  • Access Lists CLI Commands
  • Configuring and Verifying Transparent Firewall Layer 2 Access Controls
  • ARP Inspection
  • ARP Inspection Configuration Scenario
  • Task 1: Create Static ARP Mappings
  • Task 2: Enable ARP Inspection
  • ARP Inspection CLI Configuration
  • Verify ARP Inspection
  • MAC Address Table
  • Disable MAC Address Learning Configuration Scenario
  • Task 1: Disable Dynamic MAC Address Learning
  • Task 2: Configure MAC Address to Interface Mappings
  • Disable MAC Address Learning CLI Commands
  • Verify MAC Address Learning
  • Troubleshooting Transparent Firewall
  • Troubleshooting Flow

Cisco ASA Policy Control

Defining MPF on the ASA

  • Cisco MPF Overview
  • Cisco MPF Components
  • Cisco MPF Basic Configuration
  • Configuring and Verifying Layer 3 and Layer 4 Policies
  • OSI Layer 3 and Layer 4 Class Maps
  • OSI Layer 3 and Layer 4 Policy Map
  • Configuration Tasks:
  • Task 1: Create a Service Policy Rule
  • Task 2: Identify Traffic Class Map
  • Task 3: Assign Actions to Traffic
  • Task 3: Assign Actions to Traffic (Optional)
  • Configure OSI Layer 3 and Layer 4 Policies: CLI Commands
  • Verify OSI Layer 3 and Layer 4 Policies
  • Configuring and Verifying a Policy for Management Traffic
  • Configure Management Policies
  • Task 1: Create a Management Service Policy Rule
  • Task 2: Identify Traffic Class Map
  • Task 3: Assign Actions to Traffic
  • Configure Management Policies: CLI Commands

Configuring ASA Connection Policy and QoS Settings

  • Basic Stateful Inspection Tuning Features
  • Basic Procedures: Input Parameters
  • Basic Stateful Inspection Tuning Guidelines
  • Tuning Basic OSI Layer 3 and Layer 4 Inspection
  • Session Timers
  • Cisco ASA IP TTL Handling
  • Cisco ASA IP Fragment Handling
  • Tune Basic OSI Layers 3 and 4 Inspection: Configuration Scenario
  • Tune Basic OSI Layers 3 and 4 Inspection: CLI Configuration
  • Tune Basic OSI Layers 3 and 4 Inspection Guidelines
  • Configuring and Verifying Advanced Connection Settings
  • TCP State Bypass
  • Tune the Cisco ASA TCP Normalizer: Configuration Scenario
  • Tune the Cisco ASA TCP Normalizer: CLI Configuration
  • Tune the Cisco ASA TCP Normalizer Guidelines
  • TCP SYN flooding attack
  • TCP Intercept
  • Tasks 1–3: Set Maximum Number of Embryonic Connections
  • Configure Cisco TCP Intercept: CLI Commands
  • Verify Cisco TCP Intercept
  • Configure Connection Limits Overview
  • Configure Connection Limits: CLI Commands
  • Verify Connection Limits
  • Configuring and Verifying Support for Dynamic Protocols
  • Default Ports in the Default Inspection Class
  • Default Dynamic Inspectors in the Default Inspection Class
  • Inactive Dynamic Inspectors in the Default Inspection Class
  • Cisco WAAS Inspector
  • Support for Dynamic Protocols Configuration Scenario
  • Configure Support for Dynamic Protocols: CLI Configuration
  • Task 3: Optionally, Configure Support for Custom Dynamic Applications
  • Support for Dynamic Protocols Guidelines
  • Configuring the Botnet Traffic Filter
  • Botnet Traffic Filter and the Dynamic Database
  • Botnet Traffic Filter and the Static Database
  • Configure Cisco Botnet Traffic Filter
  • Configure Cisco Botnet Traffic Filter: CLI Commands
  • Verify Cisco Botnet Traffic Filter
  • Configuring QoS on the ASA Appliance
  • Traffic Policing
  • Traffic Policing Overview
  • Traffic Policing Configuration Tasks
  • Verify Traffic Policing
  • Priority Queuing Overview
  • Configuration Tasks
  • CLI Commands
  • Troubleshooting OSI Layer 3 and Layer 4 Inspection
  • Troubleshooting Flow
  • Syslog Messages
  • TCP Normalizer Troubleshooting
  • Advanced Dynamic Inspector Troubleshooting

