Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)
|
|
|
- Kerry Eaton
- 9 years ago
- Views:
Transcription
1 Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW) Course Number: Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam : Implementing Secure Converged Wide Area Networks (ISCW) Course Overview The Implementing Secure Converged Wide Area Networks (ISCW) course covers topics on the Cisco hierarchical network model as it pertains to the WAN, teleworker configuration and access, frame mode MPLS, site to site IPSEC VPN, Cisco EZVPN, strategies used to mitigate network attacks, Cisco device hardening and IOS firewall features. Prerequisites Cisco CCNA Cisco CCNP (BSCI) Cisco CCNP (BCMSN) Audience The ISCW course is geared towards IT professionals with an advanced or journeyman knowledge of networks. Course Outline Course Introduction Chapter 1 Describing Network Requirements Describing Network Requirements The Cisco IIN and SONA Framework Intelligent Information Network Cisco SONA Framework Cisco SONA Layers Cisco Hierarchical Network Models Cisco Enterprise Architecture Cisco Hierarchical Network Model Example: Enterprise Network Requirements for Remote Connections in a Cisco Converged Network
2 Remote Site Requirements Example: Integrated Services for Secure Remote Access Chapter 1 Review Chapter 2 Connect Teleworkers Topologies for Facilitating Remote Connections Types of Remote Connection Topologies Remote Connection Topologies Enterprise Architecture Framework Remote Connection Options What are the Challenges to Connect the Telecommuter The Teleworker Components The SOHO/Telecommuter Solution The Issues Traditional vs. Telecommuter Section 1 Review Describing Cable Technology Terms used with Cable Technology Cable Technology Terms Cable System Standards Components of a Cable System Cable System Components Cable Features What Is Cable? Cable System Benefits Digital Signals over RF Channels DOCSIS Digital Signals over Radio Waves Sending Data over Cable Fiber Benefits HFC Architecture Data over Cable Cable Technology: The Whole Picture Putting Cable Technology Together Data Cable Technology Issues Process of Provisioning a Cable Modem Section 2 Review Describing DSL Technology DSL Features What Is a DSL? DSL Types DSL Variants DSL Variants Examples DSL Limitations DSL Limitation Factors DSL Distance Limitations ADSL
3 ADSL & POTS Coexistence ADSL Channels and Encoding CAP Modulation DMT Modulation Data over ADSL: PPPoE Data over ADSL PPP over Ethernet PPPoE Session Variables PPPoE Session Establishment Data over ADSL: PPPoA PPP over ATM Section 3 Review Configuring the CPE as the PPPoE or PPPoA Client Configuration of a Cisco Router as the PPPoE Client Configuring the CPE as the PPPoE Client over the Ethernet Interface CPE as the PPPoE Client over the Ethernet Interface Demo DHCP Server Settings/NAT Configurations Configuring the CPE as the PPPoE Client over the ATM Interface CPE as the PPPoE Client over the ATM Interface Configuration of a PPPoE Client PPPoE Client Configuration Configuring PPPoE Client Configuration of the PPPoE DSL Dialer Interface Configuring the PPPoE Dialer Interface Demo Setting up PPP Settings Configuration of PAT Port Address Translation Configure PAT PAT Configuration Configuration of DHCP to Scale DSL DHCP Server Configuration Configuration of a Static Default Route Configuring a Static Default Route Static Default Route Demo Setup a Router with Dialer Interface Commands Verifying a PPPoE Configuration Debug VPDN PPPoE Events Debug PPP Authentication Verify DHCP Clients Verify DHCP Server Verify PAT PPPoE Sample Configuration Configuration of a PPPoA DSL Connection DSL Configuration Overview PPPoE vs. PPPoA Configuration of the DSL ATM Interface
