求学资讯 思科认证 提问
思科认证 > CCIE

CCIE安全实验考试大纲变动情况

来源:用户上传 上传用户:zhongzhanen 发布时间:2017-11-08

导读:
小编为您搜集整理了"CCIE安全实验考试大纲变动情况“,供您参考。

  Hardware

  Cisco 3800 Series Integrated Services Routers (ISR)

  Cisco 1800 Series Integrated Services Routers (ISR)

  Cisco Catalyst 3560 Series Switches

  Cisco ASA 5500 Series Adaptive Security Appliances

  Cisco IPS Series 4200 Intrusion Prevention System sensors

  Cisco Secure Access Control Server for Windows

  Software

  Cisco ISR Series running IOS Software Version 12.4T Advanced Enterprise Services feature set is used on all routers

  Cisco Catalyst 3560 Series Switches running Cisco IOS Software Release 12.2(44)SE or above

  Cisco ASA 5500 Series Adaptive Security Appliances OS Software Version 8.x

  Cisco IPS Software Release 6.1.x

  Cisco VPN Client Software for Windows, Release 5.x

  Cisco Secure ACS for Windows Version 4.1

  V3 Blueprint

  Ⅰ Implement secure networks using Cisco ASA Firewalls

  Perform basic firewall Initialization

  Configure device management

  Configure address translation (nat, global, static)

  Configure ACLs

  Configure IP routing

  Configure object groups

  Configure VLANs

  Configure filtering

  Configure failover

  Configure Layer 2 Transparent Firewall

  Configure security contexts (virtual firewall)

  Configure Modular Policy Framework

  Configure Application-Aware Inspection

  Configure high availability solutions

  Configure QoS policies

  Ⅱ Implement secure networks using Cisco IOS Firewalls

  Configure CBAC

  Configure Zone-Based Firewall

  Configure Audit

  Configure Auth Proxy

  Configure PAM

  Configure access control

  Configure performance tuning

  Configure advanced IOS Firewall features

  Ⅲ Implement secure networks using Cisco VPN solutions

  Configure IPsec LAN-to-LAN (IOS/ASA)

  Configure SSL VPN (IOS/ASA)

  Configure Dynamic Multipoint VPN (DMVPN)

  Configure Group Encrypted Transport (GET) VPN

  Configure Easy VPN (IOS/ASA)

  Configure CA (PKI)

  Configure Remote Access VPN

  Configure Cisco Unity Client

  Configure Clientless WebVPN

  Configure AnyConnect VPN

  Configure XAuth, Split-Tunnel, RRI, NAT-T

  Configure High Availability

  Configure QoS for VPN

  Configure GRE, mGRE

  Configure L2TP

  Configure advanced Cisco VPN features

  Ⅳ Configure Cisco IPS to mitigate network threats

  Configure IPS 4200 Series Sensor Appliance

  Initialize the Sensor Appliance

  Configure Sensor Appliance management

  Configure virtual Sensors on the Sensor Appliance

  Configure security policies

  Configure promiscuous and inline monitoring on the Sensor Appliance

  Configure and tune signatures on the Sensor Appliance

  Configure custom signatures on the Sensor Appliance

  Configure blocking on the Sensor Appliance

  Configure TCP resets on the Sensor Appliance

  Configure rate limiting on the Sensor Appliance

  Configure signature engines on the Sensor Appliance

  Use IDM to configure the Sensor Appliance

  Configure event action on the Sensor Appliance

  Configure event monitoring on the Sensor Appliance

  Configure advanced features on the Sensor Appliance

  Configure and tune Cisco IOS IPS

  Configure SPAN & RSPAN on Cisco switches

  jfdk Ⅴ Implement Identity Management

  Configure RADIUS and TACACS+ security protocols

  Configure LDAP

  Configure Cisco Secure ACS

  Configure certificate-based authentication

  Configure proxy authentication

  Configure 802.1x

  Configure advanced identity management features

  Configure Cisco NAC Framework

  Ⅵ Implement Control Plane and Management Plane Security

  Implement routing plane security features (protocol authentication, route filtering)

  Configure Control Plane Policing

  Configure CP protection and management protection

  Configure broadcast control and switchport security

  Configure

  additional CPU protection mechanisms (options drop, logging interval)

  Disable unnecessary services

  Control device access (Telnet, HTTP, SSH, Privilege levels)

  Configure SNMP, Syslog, AAA, NTP

  Configure service authentication (FTP, Telnet, HTTP, other)

  Configure RADIUS and TACACS+ security protocols

  Configure device management and security

  Ⅶ Configure Advanced Security

  Configure mitigation techniques to respond to network attacks

  Configure packet marking techniques

  Implement security RFCs (RFC1918/3330, RFC2827/3704)

  Configure Black Hole and Sink Hole solutions

  Configure RTBH filtering (Remote Triggered Black Hole)

  Configure Traffic Filtering using Access-Lists

  Configure IOS NAT

  Configure TCP Intercept

  Configure uRPF

  Configure CAR

  Configure NBAR

  Configure NetFlow

  Configure Anti-Spoofing solutions

  Configure Policing

  Capture and utilize packet captures

  Configure Transit Traffic Control and Congestion Management

  Configure Cisco Catalyst advanced security features

  Ⅷ Identify and Mitigate Network Attacks

  Identify and protect against fragmentation attacks

  Identify and protect against malicious IP option usage

  Identify and protect against network reconnaissance attacks

  Identify and protect against IP spoofing attacks

  Identify and protect against MAC spoofing attacks

  Identify and protect against ARP spoofing attacks

  Identify and protect against Denial of Service (DoS) attacks

  Identify and protect against Distributed Denial of Service (DDoS) attacks

  Identify and protect against Man-in-the-Middle (MiM) attacks

  Identify and protect against port redirection attacks

  Identify and protect against DHCP attacks

  Identify and protect against DNS attacks

  Identify and protect against Smurf attacks

  Identify and protect against SYN attacks

  Identify and protect against MAC Flooding attacks

  Identify and protect against VLAN hoping attacks

  Identify and protect against various Layer2 and Layer3 attacks

声明:本站为免费网络服务提供商,网站所有信息均为用户自行发布并由用户承担相应法律责任,本站不对其真实性及合法性负责,如涉及侵权或者信息违法,请你及时与本站联系删除。

阅读 856 举报

相关推荐
评论0

当前没有评论内容

发表评论 0条评论
13
微博
QQ
QQ空间
微信
取消