Routing Route Maps Prefix List PBR Route Redistribution Mpls

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 24

Routing Route Maps

Prefix List
PBR
Route Redistribution
MPLS
Cisco Security Appliance Technology and Features

Firewalls

Security Appliance Overview

Cisco PIX Security Appliance and ASA Adaptive Security Appliance Families
Models and Features of Cisco Security Appliances
PIX Security Appliance Licensing
ASA adaptive Security Appliance Licensing
Cisco Firewall Services Module

Getting Started with Cisco Security Appliances


User Interface
File Management
Security Appliance Security Levels
Basic Security Appliance Configuration
Examining Security Appliance Status
Time Setting and NTP Support
Syslog Configuration

Translations and Connections


Transport Protocols
Network Address Translation
Port Address Translation
Static NAT
Connections and Translations
Configuring Multiple Interfaces

Access Control Lists and Content Filtering


Malicious Active Code Filtering
URL Filtering
Botnet Filtering

Object Grouping
Overview of Object Grouping
Getting Started with Object Groups
Configuring Object Groups
Nested Object Groups

Authentication, Authorization, and Accounting


Installation of Cisco Secure ACS for Windows 2000
Security Appliance Access Authentication Configuration
Security Appliance Cut-Through Authentication Configuration
Tunnel Access Authentication Configuration
Authorization Configuration
Downloadable ACLs
Accounting Configuration

Switching and Routing


VLANs
Static and Dynamic Routing
OSPF
EIGRP
RIP
Route Redistribution

Modular Policy Framework


Modular Policy Overview
Configuring a Class Map
Configuring a Policy Map
Configuring a Service Policy

Advanced Protocol Handling


Advanced Protocol Handling
FTP Application Inspection
HTTP Application Inspection
Protocol Application Inspection

VPN Configuration
Secure VPNs
IPSec
Internet Key Exchange
Data Encryption Standard
Triple Data Encryption Standard
Advanced Encryption Standard
Diffie-Hellman
Message Digest 5
Secure Hash Algorithm-1
RSA Signature
Certificate Authority
Security Association
How IPSec Works
Configure VPN Connection Parameters
IPSec Configuration Tasks
Task 1: Prepare to Configure VPN Support
Create IKE Policies for a Purpose
Define IKE Policy Parameters
Task 2: Configure IKE Parameters
Task 3: Configure IPSec Parameters
Task 4: Test and Verify VPN Configuration
Scale Security Appliance VPNs

Configuring Security Appliance Remote Access


Introduction to Cisco Easy VPN
Overview of Cisco VPN Client
How Cisco Easy VPN Works
Configuring Users and Groups
Configuring the Easy VPN Server for Extended Authentication
Configure Security Appliance Hub-and-Spoke VPNs
Cisco VPN Client Manual Configuration Tasks
Transparent Tunneling
Allowing Local LAN Access
Adjusting the Peer Response Timeout Value
Working with the Cisco VPN Client

Configuring ASA for WebVPN


WebVPN Feature Overview
WebVPN End-User Interface
Configure WebVPN General Parameters
Configure WebVPN Servers and URLs
Configure WebVPN Port Forwarding
Configure WebVPN Content Filters and ACLs

Configuring Transparent Firewall


Transparent Firewall Mode Overview
Enabling Transparent Firewall Mode
Monitoring and Maintaining Transparent Firewall Mode

Configuring Security Contexts


Security Context Overview
Enabling Multiple Context Mode
Configuring a Security Context
Managing Security Contexts

Failover
Understanding Failover
Serial Cable-Based Failover Configuration
Active/Standby LAN-Based Failover Configuration
Active/Active Failover Configuration

Cisco Security Appliance Device Manager


ASDM Overview and Operating Requirements
Windows Requirements
General Guidelines
Prepare for ASDM
Navigating ASDM Configuration Windows
Navigating ASDM Multimode Windows

Managing Security Appliances


Managing System Access
Managing User Access Levels
Managing Software, Licenses, and Configurations
Image Upgrade and Activation Keys
N
ASA FIREWALL
Configuration and Basic Commands
Telnet & SSH
AAA & ACS Server
Object Grouping
Routing
Modular Policy Framwork
Context(Virtual Firewall)
Failover
VPN
Advanced Protocol Handling
1