Configuring ASA Advanced Application Inspections

  • Module Objectives
  • Layer 5 to Layer 7 Policy Control Overview
  • Application Layer Controls
  • Input Parameters
  • OSI Layers 5 to 7 (Application) Policies: Overview
  • OSI Layers 5 to 7 (Application): Class Map
  • OSI Layers 5 to 7 (Application): Policy-Map
  • OSI Layers 5 to 7 (Application): Regular Expressions
  • Regular Expressions Overview
  • Regular Expressions: Basics and Grouping
  • Regular Expressions: Character Choice
  • Regular Expressions: Special Character and Escaping
  • Regular Expressions: Repetition
  • Regular Expressions: Spaces and Boundaries
  • Enable OSI Layers 5 to 7 (Application) Policies
  • Configure OSI Layers 5 to 7 (Application): Configuration Tasks
  • Configure OSI Layers 5 to 7 Policies
  • Verify OSI Layers 5 to 7 Policies
  • Application Layer Access Control Guidelines
  • Configuring and Verifying HTTP Inspection
  • HTTP Request and Response
  • HTTP Request and Response Details
  • Request Inspection Options
  • URL Filtering
  • Configuration Tasks: Server Protection Example
  • Preconfigured Security Levels (Optional)
  • Verify HTTP Inspection: Examine Service Policy Statistics
  • HTTP Inspection Guidelines
  • Configuration Scenario: Client Protection Example
  • Configure HTTP Inspection: CLI Configuration
  • Configuring and Verifying FTP Inspection
  • FTP Inspect Maps: Detailed Inspection Parameters
  • FTP Inspect Maps: Detailed Custom Inspections
  • FTP Inspect Maps: Security Level Macros
  • Supporting Other Layer 5 to Layer 7 Applications
  • Overview of the Cisco Unified Communications Configuration Wizard
  • Evaluate Inspection of Other Protocols
  • Troubleshooting Application Layer Inspection
  • Troubleshooting Flow
  • Syslog Messages
  • Advanced Dynamic Inspector Troubleshooting

Describing the ASA Identity Firewall Solution

  • Cisco ASA Identity Firewall Benefits
  • Cisco ASA Identity Firewall Solution Components
  • Cisco ASA Identity Firewall Flow
  • Cisco Identity Firewall Policies
  • Cisco ASA Identity-Based MFP Policy
  • Summary
  • Setting Up CDA
  • Cisco CDA versus Active Directory Agent
  • CDA Hardware Appliance and VM Requirements
  • Cisco CDA Installation
  • Cisco CDA Setup
  • CDA Application Status Verification
  • CDA CLI Operations
  • CDA GUI
  • Configuring CDA
  • Active Directory Server Configuration
  • ASA Configuration
  • Syslog Server Configuration
  • CDA User-Account Configuration
  • CDA GUI User Accounts
  • CDA GUI Password Policy Configuration
  • Cisco CDA Session Timeout Configuration
  • IP-to-Identity Mapping Display
  • Registered-Device Verification
  • Configuring ASA Identity Firewall
  • User Object Group Configuration
  • FQDN Network Object Configuration
  • Identity Firewall with Cut-Through Proxy Use Case
  • Identity Firewall with Remote-Access VPN Use Case
  • Verifying and Troubleshooting Identity Firewall
  • CDA and Active Directory Server Connectivity Test
  • Show user-identity Command
  • Show user-identity Command for Cisco CDA Verification
  • Show user-identity Command for Active Directory User Verification
  • Show user-identity Command for Active Directory
  • Group Verification
  • Show All Activated Active Directory User Groups
  • Show user-identity Command for Memory-Usage Verification
  • Identity-Based Firewall Cisco ASDM Monitoring Panes
  • CDA Management with the CLI
  • CDA Live Log Monitoring
  • Cisco CDA Troubleshooting
  • Cisco CDA Open Ports

ASA High Availability and Virtualization Configuring ASA Interface Redundancy Features