4 Configuring the DSL ATM Interface PPPoA Sample Configuration Section 4 Review Verifying Broadband ADSL Configurations Troubleshooting by the Layers Which Layer to Troubleshoot? OSI Layer 1 Issues Administratively Down State for an ATM Interface ATM Interface Status Correct DSL Operating Mode? Check the DSL Operating Mode. Is it Correct? OSI Layer 2 Issues Proper PPP Negotiation PPP Negotiation PPP Authentication Example Section 5 Review Chapter 3 Implement Frame Mode MPLS Introducing MPLS Networks The Concepts of the MPLS Model Typical VPN Topologies Basic MPLS Features Basic MPLS Concepts Example Switching Mechanisms of Routers Cisco IOS Platform Switching Mechanisms Standard IP Switching Review CEF Switching Review MPLS Architecture The Components of the MPLS Architecture Control Plane Components Example MPLS Labels Label Format Label Stack Frame Mode MPLS Label Switch Routers (LSRs) Label Switch Routers LSR Component Architecture Functions of LSRs Component Architecture of LSR Component Architecture of Edge LSR Section 1 Review Assigning MPLS Labels to Packets Allocation of Labels in the Frame Mode MPLS Environment Label Allocation in a Frame Mode MPLS Environment Building the IP Routing Table Allocating Labels LIB and LFIB Setup
5 Distribution and Advertisement of Labels Label Distribution and Advertisement Receiving Label Advertisement Interim Packet Propagation Further Label Allocation Receiving Label Advertisement Populating the LFIB Table Propagating Packets Across an MPLS Network Packet Propagation Across an MPLS Network Penultimate Hop Popping Before the Introduction of the PHP After the Introduction of the PHP Section 2 Review Implementing Frame Mode MPLS How to Configure IP CEF Step 1: Configure CEF Monitoring IP CEF How to Configure MPLS on the Frame Mode Interface Step 2: Configure MPLS on a Frame Mode Interface Configuring MPLS on a Frame Mode Interface How to Configure the MTU Size for Label Switching Step 3: Configure the MTU Size in Label Switching Configuring Label Switching MTU Section 3 Review MPLS VPN Technology What is a MPLS VPN? VPN Taxonomy VPN Models Frame Relay Example Overlay VPNs: Layer 3 Routing Peer to Peer VPNs Benefits of VPN Implementations Drawbacks of VPN Implementations Drawbacks of Peer to Peer VPNs The Architecture of the MPLS VPN MPLS VPN Architecture MPLS VPN Architecture: Terminology PE Router Architecture How Routing Information is Propagated Across the P Network Propagation of Routing Information Across the P Network Route Distinguishers Usage of RDs in an MPLS VPN VoIP Service Example VoIP Service Example: Connectivity Requirements Route Targets How Do RTs Work?
6 Routing Information Flow from End to End MPLS VPN Routing Requirements CE Router Perspective PE CE Routing Protocols MPLS VPN Routing: Overall Customer Perspective P Router Perspective PE Router Perspective End to End Routing Information Flow MPLS VPNs and Packet Forwarding VPN PHP Section 4 Review Chapter 4 IPsec VPNs IPsec Components and IPsec VPN Features Overview of IPSec What Is IPsec? IPsec Security Features IPsec Protocols IPsec Headers Peer Authentication Internet Key Exchange IKE Phases IKE Modes IKE: Other Functions Other IKE Functions The Problem with IPsec and NAT IPsec NAT Traversal Mode Configuration Easy VPN Xauth ESP and AH ESP and AH Header AH Authentication and Integrity ESP Protocol Tunnel and Transport Mode Message Authentication and Integrity Check Message Authentication and Integrity Check Using Hash Commonly Used Hash Functions Symmetric vs. Asymmetric Encryption Algorithms Key Lengths of Symmetric vs. Asymmetric Encryption Algorithms Security Level of Cryptographic Algorithms Symmetric Encryption: DES Symmetric Encryption: 3DES Symmetric Encryption: AES Asymmetric Encryption: RSA Diffie Hellman Key Exchange PKI Environment
