• Post category:StudyBullet-3
  • Reading time:6 mins read


Learn How to Use your Cisco router or switch Firewall Capabilities

What you will learn

Fully implement and configure IOS security features

Numbered and Named Access-Lists in Detail

Standard and Extended Access-List in Detail

Reflexive Access-Lists with Example

Policy-Based Routing

Access-List Features (Logging, Packet Drops, …)

Authentication, Authorization & Accounting (AAA)

Privilege Levels

Class-maps in Detail

TCP Intercept in Detail

Context-Based Access Control (CBAC)

Router IP Traffic Export (RITE)

Zone-Based Firewall in Detail

And more!

Description

This course is all about IOS security and all features that you can find to harden your router and switch and use your router as a firewall so that you don’t have to invest your precious dollars on a firewall device!

I have explained all commands in detail so that you can easily get a grab on that feaure. If you cannot find a feature, this means either it is obsolete and a better feature replaces that or I have forgotten to include it. In the latter case, I will be more than happy if you let me know what you want and I will add it to the curriculum.


Get Instant Notification of New Courses on our Telegram channel.


I have used GNS3 for the simulation. However, you can execute all commands on a real gear without any change.

English
language

Content

Introduction
Course Summary
Diagram for the First Project
Configuration
Access-Lists
Numbered Standard Access-List
Named Standard Access-List
Editing Access-Lists
“host” and “any” Options
Extended Access-lists
Extended Access-List Example – part I
Extended Access-List Example – part II
Reflexive Access-lists
Filtering Using PBR
Access-List Logging Feature
Droping Packets with Options
Hardening Your Device
Passwords
AAA
Privilege Levels
Assigning Commands to Privilege Levels
Limiting Access to VTY
login Options
Role-Based CLI
Class-Maps
Class-maps
class-map match-any
Using Class-maps
Interception
CBAC for TCP anc UDP Connections
TCP Intercept
TCP Intercept Configuration
CBAC Basic Configuration
RITE
Zone-Based Firewall
ZBF Configuration – part II
ZBF Overview and Scenario
ZBF Configuration – part III
ZBF Configuration – part I
Parameter-map And Policing ZBF