  • Configuring and Verifying EtherChannel
  • EtherChannel Configuration
  • Configuration Scenario
  • Tasks 1–3: Configure an EtherChannel Interface
  • Configure EtherChannel: CLI Commands
  • Verify EtherChannel Interfaces: CLI Commands
  • Configuring and Verifying Redundant Interfaces
  • Cisco ASA Adaptive Security Appliance Redundant Interfaces General Deployment Guidelines
  • Redundant Interfaces Cabling Example
  • Redundant Interfaces Switchover
  • Interface Configuration
  • Configure Redundant Interfaces
  • Configure Redundant Interfaces: CLI Commands
  • Verify Redundant Interfaces: CLI Commands
  • Changing the Active Interface
  • Troubleshooting EtherChannel and Redundant Interfaces
  • Troubleshooting Flow
  • Verify Active EtherChannel
  • Troubleshoot Redundant Interfaces
  • Troubleshooting Flow
  • Verify the Switchover

Configuring ASA Active/Standby High Availability

  • Configuration Choices, Basic Procedures, and Required Input Parameters
  • Active Unit Election
  • Switchover Event
  • Failover Management
  • Failover Deployment Options
  • Failover Interfaces
  • Stateful Failover Support
  • Active/Standby Failover
  • Active/Standby Failover General Deployment Guidelines
  • Cisco ASA Security Appliance Failover Requirements
  • Configuring and Verifying Active/Standby Failover
  • Task 1: Cable Network Interfaces on Both Devices
  • Task 3: Configure Failover on the Secondary Device
  • Task 4: Configure Active and Standby IP Addresses
  • Primary Security Appliance: CLI Commands
  • Secondary Security Appliance: CLI Commands
  • Verify Active/Standby Failover
  • Forcing Failover: CLI Commands
  • Tuning and Managing Active/Standby Failover
  • Fixed Active/Standby MAC Addresses
  • Task 1: Change Failover Criteria
  • Task 2: Configure Fixed Active/Standby MAC Addresses
  • Tune Active/Standby Failover: CLI Commands
  • Zero-Downtime Failover Pair Upgrade
  • Zero-Downtime Upgrade Procedure
  • Remote Command Execution
  • Execute Remote Commands
  • Verify Configuration Mode
  • Troubleshooting Active/Standby Failover
  • Troubleshooting Flow
  • Verify Failover Peer
  • Syslog Messages

Configuring Security Contexts on the ASA

  • Multiple-Context Mode
  • ASA High Availability and Virtualization
  • Security Contexts
  • Security Contexts General Deployment Guidelines
  • Security Contexts Limitations
  • Configuring Security Contexts
  • Allocating Interfaces to a Context
  • Configure Security Contexts
  • Task 1: Enable Multiple Mode
  • Task 2: Create a Context
  • Task 3: Allocate Interfaces to the Context
  • Task 4: Specify the Startup Configuration Location
  • Configure Security Contexts: CLI Commands
  • Verifying and Managing Security Contexts
  • Changing Between Contexts in the CLI
  • Edit and Remove Security Context
  • Packet Classification
  • Packet Classification via MAC Addresses
  • Packet Classification via NAT Configuration
  • Assign Context-Specific MAC Addresses to an Interface
  • Assign Context-Specific MAC Addresses to an Interface: CLI Commands
  • Changing the Admin Context
  • Configuring and Verifying Resource Management
  • Resource Management Configuration Tasks
  • Configure Resource Management: CLI Commands
  • Troubleshooting Security Contexts
  • Troubleshooting Flow
  • Syslog Messages

