課堂由導師以講座形式教授課程理論及進行眾多的商業實習,而實習時段由學員親自進行商業實習。
1 Layer 2 (Ethernet) Security
1.1 Ethernet Frame Structure
1.2 Security in MAC Address Table
1.2.1 Understanding the current MAC Address Table status
1.2.2 Common Attacks in MAC Address Table
1.2.3 Preventing MAC Address Table Attack
1.2.4 實習: Basic Port Security
1.2.5 實習: Port Security with automatic errdisable recovery
1.3 VLAN Security
1.3.1 Basic VLAN Concept
1.3.2 Basic Trunk concept
1.3.3 DTP (Dynamic Trunking Protocol)
1.3.4 Trunking protocol
1.3.5 Tagging Attack - VLAN Hopping
1.3.6 802.1Q or ISL Tagging Attack or Information Gathering
1.3.7 Double-Encapsulated 802.1Q
1.4 DHCP
1.4.1 DHCP Process
1.4.2 Attacks Against DHCP
1.4.3 Countermeasure to DHCP Exhaustion Attack
1.4.4 實習: DHCP Snooping
1.4.5 DHCP Snooping Binding Table
1.4.6 Protecting ARP Infrastructure
1.4.7 Dynamic ARP Inspection
1.4.8 實習: Dynamic ARP Inspection
1.5 Identity Management in Layer 2 environment
1.5.1 Basic Identity Concept - AAA
1.5.2 IEEE 802.1x
1.5.3 IEEE 802.1x architecture
1.5.4 實習: IEEE 802.1x
1.5.5 實習: Configure AAA for Telnet connection in Switch1
1.6 Spanning Tree Protocol Security
1.6.1 Attack 1: Rouge Root Bridge
1.6.2 Attack 2: Rouge BPDU Message
1.6.3 Attack 3: BPDU DoS (Denail of Service)
1.7 HSRP Security
1.7.1 實習: Basic HSRP
1.7.2 實習: HSRP MD5 Authentication
1.8 VRRP Security
1.8.1 實習: Basic VRRP
1.8.2 實習: VRRP MD5 Authentication
2 IOS Advanced CBAC
2.1 Basic overview in IOS CBAC
2.2 Advanced topics in IOS CBAC
2.2.1 實習: Advanced CBAC
3 IOS Zone Based Firewall (ZBF)
3.1 Introduction of IOS Zone Based Firewall
3.2 Cisco Policy Language (CPL) Configuration
3.2.1 Define zones
3.2.2 Define zone-pairs
3.2.3 Define class-maps
3.2.4 Define policy-maps
3.2.5 實習: Basic ZFW Configuration
3.2.6 實習: Advanced ZFW Configuration
4 Authentication Proxy
4.1 Introduction of Authentiation Proxy
4.2 Authentication Proxy Process
4.3 Configuration Procedure
4.4 實習: Authentication Proxy
5 IOS IPS
5.1 Introduction of IOS IPS
5.2 Configuration Procedure
5.3 實習: IOS IPS
6 IPSec (IP Security) VPN
6.1 Introduction to IPSec
6.2 IPSec Standard
6.3 Types of IPSec VPNs
6.4 Details concepts understanding of IKE Phase 1
6.4.1 Management Connection
6.4.2 Diffie-Hellman
6.4.3 Peer Authentication
6.4.4 Configuring IKE Phase1
6.4.5 實習: Configure IKE Policy
6.4.6 Configure IKE peer authentication
6.4.7 實習: Configure IKE Pre-Shared Key
6.4.8 實習: Configure IKE RSA Encryption Nounce
6.4.9 IOS Certificate Authority
6.4.10 實習: Configure IOS CA
6.4.11 實習: Configure Router1 to obtain certificate from IOS CA
6.4.12 Details concepts understanding of IKE Phase 2
6.4.13 Crypto Access List
6.4.14 Transform Set
6.4.15 Crypto Map