8
Contents
Introduction to Check Point Technology
Describe Check Point’s unified approach to network management and the key elements of this architecture

Design a distributed environment using the network detailed in the course topology

Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology

Deployment Platforms

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line

Deploy Gateways using sysconfig and cpconfig from the Gateway command line

Introduction to the Security Policy


Given the network topology, create and configure network, host and gateway objects
Verify SIC establishment between the Security Manage-ment Server and the Gateway using SmartDashboard
Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
Configure NAT rules on Web and Gateway servers
Evaluate existing policies and optimize the rules based on current corporate requirements
Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime

Monitoring Traffic and Connections


Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality
Using SmartView Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity a
monitor remote user access based on corporate requirements

Using SmartUpdate
Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
Upgrade and attach product licenses using SmartUpdate

User Management and Authentication


Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
Manage users to access the corporate LAN by using external databases

Identity Awareness
Use Identity Awareness to provide granular level access to network resources
Acquire user information used by the Security Gateway to control access
Define Access Roles for use in an Identity Awareness rule
Implement Identity Awareness in the Firewall Rule Base

Introduction to Check Point VPNs


Configure a pre-shared secret site-to-site VPN with partner sites
Configure permanent tunnels for remote access to corporate resources
Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels
Concepts R-76 Gaio
1 Introduction to VPN*1 Welcome
2 Introduction to SPLAT Check Point Fundamentals
3 SmartDashboard and Objects Installing Gaia
4 NAT & VOIP Linking the Manager & FW
5 Traffic Monitoring and Connections Pushing Policy
6 Real Time Monitoring NAT
7 Reporting Tool Policy Packages & Database Versions
8 User Management and Authentication Smartview Tracker
9 Smart Directory Smartview Monitor
10 Checkpoint QOS LDAP
11 Smart Defence Identity Awareness
12 Content Inspection HTTPS Inspection
13 Disaster Recovery App Control and URL Filtering
14 CLI
15 IPSEC VPN's (Site to Site)
16 Backup and Recovery
17 Smart Update
18 Additional CheckPoint Features
19 CCSA Exam Success
20
S.No CCDA Books CCDA Nuggets

1 Network Design Methodologies CCDA Introdction


2 Network Structure Models Cisco SONA
3 Enterprise LAN Design N/W Design Method-1
4 Data Center Design N/W Design Method-2
5 Wireless LAN Design Network Model
6 WAN Technologies Cisco Tools
7 WAN Design Network Management
8 IPV4 Designing Enterprise Campus
9 IPV6 Designing Data center
10 RIP & EIGRP Designing WAN
11 OSPF, BGP, Route Manipulation & IP Multicast DSL & MPLS
12 Managing Security Qos
13 Security Solutions IP Address Design
14 Voice & Video Design Routing Protocol Design
15 Network Management Protocols Designing Security Solutions
16 Comprehensive Scenario Designing Voice Solutions
17 Final Preparation Microsoft Visio
Designing Wireless Solutions
VMWARE
Module 1 Overview of VMware v Sphere
Introduction to Virtualization
Benefits of Virtualization
history of VMware
VMware v Sphere Components
What is Cloud Computing
What is the role of VMware in Cloud Computing
How to create Private Cloud by using VMware v Sphere

Module 2 Installing VMware ESX i 5 Server


Role of ESX Host
Requirements for installing ESX i 5 Host
Installing of ESXi 5 Host
Initial configuration of ESX Host
Installing v Sphere client
Connecting to ESX Host from v Sphere Client

Module 3 VMware v Sphere v Center Server :


Role of v Center Server
Hardware & Software requirements for installing v Center Server
Selecting and installing Database (SQL /Oracle)
Installing v Center Server on Windows 2008 O.S
Installing v Center Server (VA)
Creating Datacenter ,Folders
Adding Hosts to v Center Server
Installing v Center Web Server
Accessing v Center from Web Browser from any Where

Module 4 Creating , Installing Guest O.S & Managing Virtual Machines (VM)
Different ways to install Virtual Machines.
Creating Virtual Machine with fresh O.S install.
Deploying virtual Machine from Templates,
Cloning VM
Downloading VMs from Virtual Appliance Market Place.
Creating Library of ISO installation Medias.
Cloning Virtual Machines.
Managing VM- Adding & Removing devices.
Installing & Configuring VMware Tools.

