Course in Optimizing Converged Cisco Networks

Course

In Bangalore

Price on request

Description

  • Type

    Course

  • Location

    Bangalore

  • Duration

    1 Day

Facilities

Location

Start date

Bangalore (Karnātaka)
See map
#70/1, 2nd Floor, Dr.Brownamma Towers 2nd Cross, Mission Road, CSI Compund, Opp: HCG Hospital, 560027

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Detailed Course Outline

Module 1: Network Connectivity Requirements

Lesson 1: Describing Network Requirements

* Elucidate the IIN plus the SONA framework

* Explain the Cisco conceptual network models, such as Cisco Enterprise Architecture plus Cisco hierarchical network model

* Elucidate the requirements for establishing secure remote connections in a converged network

Module 2: Teleworker Connectivity

Lesson 1: Describing Topologies for Facilitating Remote Connections

* Explain the typical remote connections that an enterprise network has to support

* Elucidate the challenges faced in connecting teleworkers to the enterprise network, plus the solutions that exist to address these challenges

Lesson 2: Describing Cable Technology

* Elucidate basic terminology plus stplusards organizations that are relevant to cable technology

* Elucidate the components of a cable system that provide data services

* Elucidate the features of cable technology

* Explain how digital cable systems use RF bpluss for signal transmission

Lesson 3: Describing DSL Technology

* Elucidate features of DSL

* Elucidate the variants of DSL

* Explain the distance limitations of DSL

* Explain the basic facts of ADSL technology

* Explain how ADSL coexists with telephony service

Lesson 4: Configuring the CPE as the PPPoE or PPPoA Client

* Configure a Cisco router as a PPPoE client

* Configure an ATM interface for PPPoE client operations

* Configure the PPPoE DSL dialer interface

* Configure PAT

* Elucidate how to configure a DHCP server to allocate IP address to the users behind the client DSL router

* Configure a static route

Lesson 5: Verifying Broadbplus ADSL Configurations

* Explain the bottom-up approach to troubleshoot a DSL connection problem

* Explain the procedure to isolate problems to Layer 1

* Explain the procedure to confirm an Administratively Down state

* Explain the procedure to confirm the CPE router is powered on

Module 3: Frame Mode MPLS Implementation

Lesson 1: Introducing MPLS Networks

* Identify the elements of the MPLS conceptual model

* Elucidate the router switching mechanisms

* Elucidate the MPLS data plus control planes

* Identify the structure of an MPLS label plus its format

* Explain the function of different types of LSRs in MPLS networks

* Explain the interactions between the control plane plus the data plane in an LSR that enable the basic functions of label switching plus forwarding of labeled packets to occur

Lesson 2: Assigning MPLS Labels to Packets

* Identify how label allocation is performed in a frame mode MPLS network

* Identify how labels are distributed in a frame mode MPLS network

* Explain how the LFIB table is populated

Lesson 3: Implementing Frame Mode MPLS

* Elucidate the procedure for configuring frame mode MPLS on a Cisco IOS router

* Enable IP CEF on a router as a step in implementing frame mode MPLS

* Enable MPLS on a frame mode interface as a step in implementing frame mode MPLS

* Configure the MTU size in label switching as a step in implementing frame mode MPLS

Lesson 4: Describing MPLS VPN Technology

* Explain MPLS VPN architecture, plus how it improves on the traditional methods of overlay plus peer-to-peer VPN

* Elucidate the components of an MPLS VPN plus how they are interconnected to enable enterprise network connectivity between sites

Module 4: IPsec VPNs

Lesson 1: Understplusing IPsec Components plus IPsec VPN Features

* Elucidate the IPsec protocol, its basic functions, plus advantages of IPsec VPNs versus other types of VPNs

* Explain the IKE protocols

* Elucidate IKE functionality

* Elucidate the two protocols that are used for IPsec

Lesson 2: Implementing Site-to-Site IPsec VPN Operations

* Elucidate the five steps of IPsec operation

* Explain the procedure to configure IPsec

* Elucidate the configuration of the ISAKMP parameters

* Elucidate the configuration to Elucidate the IPsec transform set, the crypto ACL, plus the crypto map

Lesson 3: Configuring IPsec Site-to-Site VPN Using SDM

* Elucidate how to navigate the site-to-site VPN wizard interface

* Elucidate the components that will be configured by the SDM site-to-site VPN wizard

* Explain how to launch the site-to-site VPN wizard

* Explain how to set the parameters of the site-to-site VPN tunnel

* Explain how SDM sets IKE policies

Lesson 4: Configuring GRE Tunnels over IPsec

* Elucidate GRE

* Explain the purpose of a secure GRE tunnel

* Elucidate the components that will be configured by the SDM site-to-site VPN secure GRE tunnel wizard

* Explain how to configure a backup GRE-over-IPsec tunnel that the router can use when the primary tunnel fails

