Course in Optimizing Converged Cisco Networks
Course
In Bangalore
Description
-
Type
Course
-
Location
Bangalore
-
Duration
1 Day
Facilities
Location
Start date
Start date
Reviews
Course programme
Detailed Course Outline
Module 1: Network Connectivity Requirements
Lesson 1: Describing Network Requirements
* Elucidate the IIN plus the SONA framework
* Explain the Cisco conceptual network models, such as Cisco Enterprise Architecture plus Cisco hierarchical network model
* Elucidate the requirements for establishing secure remote connections in a converged network
Module 2: Teleworker Connectivity
Lesson 1: Describing Topologies for Facilitating Remote Connections
* Explain the typical remote connections that an enterprise network has to support
* Elucidate the challenges faced in connecting teleworkers to the enterprise network, plus the solutions that exist to address these challenges
Lesson 2: Describing Cable Technology
* Elucidate basic terminology plus stplusards organizations that are relevant to cable technology
* Elucidate the components of a cable system that provide data services
* Elucidate the features of cable technology
* Explain how digital cable systems use RF bpluss for signal transmission
Lesson 3: Describing DSL Technology
* Elucidate features of DSL
* Elucidate the variants of DSL
* Explain the distance limitations of DSL
* Explain the basic facts of ADSL technology
* Explain how ADSL coexists with telephony service
Lesson 4: Configuring the CPE as the PPPoE or PPPoA Client
* Configure a Cisco router as a PPPoE client
* Configure an ATM interface for PPPoE client operations
* Configure the PPPoE DSL dialer interface
* Configure PAT
* Elucidate how to configure a DHCP server to allocate IP address to the users behind the client DSL router
* Configure a static route
Lesson 5: Verifying Broadbplus ADSL Configurations
* Explain the bottom-up approach to troubleshoot a DSL connection problem
* Explain the procedure to isolate problems to Layer 1
* Explain the procedure to confirm an Administratively Down state
* Explain the procedure to confirm the CPE router is powered on
Module 3: Frame Mode MPLS Implementation
Lesson 1: Introducing MPLS Networks
* Identify the elements of the MPLS conceptual model
* Elucidate the router switching mechanisms
* Elucidate the MPLS data plus control planes
* Identify the structure of an MPLS label plus its format
* Explain the function of different types of LSRs in MPLS networks
* Explain the interactions between the control plane plus the data plane in an LSR that enable the basic functions of label switching plus forwarding of labeled packets to occur
Lesson 2: Assigning MPLS Labels to Packets
* Identify how label allocation is performed in a frame mode MPLS network
* Identify how labels are distributed in a frame mode MPLS network
* Explain how the LFIB table is populated
Lesson 3: Implementing Frame Mode MPLS
* Elucidate the procedure for configuring frame mode MPLS on a Cisco IOS router
* Enable IP CEF on a router as a step in implementing frame mode MPLS
* Enable MPLS on a frame mode interface as a step in implementing frame mode MPLS
* Configure the MTU size in label switching as a step in implementing frame mode MPLS
Lesson 4: Describing MPLS VPN Technology
* Explain MPLS VPN architecture, plus how it improves on the traditional methods of overlay plus peer-to-peer VPN
* Elucidate the components of an MPLS VPN plus how they are interconnected to enable enterprise network connectivity between sites
Module 4: IPsec VPNs
Lesson 1: Understplusing IPsec Components plus IPsec VPN Features
* Elucidate the IPsec protocol, its basic functions, plus advantages of IPsec VPNs versus other types of VPNs
* Explain the IKE protocols
* Elucidate IKE functionality
* Elucidate the two protocols that are used for IPsec
Lesson 2: Implementing Site-to-Site IPsec VPN Operations
* Elucidate the five steps of IPsec operation
* Explain the procedure to configure IPsec
* Elucidate the configuration of the ISAKMP parameters
* Elucidate the configuration to Elucidate the IPsec transform set, the crypto ACL, plus the crypto map
Lesson 3: Configuring IPsec Site-to-Site VPN Using SDM
* Elucidate how to navigate the site-to-site VPN wizard interface
* Elucidate the components that will be configured by the SDM site-to-site VPN wizard
* Explain how to launch the site-to-site VPN wizard
* Explain how to set the parameters of the site-to-site VPN tunnel
* Explain how SDM sets IKE policies
Lesson 4: Configuring GRE Tunnels over IPsec
* Elucidate GRE
* Explain the purpose of a secure GRE tunnel
* Elucidate the components that will be configured by the SDM site-to-site VPN secure GRE tunnel wizard
* Explain how to configure a backup GRE-over-IPsec tunnel that the router can use when the primary tunnel fails
* Explain how to select the authentication method to be used on the VPN
* Explain how to configure IKE using the SDM wizard
* Explain how to configure the IPsec transform set using the SDM wizard
Lesson 5: Configuring High-Availability Options
* Explain how high availability of IPsec VPNs is achieved
* Explain the failover option of backup IPsec peers
Lesson 6: Configuring Cisco Easy VPN plus Easy VPN Server Using SDM
