CISCO - Implementing Edge Network Security Solutions (SENSS) 300-206

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

CISCO –Implementing Edge Network

Security solutions (SENSS) 300-206


https://www.youtube.com/watch?v=E_IONrgNzrY

https://www.youtube.com/playlist?list=PLQtCOJjB5o-GtvMrd262RM97FYcbwHqc9

1- THREAT DEFENCE – 25%


 Implement firewall (ASA or IOS)
o Implement ACLs
o Implement static/dynamic NAT/PAT
 https://www.practicalnetworking.net/stand-
alone/cisco-asa-nat/

o Implement object groups
 https://ipwithease.com/object-groups-in-cisco-
asa/
 https://www.youtube.com/watch?
v=oNUsGNSfPks

o Describe threat detection features
https://grumpy-networkers-
journal.readthedocs.io/en/latest/VENDOR/CISCO/
FIREWALL/ASA/THREATDETECT.html

o Implement botnet traffic filtering


https://www.networkworld.com/article/2231950/evaluating-the-asa-
botnet-filter.html

https://www.youtube.com/watch?v=U2PCrXNa2I0

https://www.youtube.com/watch?v=rgBxqqtuE6M

o Configure app filtering and protocol inspection


https://www.youtube.com/watch?v=11al5q9jt_0
https://grumpy-networkers-
journal.readthedocs.io/en/latest/STUDY_NOTES/CISCO_SENSS/TOPICS.html

o Describe ASA security contexts


https://www.techrepublic.com/blog/data-
center/understand-the-pros-and-cons-of-using-cisco-
asa-multiple-context-mode/
https://www.youtube.com/watch?v=3UihGMh357I
 Implement Layer 2 security
o Configure DHCP snooping
https://www.theroutingtable.com/guide-to-dhcp-snooping/

o Describe dynamic ARP inspection


https://blog.ine.com/2010/03/14/arp-inspection-on-
transparent-asa
https://www.youtube.com/watch?v=eNJD8jRPNEk

o Describe storm control


o Configure Port security
o Describe common Layer 2 threats and attacks and
mitigation
o Describe MACSec
o Configure IP source verification
 Configure device hardening per best practices
o Routers
o Switches
o Firewalls
http://www.techspacekh.com/security-hardening-cisco-asa-firewall/
https://www.dionach.com/blog/cisco-asa-firewall-hardening

2- CISCO SECURITY DEVICES GUIs and Secured CLI


Management – 25%
 Implement SSHv2, HTTPS, and SNMPv3 access on network
devices
https://www.thegeekstuff.com/2013/08/enable-ssh-cisco/
https://ipwithease.com/how-to-configure-ssh-version-2-on-cisco-router/
https://www.grandmetric.com/knowledge-base/design_and_configure/cisco-asa-
enable-asdm-access-asa/
http://ciscorouterswitch.over-blog.com/article-how-to-configure-snmp-v3-on-cisco-
asa-and-ios-117417981.html
 Implement RBAC on the ASA/IOS using CLI and ASDM
No link
 Describe Cisco Prime Infrastructure
o Functions and use cases of Cisco Prime
o Device management
 Describe Cisco Security Manager (CSM)
o Functions and use cases of CSM
o Device Management
 Implement device Managers
o Implement ASA firewall features using ADSM
o

3- MANAGE SERVICES ON CISCO DEVICES – 12%


 Configure NetFlow exporter on Cisco Routers, Switches and
ASA
 Implment SNMPv3
o Creatr views, groups, users, authentication and
encryption
 Implement logging on Cisco Routers, switches and ASA using
best practices
 Implement NTP and authentication on Cisco Routers, switches
and ASA
 Describe CDP, DNS, SCP, SFTP and DHCP
o Describe security implicationsof using CDP on routers
and switches
o Need for dnssec

4- TROUBLESHOOT, MONITORING AND REPORTING TOOLS –


10%
 Monitoring firewall using analysis of packet tracer, packet
capture and syslog
o Analyze packet tracer on the firewall CLI\ADSM
o Configure and analyze packet capture using CLI\ADSM
o Analyze syslog events generated from ASA

5- THREAT DEFENSE ARCHITECTURES – 16%


 Design a Firewall solution
o High availability
o Basic concepts of security zoning
o Transparent & routed modes
o Security contexts
 Security Solutions
o Implement defenses against MAC, ARP, VLAN Hopping,
STP and DHCP rogue attacks
o Describe best practices for implementation
o Describe how PVLANs can be used to segregate network
traffic at layer 2

6- SECURITY COMPONENTS AND CONSIDERATIONS


 Describe security operations management architectures
o Single device manager vs multi-device manager
 Describe Data Center security components and considerations
o Virtualization and cloud security
 Describe Collaboration security components and considerations
o Basic ADA UC inspection features
 Describe common IPv6 security considerations
o Unified IPv6/IPv4 ACL on the ASA

You might also like