Routing Route Maps Prefix List PBR Route Redistribution Mpls
Routing Route Maps Prefix List PBR Route Redistribution Mpls
Routing Route Maps Prefix List PBR Route Redistribution Mpls
Prefix List
PBR
Route Redistribution
MPLS
Cisco Security Appliance Technology and Features
Firewalls
Cisco PIX Security Appliance and ASA Adaptive Security Appliance Families
Models and Features of Cisco Security Appliances
PIX Security Appliance Licensing
ASA adaptive Security Appliance Licensing
Cisco Firewall Services Module
Object Grouping
Overview of Object Grouping
Getting Started with Object Groups
Configuring Object Groups
Nested Object Groups
VPN Configuration
Secure VPNs
IPSec
Internet Key Exchange
Data Encryption Standard
Triple Data Encryption Standard
Advanced Encryption Standard
Diffie-Hellman
Message Digest 5
Secure Hash Algorithm-1
RSA Signature
Certificate Authority
Security Association
How IPSec Works
Configure VPN Connection Parameters
IPSec Configuration Tasks
Task 1: Prepare to Configure VPN Support
Create IKE Policies for a Purpose
Define IKE Policy Parameters
Task 2: Configure IKE Parameters
Task 3: Configure IPSec Parameters
Task 4: Test and Verify VPN Configuration
Scale Security Appliance VPNs
Failover
Understanding Failover
Serial Cable-Based Failover Configuration
Active/Standby LAN-Based Failover Configuration
Active/Active Failover Configuration
8
Contents
Introduction to Check Point Technology
Describe Check Point’s unified approach to network management and the key elements of this architecture
Design a distributed environment using the network detailed in the course topology
Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology
Deployment Platforms
Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
Deploy Gateways using sysconfig and cpconfig from the Gateway command line
Using SmartUpdate
Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
Upgrade and attach product licenses using SmartUpdate
Identity Awareness
Use Identity Awareness to provide granular level access to network resources
Acquire user information used by the Security Gateway to control access
Define Access Roles for use in an Identity Awareness rule
Implement Identity Awareness in the Firewall Rule Base
Module 4 Creating , Installing Guest O.S & Managing Virtual Machines (VM)
Different ways to install Virtual Machines.
Creating Virtual Machine with fresh O.S install.
Deploying virtual Machine from Templates,
Cloning VM
Downloading VMs from Virtual Appliance Market Place.
Creating Library of ISO installation Medias.
Cloning Virtual Machines.
Managing VM- Adding & Removing devices.
Installing & Configuring VMware Tools.
Module 7 v Motion
What is vMotion
Need of vMotion
Prerequisites for vMotion.
Moving VM from one ESX Host to other ESX Host.
S.NO F5 LTM
1 Installation & Initial Access
2 Load Balancer
3 Monitors
4 Profiles
5 Persistence
6 Processing SSL Traffic
7 Lab
8 NAT & SNAT
9 iRules
10 Configuring a Redundant Pair
11 High Availability
12 Managing BIG IP LTM
S.NO Implement C- Series Standalone
1 Implement C- Series Rackservers
2 Implement Firmware Updates
3 Configure CIMC
4 Configure N/W & Storage Connectivity
5 Provision Harddrives
6 Install Esxi on local Hard Drives
7 Configure Logging and Monitoring the method for CISCO UCS