CCIE Security Lab Expanded Blueprint 3.X

Bookmark this page and check back often for updates! As you can see it is very much a work in progress, but I will be making updates.
I. Implement secure networks using Cisco ASA Firewalls
A. Perform basic firewall Initialization
1. Restoring the Factory Default Configuration
a. configure factory-default [ip_address [mask]]
2. Saving Configuration Changes
a. write memory all [/noconfirm]
3. Setting the Login Password
a. Used for Telnet and SSH connections; default is cisco
b. {passwd | password} password
4. Setting the Enable Password
a. Default is blank
b. enable password password
5. Setting the Hostname
a. hostname name
6. Setting the Domain Name
a. Appended to unqualified names
b. Default is default.domain.invalid
c. domain-name name
7. Setting the Date and Time
a. NTP server will override any manually set time
b. clock timezone zone [-]hours [minutes]
c. clock summer-time zone date {day month | month day} year hh:mm {day month | month day} year hh:mm [offset]
d. clock summer-time zone recurring [week weekday month hh:mm week weekday month hh:mm] [offset]
e. ntp authenticate
ntp trusted-key key_id
ntp authentication-key key_id md5 key
ntp server ip_address [key key_id] [source interface_name] [pref er]
f. clock set hh:mm:ss {month day | day month} year
8. Configuring Ethernet Interfaces
a. interface physical_interface
speed {auto | 10 | 100 | 1000 | nonegotiate}
duplex {auto | full | half}
no shutdown
9. Configuring Fiber Interfaces
a. interface gigabitethernet 1/port
media-type sfp
speed nonegotiate
no shutdown
10. Configuring a Redundant Interface
a. interface redundant number
interface redundant number
redundant-interface redundantnumber active-member physical_interface
11. Configuring Interface Parameters
a. no shutdown
b. nameif
c. security-level
d. management-only
e. ip address
f. mac-address
12. Allowing Communication Between Interfaces of Same Security Level
a. same-security-traffic permit inter-interface
B. Configure device management
1. Local Database
a. username name {nopassword | password password [mschap]} [privilege
priv_level]
2. AAA Servers
a. aaa-server server_group protocol {kerberos | ldap | nt | radius |
sdi | tacacs+}
aaa-server server_group (interface_name) host server_ip
3. Allowing Telnet Access
a. telnet source_IP_address mask source_interface
4. Allowing SSH Access
a. crypto key generate rsa modulus modulus_size
write mem
ssh source_IP_address mask source_interface
5. Allowing HTTPS Access for ASDM
a. http source_IP_address mask source_interface
http server enable [port]
asdm image disk0:/asdmfile
6. Managing the Security Appliance on a Different Interface from the VPN Tunnel Termination Interface
a. management access management_interface
7. LDAP Authentication Support
C. Configure address translation (nat, global, static)
D. Configure ACLs
E. Configure IP routing
1. Static Routing
2. Default Routing
3. OSPF
4. RIP
a. Generating a default route
b. Disabling route summarization
c. Network filtering
d. Send and receive versions
e. RIP Authentication
5. EIGRP
6. Route Maps
