• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

[20-4-2009] Refreshed CCIE Security Lab Exam Available

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • [20-4-2009] Refreshed CCIE Security Lab Exam Available

    An updated version of the popular CCIE Security Lab Exam will be made available April 20, 2009. As previously announced, Cisco has refreshed the exam with the latest Cisco equipment and software to mirror the job knowledge and skills needed by security professionals. In addition, a continued emphasis has been placed on troubleshooting to recognize the operating challenges faced by IT departments. Candidates scheduling their lab exams April 20, 2009 or later should prepare using the CCIE Lab Exam v3.0 Overview, the CCIE Security Lab Exam Blueprint and the CCIE Security Lab Exam v3.0 Equipment and Software Overview. Candidates testing prior to mid- April 20, 2009 should continue using the v2.0 blueprints and the v2.0 CCIE Security Lab Equipment and Software Overview.
    Trần Mỹ Phúc
    tranmyphuc@hotmail.com
    Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

    Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

    Juniper Certs :
    JNCIP-ENT & JNCIP-SEC
    INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

    [version 4.0] Ôn tập CCNA



  • #2
    CCIE Security Lab Expanded Blueprint 3.X

    By Anthony Sequeira, #15626
    Bookmark this page and check back often for updates! As you can see it is very much a work in progress, but I will be making daily updates.
    I. Implement secure networks using Cisco ASA Firewalls
    A. Perform basic firewall Initialization