7 Certificate Authority X.509 v3 Certificate PKI Message Exchange PKI Credentials Section 1 Review Site to Site IPsec VPN Operations Five Steps of IPsec Step 1: Interesting Traffic Step 2: IKE Phase 1 IKE Transform Sets Diffie Hellman Key Exchange Authenticate Peer Identity Step 3: IKE Phase 2 IPsec Transform Sets Security Associations SA Lifetime Step 4: IPsec Session Step 5: Tunnel Termination Configuring IPsec Configuration Steps for Site to Site IPsec VPN Site to Site IPsec Configuration: Phase 1 Phase 1 Site to Site IPsec Configuration: Phase 2 Phase 2 Site to Site IPsec Configuration: Apply VPN Configuration Site to Site IPsec Configuration: Interface ACL Demo Configuring VPN Information Section 2 Review Configuring IPsec Site to Site VPN Using SDM Introducing the SDM VPN Wizard Interface Cisco Router and SDM What Is Cisco SDM? Cisco SDM Features Introducing the SDM VPN Wizard Interface (Cont.) Site to Site VPN Components Launching the Site to Site VPN Wizard Quick Setup Step by Step Setup Connection Settings IKE Proposals Transform Set Defining What Traffic to Protect Option 1: Single Source and Destination Subnet Option 2: Using an ACL Completing the Configuration Review the Generated Configuration
8 Test Tunnel Configuration and Operation Monitor Tunnel Operation Advanced Monitoring Troubleshooting Demo Configuring a VPN Connection Section 3 Review High Availability Options High Availability for IOS IPsec VPNs Failures Redundancy Failure Detection Dead Peer Detection IPsec Backup Peer Configuration Example Hot Standby Routing Protocol HSRP for Default Gateway at Remote Site HSRP for Head End IPsec Routers IPsec Stateful Failover IPsec Stateful Failover Example Backing Up a WAN Connection with an IPsec VPN Section 4 Review Configuring GRE Tunnels over IPsec Generic Routing Encapsulation Default GRE Characteristics Optional GRE Extensions GRE Configuration Example Introducing Secure GRE Tunnels IPsec Characteristics GRE over IPsec GRE over IPsec Characteristics Configuring GRE over IPsec Site to SiteTunnel Using SDM Backup GRE Tunnel Information VPN Authentication Information Demo Create a GRE Tunnel over IPsec IKE Proposals Creating a Custom IKE Policy Transform Set Routing Information Option 1: Static Routing Option 2: Dynamic Routing Using EIGRP Completing the Configuration Review the Generated Configuration Test Tunnel Configuration and Operation Monitor Tunnel Operation Advanced Monitoring Troubleshooting
9 Section 5 Review Configuring Cisco Easy VPN and Easy VPN Server Using SDM Introducing Cisco Easy VPN Cisco Easy VPN Components Remote Access Using Cisco Easy VPN Describe Easy VPN Server and Easy VPN Remote Cisco Easy VPN Remote Connection Process Step 1: The VPN Client Initiates the IKE Phase 1 Process Step 2: The VPN Client Establishes an ISAKMP SA Step 3: The Cisco Easy VPN Server Accepts the SA Proposal Step 4: Easy VPN Server Initiates a Username and Password Challenge Step 5: The Mode Configuration Process Is Initiated Step 6: The RRI Process Is Initiated Step 7: IPsec Quick Mode Completes the Connection Cisco Easy VPN Server Configuration Tasks Cisco Easy VPN Server Configuration Tasks Using SDM Cisco Easy VPN Server Configuration Tasks for the Easy VPN Server Wizard Configuring Easy VPN Server VPN Wizards Enabling AAA Local User Management Creating Users Enable AAA Starting Easy VPN Server Wizard Select Interface (Terminating IPsec) IKE Proposals Transform Set Group Policy Confiurations GPC Options 1and 2 User Authentication: Option 1: Local User Database Local User Database Adding Users Option 2: External User Database via RADIUS Local Group Policies Advanced Options Completing the Configuration Review the Generated Configuration Verify the Easy VPN Server Configuration Monitoring Easy VPN Server Advanced Monitoring Troubleshooting Demo Using SDM to Configure an Easy VPN Server Section 6 Review Implementing the Cisco VPN Client Steps to Configure the Cisco VPN Client Tasks Use the Cisco VPN Client to Establish an RA VPN Connection and Verify the Connection Status