Module 5 VMware v Sphere Network Management


What is Virtual Networking
Adding Multiple NICs to ESX
Creating a separate Virtual Switch Network for Test VMs
Creating separate Network for Production VMs
Adding multiple NICs to Production Network.
Configuring VLANs
Creating & Configuring Networks for
v Motion
Storage.
Management Network.
Fault Tolerance.

Module 6 : VMware v Sphere Storage :


Types Storage supported by VMware v Sphere
Local Storage.
NAS/NFS Storage.
i SCSI Storage.
FC /SAN.
Adding multiple HDDs to ESX Hosts & Increasing Local Data store Size.
Configuring NAS/NFS Storage device.
Adding NAS /NFS Remote Storage to ESX Host.
Configuring i SCSI /FC/SAN Device
Adding i SCSI /FC/SAN Remote Storage to ESX Host.
Differences between VMFS4 &5
Different Disk Formats
Thick format
Thin format

Module 7 v Motion
What is vMotion
Need of vMotion
Prerequisites for vMotion.
Moving VM from one ESX Host to other ESX Host.

Module 8 s v (Storage) Motion


What is Storage v Motion
Need of Sv Motion
Requirements for Sv Motion
Moving VM Storage from one SAN to other SAN.

Module 9 HA ( High Availability) :


What is HA
Need of HA
Creating Cluster
Configuring Cluster for HA.
Configuring HA
How to reduce Down Time of Servers
Testing HA
Troubleshooting HA.
Module 10 Resources Management & DRS
What is Distributed Resource Scheduler
Allocating Resources to VM
MonitoringResources
Creating Resource Pool
Applying Resource Pool to VMs
Creating Cluster for DRS
Configuring DRS

Module 11 FT (Fault Tolerance )


What is FT
Need of FT
How to overcome Single Point Failures
How to provide 100% Zero Down time to your Network
Requirements for FT
Configuring FT
Testing & Troubleshooting FT.

Module 12 vSphere Security


What is vSphere Security
ESX Host level security
Creating Local Users & Groups in ESX Hosts
Creating Customized Roles
Applying Permissions & Roles
Integrating vCenter Server to Active Directory.
Creating AD Users & Groups
Creating Customized Roles in vCENTER Server
Applying Roles & Permissions in different levels.

Module 13 VMware v Sphere Backup & Recovery


What is the need of Backup & Restore
Installing VMware Backup Server
Configuring VMware Backup Server
Backup & Restoring VM

Module 14 P to V ( Physical to Virtual ) Data Center Migration


What is P to V Migration
Need of P to V Migration
Requirements for P to V Migration
Precautions to taken for P to V Migration.
Using of VMware Converter.
Creating OVF Templates for VMs
Module 15 Troubleshooting of VMware v Sphere
Trace out different problems in Host & VM
Installing & using VMware v Sphere Power CLI
Using of different commands to troubleshoot different issues
VMWARE
1.vMotion
2.svMotion
3.Standard Virtual Switch.
4.Distributed Virtual Switch.
5.Distributed Resource Scheduler(DRS)
6.Storage DRS.
7.VMHA(VMware High Availability)
8.Fault Tolerance(FT)
9.Storage I/O Control(SIOC).
10.Network I/O Control(NIOC).
11.Thick & Thin Provisioning.
12.DPM(Distributed Power Management)
13.VMFS.
14.Data Recovery.
15.Hot Add
16.Update Manager.
17.Host Profiles.
x