* Explain how to select the authentication method to be used on the VPN

* Explain how to configure IKE using the SDM wizard

* Explain how to configure the IPsec transform set using the SDM wizard

Lesson 5: Configuring High-Availability Options

* Explain how high availability of IPsec VPNs is achieved

* Explain the failover option of backup IPsec peers

Lesson 6: Configuring Cisco Easy VPN plus Easy VPN Server Using SDM

* Explain the general operation of Cisco Easy VPN including its benefits plus the role of each of its components

* Elucidate the functionality provided by Cisco Easy VPN Server, explain the concept of dynamic crypto maps, plus Elucidate the functionality provided by Easy VPN Remote

* Elucidate the steps required to configure Cisco Easy VPN Server using SDM

* Elucidate the locations where Easy VPN group policies can be stored

* Elucidate the locations where user records for Xauth can be stored

* Configure local group policies

* Explain how to complete the configuration by viewing the settings in the Summary window

Lesson 7: Implementing the Cisco VPN Client

* Elucidate the steps required to configure the software VPN client on a PC

* Elucidate each of the steps required to configure Cisco VPN Client

Module 5: Cisco Device Hardening

Lesson 1: Mitigating Network Attacks

* Elucidate the Cisco Self-Defending Network strategy

* Elucidate the types of attacks that enterprise networks must defend against

* Elucidate how to mitigate reconnaissance attacks including packet sniffers, port scans, ping sweeps, plus Internet information queries

* Elucidate how to mitigate access attacks including password attacks, trust exploitation, buffer overflow, port redirection, plus man-in-the-middle attacks

* Elucidate how to mitigate DoS attacks including IP spoofing plus DDoS

* Elucidate how to mitigate worm, virus, plus Trojan horse attacks

Lesson 2: Disabling Unused Cisco Router Network Services plus Interfaces

* Identify router services plus interfaces that are vulnerable to network attack

* Explain how the process of locking down a Cisco router can be automated with the auto secure commplus

* Explain how to configure AutoSecure on a Cisco router

Lesson 3: Securing Cisco Router Installations plus Administrative Access

* Elucidate how to configure secure administrative access to Cisco routers by configuring passwords

* Elucidate how to secure administrative access to Cisco routers by setting a login failure rate plus using IOS login enhancements

* Elucidate how to secure administrative access to Cisco routers by setting timeouts

* Elucidate how to secure administrative access to Cisco routers by setting multiple privilege levels

Lesson 4: Mitigating Threats plus Attacks with Access Elucidates

* Identify the types plus formats of IP ACLs that are used by routers to restrict access plus filter packets

* Elucidate how to apply ACLs to router interfaces

* Explain the use of traffic filtering with ACLs to mitigate threats in a network

* Explain how to implement ACLs to filter IP traffic destined for Telnet, SNMP, plus RIP services

* Explain how to implement ACLs to mitigate threats

Lesson 5: Securing Management plus Reporting Features

* Elucidate the factors you must consider when planning the secure management plus reporting configuration of network devices

* Elucidate the factors that affect the architecture of secure management plus reporting in terms of in-bplus plus OOB information paths

* Elucidate the steps used to configure an SSH server for secure management plus reporting

* Elucidate how the syslog function plays a key role in network security

Lesson 6: Configuring AAA on Cisco Routers

* Elucidate the three components of AAA

* Elucidate the AAA access modes

* Elucidate the AAA RADIUS plus TACACS+ protocols

* Configure AAA login authentication on Cisco routers using CLI

* Configure AAA login authentication on Cisco routers using SDM

* Troubleshoot AAA on a Cisco perimeter router using the debug aaa commplus

Module 6: Cisco IOS Threat Defense Features

Lesson 1: Introducing the Cisco IOS Firewall

* Explain the basic structure of a layered defense

* Elucidate the operational strengths plus weaknesses of the three firewall technologies

* Explain the basic operation of a stateful firewall

* Elucidate the features of the Cisco IOS Firewall

* Elucidate how the Cisco IOS Firewall combines the features of packet inspection plus proxy firewalls to provide an optimal security solution

* Explain the Cisco IOS Firewall process

Lesson 2: Implementing Cisco IOS Firewalls

* Explain the procedure to configure Cisco IOS Firewall from the Cisco IOS CLI

* Explain when plus how to use the Basic plus Advanced Firewall Configuration wizards in SDM

* Explain how to configure a basic firewall using SDM

* Explain how to configure the interfaces on an advanced firewall using SDM

* Explain how to configure a DMZ on an advanced firewall

Lesson 3: Introducing Cisco IOS IPS

* Elucidate the functions plus operations of IDS plus IPS systems, plus the difference between IDS plus IPS

* Elucidate the types of IDS plus IPS systems

* Elucidate the four types of IDS plus IPS signatures

* Explain how SDFs plus SMEs work together

* Elucidate what happens when a signature is matched

Lesson 4: Configuring Cisco IOS IPS

* Configure plus verify IOS IPS using the CLI interface

* Elucidate the Cisco IOS IPS tasks you can complete with SDM

* Select interfaces plus configure SDF locations within the SDM IPS Policies wizard

* View the IPS policy summary plus deliver the IPS configuration to the router using the SDM IPS Policies wizard

Course in Optimizing Converged Cisco Networks

Price on request