文章导航绿软下载站软件下载安卓资源苹果资源专题

您当前所在位置:首页IT认证考试思科认证 → 2009年4月起,CCIE安全Lab考查知识点

2009年4月起,CCIE安全Lab考查知识点

时间:2015/6/28来源:IT猫扑网作者:网管联盟我要评论(0)

  1. Implement secure networks using Cisco ASA Firewalls
  2. Perform basic firewall Initialization
  3. Configure device management
  4. Configure address translation (nat, global, static)
  5. Configure ACLs
  6. Configure IP routing
  7. Configure object groups
  8. Configure VLANs
  9. Configure filtering
  10. Configure failover
  11. Configure Layer 2 Transparent Firewall
  12. Configure security contexts (virtual firewall)
  13. Configure Modular Policy Framework
  14. Configure Application-Aware Inspection
  15. Configure high availability solutions
  16. Configure QoS policies

    1. Implement secure networks using Cisco IOS Firewalls
    2. Configure CBAC
    3. Configure Zone-Based Firewall
    4. Configure Audit
    5. Configure Auth Proxy
    6. Configure PAM
    7. Configure access control
    8. Configure performance tuning
    9. Configure advanced IOS Firewall features

    1. Implement secure networks using Cisco VPN solutions
    2. Configure IPsec LAN-to-LAN (IOS/ASA)
    3. Configure SSL VPN (IOS/ASA)
    4. Configure Dynamic Multipoint VPN (DMVPN)
    5. Configure Group Encrypted Transport (GET) VPN
    6. Configure Easy VPN (IOS/ASA)
    7. Configure CA (PKI)
    8. Configure Remote Access VPN
    9. Configure Cisco Unity Client
    10. Configure Clientless WebVPN
    11. Configure AnyConnect VPN
    12. Configure XAuth, Split-Tunnel, RRI, NAT-T
    13. Configure High Availability
    14. Configure QoS for VPN
    15. Configure GRE, mGRE
    16. Configure L2TP
    17. Configure advanced Cisco VPN features

    1. Configure Cisco IPS to mitigate network threats
    2. Configure IPS 4200 Series Sensor Appliance
    3. Initialize the Sensor Appliance
    4. Configure Sensor Appliance management
    5. Configure virtual Sensors on the Sensor Appliance
    6. Configure security policies
    7. Configure promiscuous and inline monitoring on the Sensor Appliance
    8. Configure and tune signatures on the Sensor Appliance
    9. Configure custom signatures on the Sensor Appliance
    10. Configure blocking on the Sensor Appliance
    11. Configure TCP resets on the Sensor Appliance
    12. Configure rate limiting on the Sensor Appliance
    13. Configure signature engines on the Sensor Appliance
    14. Use IDM to configure the Sensor Appliance
    15. Configure event action on the Sensor Appliance
    16. Configure event monitoring on the Sensor Appliance
    17. Configure advanced features on the Sensor Appliance
    18. Configure and tune Cisco IOS IPS
    19. Configure SPAN & RSPAN on Cisco switches

    1. Implement Identity Management
    2. Configure RADIUS and TACACS+ security protocols
    3. Configure LDAP
    4. Configure Cisco Secure ACS
    5. Configure certificate-based authentication
    6. Configure proxy authentication
    7. Configure 802.1x
    8. Configure advanced identity management features
    9. Configure Cisco NAC Framework

    1. Implement Control Plane and Management Plane Security
    2. Implement routing plane security features (protocol authentication, route filtering)
    3. Configure Control Plane Policing
    4. Configure CP protection and management protection
    5. Configure broadcast control and switchport security
    6. Configure additional CPU protection mechanisms (options drop, logging interval)
    7. Disable unnecessary services
    8. Control device access (Telnet, HTTP, SSH, Privilege levels)
    9. Configure SNMP, Syslog, AAA, NTP
    10. Configure service authentication (FTP, Telnet, HTTP, other)
    11. Configure RADIUS and TACACS+ security protocols
    12. Configure device management and security

    1. Configure Advanced Security
    2. Configure mitigation techniques to respond to network attacks
    3. Configure packet marking techniques
    4. Implement security RFCs (RFC1918/3330, RFC2827/3704)
    5. Configure Black Hole and Sink Hole solutions
    6. Configure RTBH filtering (Remote Triggered Black Hole)
    7. Configure Traffic Filtering using Access-Lists
    8. Configure IOS NAT
    9. Configure TCP Intercept
    10. Configure uRPF
    11. Configure CAR
    12. Configure NBAR
    13. Configure NetFlow
    14. Configure Anti-Spoofing solutions
    15. Configure Policing
    16. Capture and utilize packet captures
    17. Configure Transit Traffic Control and Congestion Management
    18. Configure Cisco Catalyst advanced security features

    1. Identify and Mitigate Network Attacks
    2. Identify and protect against fragmentation attacks
    3. Identify and protect against malicious IP option usage
    4. Identify and protect against network reconnaissance attacks
    5. Identify and protect against IP spoofing attacks
    6. Identify and protect against MAC spoofing attacks
    7. Identify and protect against ARP spoofing attacks
    8. Identify and protect against Denial of Service (DoS) attacks
    9. Identify and protect against Distributed Denial of Service (DDoS) attacks
    10. Identify and protect against Man-in-the-Middle (MiM) attacks
    11. Identify and protect against port redirection attacks
    12. Identify and protect against DHCP attacks
    13. Identify and protect against DNS attacks
    14. Identify 关键词标签:安全,Configure,and,I
  • 相关阅读

    文章评论
    发表评论

    热门文章 CCNA实验–NAT和PAT的配置CCNA实验–NAT和PAT的配置最新CCIE 路由交换实验考试大纲v4.0最新CCIE 路由交换实验考试大纲v4.0CCNA640-802:EIGRP实验真题详解CCNA640-802:EIGRP实验真题详解CCIE_LAB N6CCIE_LAB N6

    相关软件

    人气排行 CCNA(CCNP)和网络工程师有什么区别获得CCNA和CCNP及CCIE认证的必备条件和有效期CCIE找工作的七大职业走向CCNA-网络工程师面试题截至2008年3月25日,全球CCIE人数统计思科考试涨价调整通知 2008年6月24日CCNA实验–NAT和PAT的配置2008年CISSP认证考试时间及地点