7. Multicast Routing
a. Enabling
b. IGMP
c. Stub Multicast Routing
d. Static Multicast Routes
e. PIM Features
F. Configure object groups
1. Enhanced Service Object Groups
G. Configure VLANs
1. VLAN Support for RA VPN
H. Configure filtering
I. Configure failover
J. Configure Layer 2 Transparent Firewall
1. Transparent Firewall NAT
K. Configure security contexts (virtual firewall)
L. Configure Modular Policy Framework
M. Configure Application-Aware Inspection
N. Configure high availability solutions
O. Configure QoS policies
P. Cisco Secure Desktop
Q. Other Advanced Features
1. Local CA
2. Dynamic Access Policies
3. Inspection for Web/SSL VPN Traffic
4. Enahcned ASA protection (Threat Detection)
II. Implement secure networks using Cisco IOS Firewalls
A. Configure CBAC
1. CBAC Enhancements
B. Configure Zone-Based Firewall
C. Configure Audit
D. Configure Auth Proxy
E. Configure PAM
F. Configure access control
G. Configure performance tuning
H. Configure advanced IOS Firewall features
1. ACL IP Option Selective Drop
2. IOS L2 Transparent Firewall
3. Application Firewall
4. HTTP Inspection
5. HTTP Applications
6. Instant Messaging
7. Flexible Packet Matching
III. Implement secure networks using Cisco VPN solutions
A. Configure IPsec LAN-to-LAN (IOS/ASA)
B. Configure SSL VPN (IOS/ASA)
C. Configure Dynamic Multipoint VPN (DMVPN)
1. Advanced DMVPN
2. DMVPN Phase 3
D. Configure Group Encrypted Transport (GET) VPN
E. Configure Easy VPN (IOS/ASA)
1. EZVPN Enhancements
a. Multiple Inside/Outside Interfaces
b. Proxy DNS
c. Peer Hostname
d. VTI Support
e. DPD Enhancements
F. Configure CA (PKI)
1. IOS CA
a. OCSP
b. Subordinate/RA Mode IOS Certificate Server (CS) Rollover
c. Certificate ACLs
d. Key Rollover for Certificate Renewal
G. Configure Remote Access VPN
H. Configure Cisco Unity Client
I. Configure Clientless WebVPN
J. Configure AnyConnect VPN
K. Configure XAuth, Split-Tunnel, RRI, NAT-T
L. Configure High Availability
M. Configure QoS for VPN
N. Configure GRE, mGRE
O. Configure L2TP
P. Configure advanced Cisco VPN features
1. IPsec VPN Enhancements
a. VTI Support
b. Encrypted PSK
IV. Configure Cisco IPS to mitigate network threats
A. Configure IPS 4200 Series Sensor Appliance
B. Initialize the Sensor Appliance
1. Sensor Password Recovery
C. Configure Sensor Appliance management
D. Configure virtual Sensors on the Sensor Appliance
E. Configure security policies
F. Configure promiscuous and inline monitoring on the Sensor Appliance
G. Configure and tune signatures on the Sensor Appliance
H. Configure custom signatures on the Sensor Appliance
I. Configure blocking on the Sensor Appliance
J. Configure TCP resets on the Sensor Appliance
K. Configure rate limiting on the Sensor Appliance
L. Configure signature engines on the Sensor Appliance
M. Use IDM to configure the Sensor Appliance
N. Configure event action on the Sensor Appliance
O. Configure event monitoring on the Sensor Appliance
P. Configure advanced features on the Sensor Appliance
1. Threat Rating
2. Anomaly Detection
3. TCP Session Tracking Modes
4. Configuration via the IME