Describing ASA Cluster Features

  • Cluster Performance Figures and Supported Platforms
  • Cluster Data-Interface Modes
  • Cluster Data-Interface Connections
  • CCL Functions
  • Cluster Master and Slave Unit Election
  • Centralized, Distributed, and Unsupported Cisco ASA Features
  • Cluster Dynamic-Routing Operations
  • Cluster NAT and PAT Operations
  • Summary
  • Describing ASA Cluster Terminology and Data Flows
  • Overview
  • Cluster Terminology
  • TCP Sequence Number Randomization
  • TCP Traffic Flows
  • Asymmetric UDP Traffic Flows
  • Short-Lived Traffic Flows
  • Centralized-Feature Traffic Flows
  • Traffic Flows with Secondary Connections
  • TCP Flow Rebalancing
  • Cluster Health-Check Mechanisms
  • Clustering with Multi-Context
  • Using the CLI to Configure a ASA Cluster
  • Overview
  • Cluster Configuration with the CLI
  • Cluster Interface-Mode Configuration on Each Unit
  • CCL Configuration on Each Unit
  • Cluster Management Interface Configuration from the Master Unit
  • Configuration from the Master Unit
  • Individual (Layer 3) Interface Configuration from the Master Unit
  • Cluster Bootstrap Configuration and Enabling
  • Clustering on Each Unit
  • Sample Configuration of a Two-Unit Cluster with Spanned EtherChannel Interface
  • Sample Configuration of a Two-Unit Cluster with Individual Interface
  • Cisco ASDM High Availability and Scalability Wizard
  • Verifying ASA Cluster Operations
  • Cluster Licensing
  • Cluster Interface-Mode Verification
  • Cluster Member-Status Verification
  • Cluster Health-Status Verification
  • Cluster Connections State Table Verification
  • Cluster EtherChannel Status Verification
  • Cluster Aggregated ACL Hit-Count Verification
  • Cluster Memory and CPU Usage Verification
  • Cluster Traffic-Distribution Verification
  • TCP Flow-Rebalancing Verification
  • Cluster Operation Verification via ASDM
  • Troubleshooting an ASA Cluster
  • Overview
  • Cluster Packet Captures
  • Cluster Syslog Messages
  • The debug cluster CLI Command
  • Cluster Crashinfo and Coredump
  • Split-Cluster Scenario

Appendix

Identifying Cisco ASA Adaptive Security Appliance Families

  • Legacy Cisco ASA 5500 Series Performance
  • Legacy Cisco ASA SSMs

Configuring ASA Routing Features

  • Dynamic Routing
  • How the Routing Table Is Populated
  • OSPF Configuration and Verification
  • OSPF Process Instances
  • OSPF Networks
  • OSPF Commands
  • OSPF Commands
  • OSPF Commands
  • EIGRP Configuration and Verification
  • EIGRP Process Instances
  • EIGRP Networks
  • EIGRP Commands

Configuring ASA Active/Active High Availability

  • Load Sharing of Unrelated Traffic Flows
  • Load Sharing of Related Traffic Flows
  • Active Failover Group Election
  • Failover Links
  • General Deployment Guidelines
  • Configuring and Verifying Active/Active Failover
  • Configure Active/Active Failover:
  • Task 2: Enable Multiple-Context Mode
  • Task 3: Create Security Context
  • Task 5: Assign Contexts to Failover Groups
  • Task 7: Configure Failover on the Secondary Device
  • Task 8: Configure Standby IP Addresses
  • Configuration Replication
  • Verify Active/Active Failover: CLI Commands
  • Forcing Failover: CLI Commands
  • Tuning and Managing Active/Active Failover
  • Configure Support for Asymmetrically Routed Packets
  • Asymmetric Routing Support-CLI Commands
  • Change Failover Criteria-CLI Commands
  • Zero-Downtime Upgrade Procedure
  • Troubleshooting Active/Active Failover
  • Troubleshoot Active/Active Failover: Other Issues
Tags: Cisco

Weitere Schulungen zu Thema Cisco

Cisco Digital Network Architecture Implementation Workshop (DNAIW)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

After completing this course you will be able to: describe the vision and the strategy as well as the general concepts and components of the Digital Network Architecture solution, describe and realize the network automation with Cisco DNA Center and the integrated applications ...

Cisco Digital Network Architecture Implementation Essentials (DNAIE)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Course Objectives Upon completion of this course, you will be able to: Identify the Digital Network Architecture solution by describing the vision, strategy, general concepts and components of it, Implement network automation using Cisco APIC-EM and the built-in applications ...

Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX)

- u.a. in Hannover, Essen, Heidelberg, Mannheim, Virtual Classroom

The Configuring Cisco Nexus Switches (DCCNX) v1.0 course shows you how to install, configure, and manage Cisco Nexus Series Switch platforms using Cisco NX-OS to support highly available, secure, scalable virtualized data centers. Through expert instruction and hands-on ...

Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

- u.a. in Hamburg, Leipzig, Heidelberg, Virtual Classroom, Freiburg

The Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR 350-501) v1.0 course teaches you how to configure, verify, troubleshoot, and optimize next-generation, Service Provider IP network infrastructures. It provides a deep dive into Service ...