10 Tasks 1 3 Mutual Group Authentication Task 4: Configure Transparent Tunneling Routing Table Task 5: Enable and Add Backup Servers Configure Connection to the Internet Through Dial Up Networking Section 7 Review Chapter 5 Cisco Device Hardening Mitigating Network Attacks Cisco Self Defending Network Evolution of Cisco Self Defending Network Types of Network Attacks Reconnaissance Attacks and Mitigation Packet Sniffers Packet Sniffer Mitigation Port Scans and Ping Sweeps Port Scan and Ping Sweep Mitigation Internet Information Queries Access Attacks and Mitigation Access Attacks Password Attacks Password Attack Example Password Attack Mitigation Trust Exploitation Trust Exploitation Attack Mitigation Port Redirection Man in the Middle Attacks and Their Mitigation DoS Attacks and Mitigation DDoS Attacks DDoS Example DoS and DDoS Attack Mitigation IP Spoofing in DoS and DDoS Worm, Virus, and Trojan Horse Attacks and Mitigation Virus and Trojan Horse Attack Mitigation The Anatomy of a Worm Attack Mitigating Worm Attacks Application Layer Attacks and Mitigation Application Layer Attacks Netcat Netcat Example Mitigation of Application Layer Attacks Management Protocols and Vulnerabilities Configuration Management Configuration Management Recommendations Management Protocols Management Protocol Best Practices
11 Determining Vulnerabilities and Threats Blue s Port Scanner and Ethereal Section 1 Review Disabling Unused Cisco Router Network Services and Interfaces Which Services on a Router are Vulnerable Vulnerable Router Services and Interfaces Vulnerable Router Services Router Hardening Considerations Locking Down Routers with AutoSecure What is AutoSecure? AutoSecure Operation Modes AutoSecure Functions AutoSecure Failure Scenarios Demo Looking at AutoSecure AutoSecure Process Overview Start and Interface Selection Securing Management Plane Services Creating Security Banner Passwords and AAA SSH and Interface Specific Services Forwarding Plane, Verificaton and Deployment Locking Down Routers with the SDM Security Device Manager SDM Security Audit Overview SDM Security Audit: Main Window SDM Security Audit: Fix the Security Problems SDM One Step Lockdown: Main Window Section 2 Review Securing Cisco Router Installations and Administrative Access Configuring Router Passwords Password Creation Rules Initial Configuration Dialog Configure the Line Level Password Password Minimum Length Enforcement Enhanced Username Password Security Securing ROMMON with the No Password Recovery Command Setting a Login Failure Rate Authentication Failure Rate with Logging Setting a Login Failure Blocking Period Excluding Addresses from Login Blocking Setting a Login Delay Verifying Login Setting Timeouts Setting Timeouts for Router Lines Setting Multiple Privilege Levels Configuring Banner Messages
12 Configuring Role Based CLI Role Based CLI Overview Role Based CLI Details Getting Started with Role Based CLI Configuring CLI Views Configuring Superviews Role Based CLI Monitoring Role Based CLI Configuration Example Secure Configuration Files Secure Configuration Files Introduction Cisco IOS Resilient Configuration Feature Verification Demo Looking at Router Passwords Section 3 Review Mitigating Threats and Attacks with Access Lists What are Cisco ACLs? Standard and Extended ACLs Identifying ACLs Guidelinesfor Developing ACLs Applying ACLs to Interfaces on the Router Applying ACLs to Router Interfaces ACLs for Traffic Filtering Traffic Filtering How to Mitigate Threats with Traffic Filtering IP Address Spoofing Mitigation: Inbound IP Address Spoofing Mitigation: Outbound DoS TCP SYN Attack Mitigation: Blocking External Access DoS TCP SYN Attack Mitigation: Using TCP Intercept DoS Smurf Attack Mitigation Filtering Inbound ICMP Messages Filtering Outbound ICMP Messages Filtering UDP Traceroute Messages Mitigating DDoS with ACLs Basics of DDoS Attacks Mitigate DDoS Using Martians Filters DDoS Attack Mitigation: TRIN00 DDoS Attack Mitigation: Stacheldraht DDoS Attack Mitigation: Trinity v3 DDoS Attack Mitigation: SubSeven Combining Access Functions Best Practices for ACLs ACL Caveats Section 4 Review Securing Management and Reporting Features Secure Management and Reporting Planning Considerations Management and Reporting Planning Considerations Secure Management and Reporting Architecture