6.5 Site-to-Site (L2L) VPN
6.5.1 實習 : Site-to-Site (L2L) VPN
6.5.2 CACCTP ( Crypto Access Check on Clear-Text Packet)
6.5.3 實習: CACCTP
6.5.4 實習: Site-to-Site (L2L) VPN with dynamic crypto map
6.5.5 Advanced Application of Dynamic Crypto Map – TED
6.5.6 實習: TED (Tunnel Endpoint Discovery)
6.5.7 IPSec in GRE Tunnel overview
6.5.8 實習: Basic GRE Tunnel
6.5.9 IPSec in GRE
6.5.10 實習: IPSec in GRE
6.5.11 VTI (Virtual Tunnel Interface)
6.5.12 實習: Site-to-Site IPSec VPN with VTI
6.5.13 More examples in Site-to-Site VPN
6.5.14 實習: Cert-Based IPSec Site-to-Site VPN
6.6 DMVPN (Dynamic Multipoint VPN)
6.6.1 Introduction to DMVPN
6.6.2 Technical Overview of DMVPN
6.6.3 實習: DMVPN (RIPv2 as routing protocol)
6.6.4 實習: DMVPN (OSPFv2 as routing protocol)
6.6.5 實習: DMVPN (EIGRP as routing protocol)
6.6.6 Redundancy design in DMVPN
6.6.7 實習: Dual-Hub DMVPN
6.7 Easy VPN (EZVPN)
6.7.1 EZVPN Components
6.7.2 Concept of split tunneling
6.7.3 Concept of RRI (Reverse Route Injection)
6.7.4 實習: Configure EZVPN Server and EZVPN Client
6.7.5 實習: Additional Features in EZVPN
6.7.6 EZVPN Server with DVTI
6.7.7 實習: EZVPN Server with DVTI
6.7.8 EZVPN Remote
6.7.9 Mode of EZVPN Remote
6.7.10 實習: EZVPN Remote (Client Mode with manual tunnel initialization)
6.7.11 實習: EZVPN Remote (Client Mode with auto tunnel initialization)
6.7.12 實習: EZVPN Remote (NEM with auto tunnel initialization)
6.7.13 實習: EZVPN Remote (NEM+ with auto tunnel initialization)
6.7.14 Authentication in EZVPN Remote
6.7.15 Methods in Xauth
6.7.16 實習: EZVPN Remote with Web Based Activation
6.8 GET (Group Encrypted Transport) VPN
6.8.1 GDOI (Group Domain of Interpretation)
6.8.2 Tunnel Header Preservation
6.8.3 Components in GET VPN
6.8.4 Group SA
6.8.5 Rekey Process
6.8.6 Basic Mutlicast Concepts
6.8.7 實習: Basic Multicast Concepts
6.8.8 Basic Mutlicast Routing Concepts
6.8.9 實習: Basic PIM-SM
6.8.10 Group Encrypted Transport (GET) VPN Configuration Procedures
6.8.11 實習: GET VPN
6.8.12 More about rekey concepts
6.8.13 實習: Experiencing Re-Key Process
6.9 SSL VPN
6.9.1 Three Modes of SSL VPN
6.9.2 Login Page of SSL VPN
6.9.3 實習: Basic SSL VPN
6.9.4 實習: Basic SSL VPN by using virtual-host concept
6.9.5 實習: Thin Client
6.9.6 實習: Tunnel Mode
7 Troubleshooting IPSec VPN Connection
7.1 IKE Phase 1 Troubleshooting
7.2 IKE Phase 2 Troubleshooting
7.3 Fragmentation Problems in IPSec VPN
8 Miscellenous Topic: Flexible Packet Matching (FPM)
8.1 Backgound of today’s filtering challenges
8.2 FPM Configuration Procedures
8.3 Protocol Header Description File (PHDF)
8.4 Example in FPM: Configuring FPM for MyDoom Packets
8.5 實習: FPM
9 Miscellenous Topic: Details of input traffic
10 Miscellenous Topic: Details of output traffic |