Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Changing Threats and Challenges
Smurf Attack
Ping Sweeps and Port Scans
One of the Sneakier Scan Methods: Idle Scanning
Demonstration Topology
Demo: Idle Scan Using Nmap
Man-in-the-Middle Attacks Example: ARP Cache Poisoning
Demo: ARP Cache Poison Using Cain
How Difficult Is It to Obtain Tools?
Network Security Is a System
Secure Network Lifecycle
Security Policy
Reading List
Cryptography: What and Why
What Is a Hash Function?
Hash Example: Update Verification
Hash Example: Enable Secret
Demo: Enable Secret Dictionary Attack
What Is Encryption?
Symmetric vs. Asymmetric Encryption
Symmetric Encryption Algorithms
Anecdote on Key Length
Asymmetric Encryption Algorithms
What Is AAA ?
Implementing AAA
Cisco Secure ACS
AAA Router CLI ConfigExample
Cisco IOS Command Authorization Using ACS Example
Demo: AAA Using CSACS
Secure Remote Administrative Access: SSH—The Secure Shell Protocol
Demo: SSH
What Is a Firewall?
Packet Filtering
Packet Filter Limitations
Application Layer Gateway or Proxy Server
How Classic StatefulFirewall Works
Application Inspection Firewalls
Zone-Based Policy Firewall
Security Zone Pairs
Zone Rules Summary
Configure a ZBP Firewall
Security Zone Firewall Configuration CPL–Cisco Policy Language (CPL)
ZBP Policy Actions
SDM Zone Based Firewall Wizard
Zone-Based Policy Firewall Configuration Example
The Problem
IPSec Protocol Architecture
Break Down of IPSec: IKE
IKE Phases, Security Associations
IKE Authentication Methods
DH Exchange
Encapsulating Security Payload (ESP)
ESP tunnel mode
Site-to-Site IPSec VPN
Site-to-Site IPSec Configuration
Introducing the Cisco SDM VPN Wizard Interface
Quick Setup
IPSec Configuration Example
Some More Advanced VPN Technologies
IPS Deployment Options
IPS Attach Responses
Support for SDEE and Syslog
Signature Micro-Engines
Cisco IOS IPS Deployment Steps
IPS Policies Wizard
IPS Policies Wizard (Cont.)
Configuring Signatures Using Cisco SDM
Configuring Signatures Using Cisco SDM (Cont.)
Why Be Concerned?
MAC Address Concerns
Port Security Configuration
STP Manipulation
BPDU Guard
Root Guard
VLAN Hopping by Rogue Trunk
VLAN Hopping by Double Tagging
Mitigating VLAN Hopping Network Attacks
ARP Spoofing: Man-in-the-Middle Attacks
Private VLAN Edge
Some More Advanced Layer 2 Security Technologies
Practice Exam Item 1—SDM-Based Item
Practice Exam Item 1—(Cont.)
Practice Exam Item 2—Theory Based Item
Practice Exam Item 3—CLI Configuration Item
Practice Exam Item 4—Configuration Related Item
Practice Exam Item 5—Theory Based Item
Practice Exam Item 6—Theory Based Item
Practice Exam Item 7—SDM Based Item
Practice Exam Item 8—Configuration Related Item
Practice Exam Item 9—Show Output Related Item
Practice Exam Item 10—Configuration Related Item
Practice Exam Item 1
Practice Exam Item 2
Practice Exam Item 3
Practice Exam Item 4
Practice Exam Item 5
Practice Exam Item 6
Practice Exam Item 7
Practice Exam Item 8
Recommended Reading
Complete Your Online Session Evaluation
0 of .
Results for:
No results containing your search query
P. 1
CCNA Security Prep From Net Workers

CCNA Security Prep From Net Workers

Ratings: (0)|Views: 14|Likes:
Published by fjmerchan21

More info:

Published by: fjmerchan21 on Nov 04, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 48 are not shown in this preview.
You're Reading a Free Preview
Pages 52 to 71 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->