Professional Documents
Culture Documents
CCNSP Guide
Page 1
TABLE OF CONTENTS
TRAINING & CERTIFICATION PROGRAMS ............................................................................................... 5
CCNSP (CYBEROAM CERTIFIED NETWORK & SECURITY PROFESSIONAL):............................................................. 5
CCNSE (CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT):....................................................................... 6
MODULE 1: BASICS OF NETWORKING & SECURITY ................................................................................ 8
MODULE 2: CYBEROAM IDENTITY BASED UTM .................................................................................... 16
CHALLENGES WITH CURRENT UTM PRODUCTS............................................................................................. 17
CYBEROAMS SECURITY APPROACH ............................................................................................................ 18
IDENTITY-BASED SECURITY........................................................................................................................ 20
MODULE 3: CYBEROAM PRODUCTS ...................................................................................................... 21
CYBEROAM UTM APPLIANCES .................................................................................................................. 22
CYBEROAM SUBSCRIPTIONS ...................................................................................................................... 29
LOG MANAGEMENT............................................................................................................................... 40
AGGREGATED REPORTING..................................................................................................................... 41
IDENTITY-BASED REPORTING ................................................................................................................ 42
SECURITY MANAGEMENT ...................................................................................................................... 44
COMPLIANCE REPORTING AND SECURITY AUDIT ................................................................................. 45
FORENSIC ANALYSIS............................................................................................................................... 45
CYBEROAM CENTRAL CONSOLE (CCC) ........................................................................................................ 48
CYBEROAM IPSEC VPN CLIENT ................................................................................................................. 54
MODULE 4: CYBEROAM DEPLOYMENT ................................................................................................. 55
CYBEROAM PACKAGE CONTENTS ............................................................................................................... 56
FACTORY DEFAULT SETTINGS .................................................................................................................... 57
DEPLOYMENT MODES ............................................................................................................................. 58
TRAINING LAB SETUP............................................................................................................................... 69
LAB #1 FACTORY RESET ........................................................................................................................... 71
LAB #2 DEPLOYMENT IN BRIDGE MODE (OPTIONAL)..................................................................................... 80
LAB #3 DEPLOYMENT IN GATEWAY MODE .................................................................................................. 94
CYBEROAM REGISTRATION...................................................................................................................... 107
LAB #4 REGISTRATION, UPGRADE & SUBSCRIPTION .................................................................................... 109
MODULE 5: FIREWALL.......................................................................................................................... 121
ACCESS CONTROL (APPLIANCE ACCESS) .................................................................................................... 122
IP MANAGEMENT.................................................................................................................................. 123
FIREWALL MANAGEMENT....................................................................................................................... 126
DEFAULT FIREWALL RULES ...................................................................................................................... 129
NAT (OUTBOUND NAT)........................................................................................................................ 133
VIRTUAL HOST (INBOUND NAT) .............................................................................................................. 135
DENIAL OF SERVICE (DOS)...................................................................................................................... 140
CYBEROAM UNIFIED FIREWALL CONTROLS ................................................................................................. 143
LAB #5 SECURING THE APPLIANCE ........................................................................................................... 145
LAB #6 CREATE A DROP FIREWALL RULE FOR YOUR MACHINES IP ADDRESS. ................................................... 146
LAB #7 CREATE A ACCEPT FIREWALL RULE FOR YOUR MACHINES IP ADDRESS. ................................................ 147
LAB #8 CREATE SCHEDULE & APPLY IN FIREWALL RULE ................................................................................ 148
LAB #9 ENABLE / DISABLE ANTI-VIRUS & ANTI-SPAM SCANNING .................................................................. 149
LAB #10 TEST ANTI-VIRUS SCANNING ...................................................................................................... 150
CCNSP Guide
Page 2
CCNSP Guide
Page 3
CCNSP Guide
Page 4
CCNSP Guide
Page 5
To appear in the CCNSE training or certification exam, the individual must have
CCNSP certification
CCNSP Guide
Page 6
CCNSP Guide
Page 7
Cyberoam - Unified
Threat
Management
Cyberoam
Certified
Network
& Security Professional (CCNSP)
Agenda:
Basics of Security & UTM (Unified Threat Management)
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Agenda:
CCNSP Guide
Page 8
CCNSP
Cyberoam
Threat
Management& UTM
Module
1:- Unified
Basics
of Security
UTM
Potentially dangerous internal threats remained anonymous
CCNSP Guide
Page 9
CCNSP Guide
Page 10
CCNSP Guide
Page 11
CCNSP Guide
Page 12
CCNSP Guide
Page 13
CCNSP Guide
Page 14
CCNSP Guide
Page 15