Learn How to Use your Cisco router or switch Firewall Capabilities
What you will learn
Fully implement and configure IOS security features
Numbered and Named Access-Lists in Detail
Standard and Extended Access-List in Detail
Reflexive Access-Lists with Example
Policy-Based Routing
Access-List Features (Logging, Packet Drops, …)
Authentication, Authorization & Accounting (AAA)
Privilege Levels
Class-maps in Detail
TCP Intercept in Detail
Context-Based Access Control (CBAC)
Router IP Traffic Export (RITE)
Zone-Based Firewall in Detail
And more!
Description
This course is all about IOS security and all features that you can find to harden your router and switch and use your router as a firewall so that you don’t have to invest your precious dollars on a firewall device!
I have explained all commands in detail so that you can easily get a grab on that feaure. If you cannot find a feature, this means either it is obsolete and a better feature replaces that or I have forgotten to include it. In the latter case, I will be more than happy if you let me know what you want and I will add it to the curriculum.
Noteβ Make sure your ππππ¦π² cart has only this course you're going to enroll it now, Remove all other courses from the ππππ¦π² cart before Enrolling!
I have used GNS3 for the simulation. However, you can execute all commands on a real gear without any change.
English
language
Content
Introduction
Course Summary
Diagram for the First Project
Configuration
Access-Lists
Numbered Standard Access-List
Named Standard Access-List
Editing Access-Lists
“host” and “any” Options
Extended Access-lists
Extended Access-List Example – part I
Extended Access-List Example – part II
Reflexive Access-lists
Filtering Using PBR
Access-List Logging Feature
Droping Packets with Options
Hardening Your Device
Passwords
AAA
Privilege Levels
Assigning Commands to Privilege Levels
Limiting Access to VTY
login Options
Role-Based CLI
Class-Maps
Class-maps
class-map match-any
Using Class-maps
Interception
CBAC for TCP anc UDP Connections
TCP Intercept
TCP Intercept Configuration
CBAC Basic Configuration
RITE
Zone-Based Firewall
ZBF Configuration – part II
ZBF Overview and Scenario
ZBF Configuration – part III
ZBF Configuration – part I
Parameter-map And Policing ZBF