    1. Restoring the Factory Default Configuration
    a. configure factory-default [ip_address [mask]]
    2. Saving Configuration Changes
    a. write memory all [/noconfirm]
    3. Setting the Login Password
    a. Used for Telnet and SSH connections; default is cisco
    b. {passwd | password} password
    4. Setting the Enable Password
    a. Default is blank
    b. enable password password
    5. Setting the Hostname
    a. hostname name
    6. Setting the Domain Name
    a. Appended to unqualified names
    b. Default is default.domain.invalid
    c. domain-name name
    7. Setting the Date and Time
    a. NTP server will override any manually set time
    b. clock timezone zone [-]hours [minutes]
    c. clock summer-time zone date {day month | month day} year hh:mm {day month | month day} year hh:mm [offset]
    d. clock summer-time zone recurring [week weekday month hh:mm week weekday month hh:mm] [offset]
    e. ntp authenticate
    ntp trusted-key key_id
    ntp authentication-key key_id md5 key
    ntp server ip_address [key key_id] [source interface_name] [pref er]
    f. clock set hh:mm:ss {month day | day month} year
    8. Configuring Ethernet Interfaces
    a. interface physical_interface
    speed {auto | 10 | 100 | 1000 | nonegotiate}
    duplex {auto | full | half}
    no shutdown
    9. Configuring Fiber Interfaces
    a. interface gigabitethernet 1/port
    media-type sfp
    speed nonegotiate
    no shutdown
    10. Configuring a Redundant Interface
    a. interface redundant number
    interface redundant number
    redundant-interface redundantnumber active-member physical_interface
    11. Configuring Interface Parameters
    a. no shutdown
    b. nameif
    c. security-level
    d. management-only
    e. ip address
    f. mac-address
    12. Allowing Communication Between Interfaces of Same Security Level
    a. same-security-traffic permit inter-interface
    B. Configure device management
    C. Configure address translation (nat, global, static)
    D. Configure ACLs
    E. Configure IP routing
    1. Static Routing
    2. Default Routing
    3. OSPF
    4. RIP
    5. EIGRP
    6. Route Maps
    7. Multicast Routing
    a. Enabling
    b. IGMP
    c. Stub Multicast Routing
    d. Static Multicast Routes
    e. PIM Features
    F. Configure object groups
    G. Configure VLANs
    H. Configure filtering
    I. Configure failover
    J. Configure Layer 2 Transparent Firewall
    K. Configure security contexts (virtual firewall)
    L. Configure Modular Policy Framework
    M. Configure Application-Aware Inspection
    N. Configure high availability solutions
    O. Configure QoS policies
    II. Implement secure networks using Cisco IOS Firewalls
    A. Configure CBAC
    B. Configure Zone-Based Firewall
    C. Configure Audit
    D. Configure Auth Proxy
    E. Configure PAM
    F. Configure access control
    G. Configure performance tuning
    H. Configure advanced IOS Firewall features
    III. Implement secure networks using Cisco VPN solutions
    A. Configure IPsec LAN-to-LAN (IOS/ASA)
    B. Configure SSL VPN (IOS/ASA)
    C. Configure Dynamic Multipoint VPN (DMVPN)
    D. Configure Group Encrypted Transport (GET) VPN
    E. Configure Easy VPN (IOS/ASA)
    F. Configure CA (PKI)
    G. Configure Remote Access VPN
    H. Configure Cisco Unity Client
    I. Configure Clientless WebVPN
    J. Configure AnyConnect VPN
    K. Configure XAuth, Split-Tunnel, RRI, NAT-T
    L. Configure High Availability
    M. Configure QoS for VPN
    N. Configure GRE, mGRE
    O. Configure L2TP
    P. Configure advanced Cisco VPN features
    IV. Configure Cisco IPS to mitigate network threats
    A. Configure IPS 4200 Series Sensor Appliance
    B. Initialize the Sensor Appliance
    C. Configure Sensor Appliance management
    D. Configure virtual Sensors on the Sensor Appliance
    E. Configure security policies
    F. Configure promiscuous and inline monitoring on the Sensor Appliance
    G. Configure and tune signatures on the Sensor Appliance
    H. Configure custom signatures on the Sensor Appliance
    I. Configure blocking on the Sensor Appliance
    J. Configure TCP resets on the Sensor Appliance
    K. Configure rate limiting on the Sensor Appliance
    L. Configure signature engines on the Sensor Appliance
    M. Use IDM to configure the Sensor Appliance
    N. Configure event action on the Sensor Appliance
    O. Configure event monitoring on the Sensor Appliance
    P. Configure advanced features on the Sensor Appliance
    Q. Configure and tune Cisco IOS IPS
    R. Configure SPAN & RSPAN on Cisco switches
    V. Implement Identity Management
    A. Configure RADIUS and TACACS+ security protocols
    B. Configure LDAP
    C. Configure Cisco Secure ACS
    D. Configure certificate-based authentication
    E. Configure proxy authentication
    F. Configure 802.1x
    G. Configure advanced identity management features
    H. Configure Cisco NAC Framework
    VI. Implement Control Plane and Management Plane Security
    A. Implement routing plane security features (protocol authentication, route filtering)
    B. Configure Control Plane Policing
    C. Configure CP protection and management protection
    D. Configure broadcast control and switchport security
    E. Configure additional CPU protection mechanisms (options drop, logging interval)
    F. Disable unnecessary services
    G. Control device access (Telnet, HTTP, SSH, Privilege levels)
    H. Configure SNMP, Syslog, AAA, NTP
    I. Configure service authentication (FTP, Telnet, HTTP, other)
    J. Configure RADIUS and TACACS+ security protocols
    K. Configure device management and security
    VII. Configure Advanced Security
    A. Configure mitigation techniques to respond to network attacks
    B. Configure packet marking techniques
    C. Implement security RFCs (RFC1918/3330, RFC2827/3704)
    D. Configure Black Hole and Sink Hole solutions
    E. Configure RTBH filtering (Remote Triggered Black Hole)
    F. Configure Traffic Filtering using Access-Lists
    G. Configure IOS NAT
    H. Configure TCP Intercept
    I. Configure uRPF
    J. Configure CAR
    K. Configure NBAR
    L. Configure NetFlow
    M. Configure Anti-Spoofing solutions
    N. Configure Policing
    O. Capture and utilize packet captures
    P. Configure Transit Traffic Control and Congestion Management
    Q. Configure Cisco Catalyst advanced security features
    VIII. Identify and Mitigate Network Attacks
    A. Identify and protect against fragmentation attacks
    B. Identify and protect against malicious IP option usage
    C. Identify and protect against network reconnaissance attacks
    D. Identify and protect against IP spoofing attacks
    E. Identify and protect against MAC spoofing attacks
    F. Identify and protect against ARP spoofing attacks
    G. Identify and protect against Denial of Service (DoS) attacks
    H. Identify and protect against Distributed Denial of Service (DDoS) attacks
    I. Identify and protect against Man-in-the-Middle (MiM) attacks
    J. Identify and protect against port redirection attacks
    K. Identify and protect against DHCP attacks
    L. Identify and protect against DNS attacks
    M. Identify and protect against Smurf attacks
    N. Identify and protect against SYN attacks
    O. Identify and protect against MAC Flooding attacks
    P. Identify and protect against VLAN hopping attacks
    Q. Identify and protect against various Layer2 and Layer3 attacks
    Trần Mỹ Phúc
    tranmyphuc@hotmail.com
    Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

    Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

    Juniper Certs :
    JNCIP-ENT & JNCIP-SEC
    INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

    [version 4.0] Ôn tập CCNA


    Comment


    • #3
      Nội dung lab CCIE RS

      Hi CCIE,

      Mình đã đọc các lab của IPExpert lab và IEExpert lab v4 thấy phần Frame relay rất nhiều. Không biết các bài lab CCIE gần đây có còn Frame relay, co MPLS, ATM .... ko nữa.

      Năm mới chúc CCIE sức khỏe và thăng tiến nhanh .
      Thanks

      Comment


      • #4
        Hi nhall,
        Bạn nên bám vào Blueprint của RS theo link sau:
        Find all your Cisco training tools, courses, and certifications in one place. Locate a live event, webinar, or any worldwide training program today

        Hiện tại MPLS và ATM không có trong nội dung thi lab RS.
        Thân ái,
        KaKaLot_
        ================================================== ===================
        :106:The More You Sweat In Trainning, The Less You Bleed In The Battle.:105:

        Comment

        Working...
        X