S.NO F5 LTM
1 Installation & Initial Access
2 Load Balancer
3 Monitors
4 Profiles
5 Persistence
6 Processing SSL Traffic
7 Lab
8 NAT & SNAT
9 iRules
10 Configuring a Redundant Pair
11 High Availability
12 Managing BIG IP LTM
S.NO Implement C- Series Standalone
1 Implement C- Series Rackservers
2 Implement Firmware Updates
3 Configure CIMC
4 Configure N/W & Storage Connectivity
5 Provision Harddrives
6 Install Esxi on local Hard Drives
7 Configure Logging and Monitoring the method for CISCO UCS

Configure CISCO UCS B-Series Connectivity


1 Configure B-Series Overall Connectivity
2 Implement UCS B-Series Component Installation
3 Configure B-Series LAN connectivity
4 Configure B-Series SAN connectivity

Manage CISCO UCS B-Series


1 Implement Security in a CISCO UCS
2 Steps for S/W & Firewall Upgrade in CISCO UCS
3 Implement Backup & Import of CISCO DB
4 Configure logging & Monitoring CISCO UCS
5 Configure Call home features in UCS
6 HA for Fabric Interconnect Cluster

Provision CISCO UCS Compute Resources


1 Provision Network Connectivity in UCS
2 Provision Storage Sources in UCS
3 Provision Resource Pools in UCS
4 Provision Resource Policies
5 Provision Service Policies
6 Provision O/S Parameters
7 Provision Base UCS System Configuration
8 Provision Virtual HBA's
9 Provision VNIC & VNIC Policies
10 Provision C-Series Integeration

Implement Cisco UCS Server Virtualisation


1 Provision UCS Integeration with VM Vcenter
2 Provision UCS VM-FEX
3 Provision Direct Path I/O
S.NO DATA CENTER
1 LISP
2 OTV
3 FABRIC PATH
4 VDC
5 FCOE
6 VRF
7 VPC
8 Adding Nexus 2k to Nexus 5k using VPC
9 Port Channel Configuration
S.NO AWS
1 AWS Foundations
2
3
4 EC2 - Creating an EC2 Instance
5
6
7
8
9
10 VPC - It's MY Cloud Now! Understanding AWS Network Management
11
12
13 S3 Foundations
14
15 Route 53 - DNS Management Made Easy
16 IAM - Creating and Managing User Access
17 AWS Case Study - CBT Nuggets Move to the Cloud
18 AWS - Series Wrap-up
Getting the Most from this Series
How to Build a Cloud Presence
Getting Started with AWS
AMI Selection
Pricing
Instance Types
Tags and Key Pairs
Security Groups
Elastic IPs and ELB
Part 1
Part 2
Part 3
Getting Started
Storage Working
VMWARE
1.vMotion
2.svMotion
3.Standard Virtual Switch.
4.Distributed Virtual Switch.
5.Distributed Resource Scheduler(DRS)
6.Storage DRS.
7.VMHA(VMware High Availability)
8.Fault Tolerance(FT)
9.Storage I/O Control(SIOC).
10.Network I/O Control(NIOC).
11.Thick & Thin Provisioning.
12.DPM(Distributed Power Management)
13.VMFS.
14.Data Recovery.
15.Hot Add
16.Update Manager.
17.Host Profiles.
Checkpoint Concepts R-76 Gaio Checkpoint
1 Introduction to VPN*1 Welcome
2 Introduction to SPLAT Check Point Fundamentals
3 SmartDashboard and Objects Installing Gaia
4 NAT & VOIP Linking the Manager & FW
5 Traffic Monitoring and Connections Pushing Policy
6 Real Time Monitoring NAT
7 Reporting Tool Policy Packages & Database Versions
8 User Management and Authentication Smartview Tracker
9 Smart Directory Smartview Monitor
10 Checkpoint QOS LDAP
11 Smart Defence Identity Awareness
12 Content Inspection HTTPS Inspection
13 Disaster Recovery App Control and URL Filtering
14 CLI
15 IPSEC VPN's (Site to Site)
16 Backup and Recovery
17 Smart Update
18 Additional CheckPoint Features
19 CCSA Exam Success
ASA FIREWALL
Configuration and Basic Commands
Telnet & SSH
AAA & ACS Server
Object Grouping
Routing
Modular Policy Framwork
Context(Virtual Firewall)
Failover
VPN
Advanced Protocol Handling

You might also like