13 Information Paths In Band Management Considerations Secure Management and Reporting Guidelines Configuring an SSH Server for Secure Management and Reporting Using Syslog Logging for Network Security Implementing Log Messaging for Security Syslog Systems Cisco Log Severity Levels Log Message Format Configuring Syslog Logging Configuring Syslog Syslog Implementation Example SNMP Version 3 SNMPv1 and SNMPv2 Architecture Community Strings SNMP Security Models and Levels SNMPv3 Architecture SNMPv3 Operational Model SNMPv3 Features and Benefits Configuring an SNMP Managed Node SNMPv3 Configuration Task List Configuring the SNMP Server Engine ID Configuring the SNMP Server Group Names Configuring the SNMP Server Users Configuring the SNMP Server Hosts SNMPv3 Configuration Example Configuring NTP Client Understanding NTP Configuring NTP Authentication Configuring NTP Associations Configuring Additional NTP Options Configuring NTP Server Implementing NTP Server Configuring NTP Server (Cont.) NTP Configuration Example Demo Configurations for SSH Section 5 Review Configuring AAA on Cisco Routers What is AAA? Implementing AAA Router Access Modes RADIUS and TACACS+ AAA Protocols: RADIUS and TACACS+ RADIUS Authentication and Authorization RADIUS Messages RADIUS Attributes
14 RADIUS Features TACACS+ Authentication TACACS+ Network Authorization TACACS+ Command Authorization TACACS+ Attributes and Features Configuring the AAA Server How to configure AAA login on a Router with the CLI AAA Authentication Commands Character Mode Login Example How to configure AAA login on a Router with the SDM Enabling AAA in SDM Verifying AAA Login Authentication Commands Troubleshooting AAA Troubleshoot AAA Login Authentication on Cisco Routers Troubleshoot AAA Authentication Example AAA Authorization Commands Authorization Example Troubleshooting Authorization AAA Accounting Commands AAA Accounting Example Troubleshooting Accounting Section 6 Review Chapter 6 Cisco IOS Threat Defense Features Introducing the Cisco IOS Firewall Layered Defense Strategy DMZ Layered Defense Features Multiple DMZs Modern DMZ Design Firewall Technologies Packet Filtering Packet Filtering Example Application Layer Gateway ALG Firewall Device Stateful Packet Filtering Stateful Firewall Operation Stateful Firewalls SPF Handling of Different Protocols Introducing the Cisco IOS Firewall Feature Set The Cisco IOS Firewall Feature Set Cisco IOS Firewall Cisco IOS Authentication Proxy Cisco IOS IPS Cisco IOS Firewall Functions Cisco IOS ACLs Revisited Cisco IOS Firewall TCP Handling
15 Cisco IOS Firewall UDP Handling Cisco IOS Firewall Process How Cisco IOS Firewall Works Supported Protocols Alerts and Audit Trails Section 1 Review Implementing Cisco IOS Firewalls Configuring Cisco IOS Firewall from the CLI Cisco IOS Firewall Configuration Tasks Using the CLI Set Audit Trails and Alerts Define Inspection Rules for Application Protocols Apply an Inspection Rule to an Interface Guidelines for Applying Inspection Rules and ACLs to Interfaces Example: Two Interface Firewall Verifying Cisco IOS Firewall Troubleshooting Cisco IOS Firewall Demo Initial Security Settings Basic and Advanced Firewall Wizards Configuring a Basic Firewall Reviewing the Basic Firewall for the Originating Traffic Resulting Basic Firewall Inspection Rule Configuration Demo Inspection Options Demo Basic Firewall Settings Configuring Interfaces on an Advanced Firewall Configuring a DMZ on an Advanced Firewall Advanced Firewall DMZ Service Configuration Advanced Firewall Security Configuration Advanced Firewall Security Policy Complete the Configuration Advanced Firewall Configuration Summary and Deployment Viewing Firewall Activity Preparing for Firewall Activity Viewing Section 2 Review Introducing Cisco IOS IPS Introducing Cisco IOS IDS and IPS IDS Introduction IPS Introduction Combining IDS and IPS Types of IDS and IPS Systems Signature Based IDS and IPS Policy Based IDS and IPS Anomaly Based IDS and IPS Honeypot Network Based and Host Based IPS Network Based vs. Host Based IPS NIPS Features