Q. Configure and tune Cisco IOS IPS
R. Configure SPAN & RSPAN on Cisco switches
V. Implement Identity Management
A. Configure RADIUS and TACACS+ security protocols
B. Configure LDAP
C. Configure Cisco Secure ACS
D. Configure certificate-based authentication
E. Configure proxy authentication
F. Configure 802.1x
G. Configure advanced identity management features
H. Configure Cisco NAC Framework
I. Per VRF AAA
J. PKI AAA Authorization
VI. Implement Control Plane and Management Plane Security
A. Implement routing plane security features (protocol authentication, route filtering)
B. Configure Control Plane Policing
C. Configure CP protection and management protection
D. Configure broadcast control and switchport security
E. Configure additional CPU protection mechanisms (options drop, logging interval)
F. Disable unnecessary services
G. Control device access (Telnet, HTTP, SSH, Privilege levels)
H. Configure SNMP, Syslog, AAA, NTP
I. Configure service authentication (FTP, Telnet, HTTP, other)
J. Configure RADIUS and TACACS+ security protocols
K. Configure device management and security
1. IOS Login Enhancements
2. IP Source Tracker
3. Role Based CLI
4. IOS Resilient Configuration
5. Buffer Overflow Detection and correction
6. Additional CPU protection mechanisms (options drop, logging interval)
VII. Configure Advanced Security
A. Configure mitigation techniques to respond to network attacks
B. Configure packet marking techniques
C. Implement security RFCs (RFC1918/3330, RFC2827/3704)
D. Configure Black Hole and Sink Hole solutions
E. Configure RTBH filtering (Remote Triggered Black Hole)
F. Configure Traffic Filtering using Access-Lists
G. Configure IOS NAT
H. Configure TCP Intercept
I. Configure uRPF
J. Configure CAR
K. Configure NBAR
L. Configure NetFlow
M. Configure Anti-Spoofing solutions
N. Configure Policing
O. Capture and utilize packet captures
P. Configure Transit Traffic Control and Congestion Management
Q. Configure Cisco Catalyst advanced security features
R. IOS Security Features
1. DHCP Secured/Authorized ARP
2. Router IP Traffic Export
3. Virtual Fragmentation and Reassembly
VIII. Identify and Mitigate Network Attacks
A. Identify and protect against fragmentation attacks
B. Identify and protect against malicious IP option usage
C. Identify and protect against network reconnaissance attacks
D. Identify and protect against IP spoofing attacks
E. Identify and protect against MAC spoofing attacks
F. Identify and protect against ARP spoofing attacks
G. Identify and protect against Denial of Service (DoS) attacks
H. Identify and protect against Distributed Denial of Service (DDoS) attacks
I. Identify and protect against Man-in-the-Middle (MiM) attacks
J. Identify and protect against port redirection attacks
K. Identify and protect against DHCP attacks
L. Identify and protect against DNS attacks
M. Identify and protect against Smurf attacks
N. Identify and protect against SYN attacks
O. Identify and protect against MAC Flooding attacks
P. Identify and protect against VLAN hopping attacks
Q. Identify and protect against various Layer2 and Layer3 attacks

