5.2. Cisco CCNP - Implementing Cisco Edge Network Security Solutions (300-206 SENSS)ΒΆ
1.0 Threat Defense (25%)
1.1 Implement firewall (ASA or IOS depending on which supports the implementation)
1.1.a Implement ACLs on IOS, ZBFW and ASA
1.1.b Implement static/dynamic NAT/PAT (on IOS and ASA devices)
1.1.d Describe threat detection features
1.1.e Implement botnet traffic filtering
1.1.f Configure application filtering and protocol inspection
1.1.g Describe ASA security contexts
1.2 Implement Layer 2 Security
1.2.b Describe dynamic ARP inspection
1.2.e Describe common Layer 2 threats and attacks and mitigation
1.3 Configure device hardening per best practices
- 2.0 Cisco Security Devices GUIs and Secured CLI Management (25%)
2.1 Implement SSHv2, HTTPS, and SNMPv3 access on the network devices
2.2 Implement RBAC on the ASA/IOS using CLI and ASDM
2.3 Describe Cisco Prime Infrastructure
2.3.a Functions and use cases of Cisco Prime
2.3.b Device Management
2.4 Describe Cisco Security Manager (CSM)
2.4.a Functions and use cases of CSM
2.4.b Device Management
2.5 Implement Device Managers
2.5.a Implement ASA firewall features using ASDM
3.0 Management Services on Cisco Devices (12%)
3.1 Configure NetFlow exporter on Cisco Routers, Switches, and ASA
3.2 Implement SNMPv3
3.2.a Create views, groups, users, authentication, and encryption
3.3 Implement logging on Cisco Routers, Switches, and ASA using Cisco best practices
3.4 Implement NTP with authentication on Cisco Routers, Switches, and ASA
3.5 Describe CDP, DNS, SCP, SFTP, and DHCP
3.5.a Describe security implications of using CDP on routers and switches
3.5.b Need for dnssec
4.0 Troubleshooting, Monitoring and Reporting Tools (10%)
4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog
4.1.a Analyze packet tracer on the firewall using CLI/ASDM
4.1.b Configure and analyze packet capture using CLI/ASDM
4.1.c Analyze syslog events generated from ASA
5.0 Threat Defense Architectures (16%)
5.1 Design a Firewall Solution
5.2 Layer 2 Security Solutions
5.2.a Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
5.2.b Describe best practices for implementation
5.2.c Describe how PVLANs can be used to segregate network traffic at Layer 2
6.0 Security Components and Considerations (12%)
6.1 Describe security operations management architectures
6.2 Describe Data Center security components and considerations
6.2.a Virtualization and Cloud security6.3 Describe Collaboration security components and considerations
6.3.a Basic ASA UC Inspection features6.4 Describe common IPv6 security considerations