* Explain the general operation of Cisco Easy VPN including its benefits plus the role of each of its components
* Elucidate the functionality provided by Cisco Easy VPN Server, explain the concept of dynamic crypto maps, plus Elucidate the functionality provided by Easy VPN Remote
* Elucidate the steps required to configure Cisco Easy VPN Server using SDM
* Elucidate the locations where Easy VPN group policies can be stored
* Elucidate the locations where user records for Xauth can be stored
* Configure local group policies
* Explain how to complete the configuration by viewing the settings in the Summary window
Lesson 7: Implementing the Cisco VPN Client
* Elucidate the steps required to configure the software VPN client on a PC
* Elucidate each of the steps required to configure Cisco VPN Client
Module 5: Cisco Device Hardening
Lesson 1: Mitigating Network Attacks
* Elucidate the Cisco Self-Defending Network strategy
* Elucidate the types of attacks that enterprise networks must defend against
* Elucidate how to mitigate reconnaissance attacks including packet sniffers, port scans, ping sweeps, plus Internet information queries
* Elucidate how to mitigate access attacks including password attacks, trust exploitation, buffer overflow, port redirection, plus man-in-the-middle attacks
* Elucidate how to mitigate DoS attacks including IP spoofing plus DDoS
* Elucidate how to mitigate worm, virus, plus Trojan horse attacks
Lesson 2: Disabling Unused Cisco Router Network Services plus Interfaces
* Identify router services plus interfaces that are vulnerable to network attack
* Explain how the process of locking down a Cisco router can be automated with the auto secure commplus
* Explain how to configure AutoSecure on a Cisco router
Lesson 3: Securing Cisco Router Installations plus Administrative Access
* Elucidate how to configure secure administrative access to Cisco routers by configuring passwords
* Elucidate how to secure administrative access to Cisco routers by setting a login failure rate plus using IOS login enhancements
* Elucidate how to secure administrative access to Cisco routers by setting timeouts
* Elucidate how to secure administrative access to Cisco routers by setting multiple privilege levels
Lesson 4: Mitigating Threats plus Attacks with Access Elucidates
* Identify the types plus formats of IP ACLs that are used by routers to restrict access plus filter packets
* Elucidate how to apply ACLs to router interfaces
* Explain the use of traffic filtering with ACLs to mitigate threats in a network
* Explain how to implement ACLs to filter IP traffic destined for Telnet, SNMP, plus RIP services
* Explain how to implement ACLs to mitigate threats
Lesson 5: Securing Management plus Reporting Features
* Elucidate the factors you must consider when planning the secure management plus reporting configuration of network devices
* Elucidate the factors that affect the architecture of secure management plus reporting in terms of in-bplus plus OOB information paths
* Elucidate the steps used to configure an SSH server for secure management plus reporting
* Elucidate how the syslog function plays a key role in network security
Lesson 6: Configuring AAA on Cisco Routers
* Elucidate the three components of AAA
* Elucidate the AAA access modes
* Elucidate the AAA RADIUS plus TACACS+ protocols
* Configure AAA login authentication on Cisco routers using CLI
* Configure AAA login authentication on Cisco routers using SDM
* Troubleshoot AAA on a Cisco perimeter router using the debug aaa commplus
Module 6: Cisco IOS Threat Defense Features
Lesson 1: Introducing the Cisco IOS Firewall
* Explain the basic structure of a layered defense
* Elucidate the operational strengths plus weaknesses of the three firewall technologies
* Explain the basic operation of a stateful firewall
* Elucidate the features of the Cisco IOS Firewall
* Elucidate how the Cisco IOS Firewall combines the features of packet inspection plus proxy firewalls to provide an optimal security solution
* Explain the Cisco IOS Firewall process
Lesson 2: Implementing Cisco IOS Firewalls
* Explain the procedure to configure Cisco IOS Firewall from the Cisco IOS CLI
* Explain when plus how to use the Basic plus Advanced Firewall Configuration wizards in SDM
* Explain how to configure a basic firewall using SDM
* Explain how to configure the interfaces on an advanced firewall using SDM
* Explain how to configure a DMZ on an advanced firewall
Lesson 3: Introducing Cisco IOS IPS
* Elucidate the functions plus operations of IDS plus IPS systems, plus the difference between IDS plus IPS
* Elucidate the types of IDS plus IPS systems
* Elucidate the four types of IDS plus IPS signatures
* Explain how SDFs plus SMEs work together
* Elucidate what happens when a signature is matched
Lesson 4: Configuring Cisco IOS IPS
* Configure plus verify IOS IPS using the CLI interface
* Elucidate the Cisco IOS IPS tasks you can complete with SDM
* Select interfaces plus configure SDF locations within the SDM IPS Policies wizard
* View the IPS policy summary plus deliver the IPS configuration to the router using the SDM IPS Policies wizard
Course in Optimizing Converged Cisco Networks