0 comments:

About US

Network Bulls is Best Institute for Cisco CCNA, CCNA Security, CCNA Voice, CCNP, CCNP Security, CCNP Voice, CCIP, CCIE RS, CCIE Security Version 4 and CCIE Voice Certification courses in India. Network Bulls is a complete Cisco Certification Training and Course Coaching Institute in Gurgaon/Delhi NCR region in India. Network Bulls has Biggest Cisco Training labs in India. Network Bulls offers all Cisco courses on Real Cisco Devices. Network Bulls has Biggest Team of CCIE Trainers in North India, with more than 90% of passing rate in First Attempt for CCIE Security Version 4 candidates.
  • Biggest Cisco Training Labs in India
  • More than 90% Passing Rate in First Attempt
  • CCIE Certified Trainers for All courses
  • 24x7 Lab Facility
  • 100% Job Guaranteed Courses
  • Awarded as Best Network Security Institute in 2011 by Times
  • Only Institute in India, to provide CCIE Security Version 4.0 Training
  • CCIE Security Version 4 Training available
  • Latest equipments available for CCIE Security Version 4

Network Bulls Institute Gurgaon

Network Bulls Institute in Gurgaon is one of the best Cisco Certifications Training Centers in India. Network Bulls has Biggest Networking Training and Networking courses labs in North India. Network Bulls is offering Cisco Training courses on real Cisco Routers and Switches. Labs of Network Bulls Institute are 24x7 Available. There are many coaching Centers in Delhi, Gurgaon, Chandigarh, Jaipur, Surat, Mumbai, Bangalore, Hyderabad and Chennai, who are offering Cisco courses, but very few institutes out of that big list are offering Cisco Networking Training on real Cisco devices, with Live Projects. Network Bulls is not just an institute. Network Bulls is a Networking and Network Security Training and consultancy company, which is offering Cisco certifications Training as well support too. NB is awarded in January 2012, by Times, as Best Network Security and Cisco Training Institute for the year 2011. Network Bulls is also offering Summer Training in Gurgaon and Delhi. Network Bulls has collaboration with IT companies, from which Network Bulls is offering Networking courses in Summer Training and Industrial Training of Btech BE BCA MCA students on real Live projects. Job Oriented Training and Industrial Training on Live projects is also offered by network bulls in Gurgaon and Delhi NCR region. Network Bulls is also providing Cisco Networking Trainings to Corporates of Delhi, Gurgaon, bangalore, Jaipur, Nigeria, Chandigarh, Mohali, Haryana, Punjab, Bhiwani, Ambala, Chennai, Hyderabad.
Cisco Certification Exams are also conducted by Network Bulls in its Gurgaon Branch.
Network Bulls don't provide any Cisco CCNA, CCNP simulations for practice. They Provide High End Trainings on Real topologies for high tech troubleshooting on real Networks. There is a list of Top and best Training Institutes in India, which are providing CCNA and CCNP courses, but NB has a different image from market. Many students has given me their feedbacks and reviews about Network bulls Institute, but there were no complaints about any fraud from this institute. Network Bulls is such a wonderful place to get trained from Industry expert Trainers, under guidance of CCIE Certified Engineers.

About Blog

This Blog Contains Links shared by sites: Cisco Guides, Dumps collection, Exam collection, Career Cert, Ketam Mehta, GodsComp.co.cc.

NB

NB
Cisco Networking Certifications Training

Cisco Training in Delhi

ccna training in gurgaon. ccnp course institute in gurgaon, ccie coaching and bootcamp training near gurgaon and delhi. best institute of ccna course in delhi gurgaon india. network bulls provides ccna,ccnp,ccsp,ccie course training in gurgaon, new delhi and india. ccsp training new delhi, ccie security bootcamp in delhi.

Testimonials : Network Bulls

My Name is Rohit Sharma and i Have done CCNA and CCNP Training in Gurgaon Center of Network Bulls and it was a great experience for me to study in Network Bulls.

Cisco Networking Certifications

Myself Komal Verma and i took CCSP Training from Network Bulls in Gurgaon. The day i joined Network Bulls, the day i get addicted with Networking Technologies and I thank Mr. Vikas Sheokand for this wonderful session of Networking. :)
I must say that Network Bulls is Best Institute of CCNA CCNP CCSP CCIE Course Training in Gurgaon, New Delhi and in India too.
Komal Verma

About a wonderfull CCIE Training Institute in Gurgaon

I am Kiran shah from New Delhi. I have recently completed my CCNA CCNP & CCIE Training in Gurgaon from Network Bulls and i recommend Network Bulls for Cisco Training in India.

Kiran Shah

Cisco Coaching and Learning Center

Disclaimer: This site does not store any files on its server. I only index and link to content provided by other sites. If you see any file on server that is against copy right you can inform me at (sidd12341 [at] gmail.com). I will delete that materials within two days. This Website is not official Website of any Institute like INE, Network Bulls, IP Expert. Thanks

CCIE Security Version 4

Cisco Finally updated CCIE Security Lab exam blueprint. WSA Ironport and ISE devices are added in CCIE Security Version 4 Lab Exam Syllabus Blueprint. In Updated CCIE Security Version 4 Syllabus blueprint, new technologies like Mobile Security, VoIP Security and IPV6 Security along with Network Security, are added. As in CCIE Security Version 3 blueprint, Cisco had focused on Network Security only, but now as per market demand, Cisco is looking forward to produce Internet gear Security Engineer, not only Network Security engineers.
In CCIE Security Version 4 Bluerpint, Lab Exam is going to be more interested than before. What is Difference in CCIE Security Version 3 and Version 4? Just go through the CCIE Security Version 4 Lab Equipment and Lab Exam Syllabus Blueprints and find out!