Vi ste ovdje
Overview/Description
Cisco IOS Software on Cisco switches provides data plane security controls that can mitigate the risks that are associated with OSI Layer 2 attacks inside a VLAN. This course enables you to configure and verify several of the Cisco IOS Software security features that you can use to reduce these risks in your switched network environment. In an OSI Layer 3 device, the data plane implements packet-forwarding functions and applies services to packets as they are forwarded through the device. The Layer 3 data plane provides various OSI Layer 3 traffic-filtering to protect...
Overview/Description
Network address translation features allows you to establish connectivity between different networks, when IP addresses between the networks are not routable or are overlapping. Connectivity is achieved by translating IP addresses in IP packets. This course provides you with an overview, configuration, verification, and troubleshooting of NAT features on Cisco ASA 5500-X Series Next-Generation Firewalls and on Cisco IOS Software routers.
Target Audience
Anyone wishing to obtain the Implementing Cisco Edge Network Security Solutions (SENSS) v1.0 certification; one of...
Overview/Description
Firewall systems are the mainstream threat defense method based on network zoning and zone interface points filtering. Firewall systems can provide a set of effective methods to reduce risk to exposed services and business processes by using different traffic filtering approaches and technologies. This course describes firewall systems, and common filtering approaches and technologies that are found inside a firewall system. The Cisco Adaptive Security Appliance5500-X Series Next-Generation Firewalls provides the administrator with a set of access control methods that...
Overview/Description
Advanced Cisco Adaptive Security Appliance access policies allow security administrators to apply different policies to different types of traffic. For example, traffic coming from the Internet could be analyzed for any sign of malicious software. On the other hand, voice over IP traffic could be prioritized on all Cisco ASA interfaces to prevent delays and packet losses. The Cisco modular policy framework is a configuration tools which enables security administrators to assign different network policies to different traffic flows in flexible and granular manner. The MPF...
Overview/Description
The Cisco ASA 5500-X Series Next-Generation Firewalls use the Botnet Traffic Filter feature to detect and prevent botnet activity that is detected in transit traffic. The Botnet Traffic Filter feature detects and prevents traffic from bot-infected hosts to their control servers using a reputation-based mechanism. This course provides an overview of the Cisco ASA Botnet Traffic Filter, and explains how to configure and verify Cisco ASA Botnet Traffic Filter. Users in an enterprise often need access to one or more server resources and typically, a firewall is not aware of...
Overview/Description
Cisco IOS Software Threat Control features provide security controls that can establish flexible network access control policies between security domains (zones), into which enterprise networks are often partitioned. This course provides configuration, verification, troubleshooting, and general deployment guidelines for security controls that are available with Cisco IOS Threat Control features.
Target Audience
Anyone wishing to obtain the Implementing Cisco Edge Network Security Solutions (SENSS) v1.0 certification; one of four designed for the CCNP Security track...
Overview/Description
Dynamic routing protocols play an important role in the enterprise networks of today. There are several different protocols available, with each having its advantages and limitations. Protocols can be described and compared in regard to where they operate and how they operate. Three important characteristics that also influence routing protocol selection are convergence, support for summarization, and the ability to scale in larger environments. You can establish routing protocols over a variety of different network technologies. It is important to consider the...
Overview/Description
RIP is an interior gateway protocol that is used in smaller networks. It is a distance-vector routing protocol that uses hop count as a routing metric. There are three versions of RIP: RIPv1, RIPv2, and RIPng. RIPv1 and RIPv2 route in IPv4 networks. RIPng routes in IPv6 networks. EIGRP was developed as an enhanced version of the older IGRP and has many characteristics of the advanced interior gateway protocols, such as high-speed convergence, partial updates, and the possibility to support multiple network-layer protocols. The first step in configuring EIGRP is to...
Overview/Description
Once EIGRP neighbor relationships are established, the exchange of routing information begins. EIGRP uses Update packets to exchange this information. All the routing information received from neighbors is stored in an EIGRP topology table. EIGRP uses DUAL to calculate best routes to remote networks. In order for a route to be inserted into the routing table, it must satisfy the feasibility condition, which is used to prevent loops in the EIGRP networks. The route with the lowest metric to the destination becomes a candidate to be inserted into the routing table. If any...
Overview/Description
Originally created to route for IPv4, IPX, and AppleTalk, EIGRP was easily extended to advertise IPv6 routes. Although EIGRP for IPv6 shares much of the characteristics of the EIGRP for IPv4, it also has some unique specifics. One of the major differences between IPv4 and IPv6 EIGRP versions is the fact that you must explicitly enable EIGRP for IPv6 on each IPv6 enabled interface. Even though basic EIGRP configuration is pretty simple, configuring additional parameters can increase configuration complexity. Some parameters are configured in global configuration mode,...