16 NIDS and NIPS Deployment IDS and IPS Signatures Signature Categories Exploit Signatures Signature Examples Cisco IOS IPS Signature Definition Files Cisco IOS IPS SDFs Cisco IOS IPS Alarms Cisco IOS IPS Alarms: Configurable Actions Cisco IOS IPS Alarm Considerations Section 3 Review Configuring Cisco IOS IPS Cisco IOS IPS Configuration Steps Configure Basic IPS Settings Configure Enhanced IPS Settings Verifying IOS IPS Configuration Cisco IOS IPS SDM Tasks Selecting Interfaces and Configuring SDF Locations Launching the IPS Policies Wizard Demo Setting up an IPS Configuring IPS Policies and Global Settings IPS Policies Global Settings Viewing SDEE Messages Viewing All SDEE Messages Viewing SDEE Status Messages Tuning Signatures Selecting a Signature Editing a Signature Disabling a Signature Group Verifying the Tuned Signatures Section 4 Review Course Closure
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
CCNP: Implementing Secure Converged Wide-area Networks
CCNP: Implementing Secure Converged Wide-area Networks Cisco Networking Academy Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)
CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Cisco Certified Network Expert (CCNE)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title
Introduction The CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. This document will highlight exam topic changes between the current 640-554 IINS exam and the new 210-260
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security Course Number: 640-553 (IINS) Course Length: 5 Days Course Overview This instructor-led course focuses on the necessity of a comprehensive security policy and how
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab
Length 5 days Format Lecture/lab Version 3.0 SNRS Course Description SNRS 1.0 is a 5-day, lab-intensive course that provides the knowledge and skills needed to secure Cisco IOS router and switch networks.
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Securing Networks with Cisco Routers and Switches 1.0 (SECURE)
Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Cisco Router and Security Device Manager (SDM)
Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
Securing Networks with Cisco Routers and Switches (642-637)
Securing Networks with Cisco Routers and Switches (642-637) Exam Description: The 642-637 Securing Networks with Cisco Routers and Switches exam is the exam associated with the CCSP, CCNP Security, and
CCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems
Course Overview Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router s IPSec 3002 IKE 515 CA s Intrusion Detection Systems 4210 VPNs Routers 2 The security threats section will cover
Cisco Easy VPN on Cisco IOS Software-Based Routers
Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
CCNA Cisco Associate- Level Certifications
CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
IOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
Ficha técnica de curso Código: IFCAD111
Curso de: Objetivos: Managing Cisco Network Security: Building Rock-Solid Networks Dar a conocer la filosofía CISCO desde el punto de vista de la seguridad y como construir una red solidad. Como hacer
200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)
200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) Course Overview This course provides students with the knowledge and skills to successfully install, operate, and troubleshoot a small
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Cisco ASA. Administrators
Cisco ASA for Accidental Administrators Version 1.1 Corrected Table of Contents i Contents PRELUDE CHAPTER 1: Understanding Firewall Fundamentals What Do Firewalls Do? 5 Types of Firewalls 6 Classification
ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004
ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.
Point-to-Point GRE over IPsec Design and Implementation
CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Table of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Course Description The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x
Configuring Remote-Access VPNs via ASDM Created by Bob Eckhoff This white paper discusses the Cisco Easy Virtual Private Network (VPN) components, modes of operation, and how it works. This document also
