Module 1 - 10: Media

: Vulnerabilities, Threats, and Attacks

There are no interactive media activities for this module.

: Security Planning and Policy

Demonstration Activity: Configuring SSH Access

In this activity, students will learn how to configure Cisco routers to act as SSH clients and servers.

Demonstration Activity: Setting up an IOS Router as an SSH Client and Adding Terminal Line Access

In this activity, students will learn how to configure a router as a SSH client.

: Security Devices

PhotoZoom: PIX 501 Security Appliance

In this PhotoZoom, students will view a PIX 501 Security Appliance.

PhotoZoom: PIX 506E Security Appliance

In this PhotoZoom, students will view a PIX 506E Security Appliance.

PhotoZoom: PIX 515E Security Appliance

In this PhotoZoom, students will view a PIX 515E Security Appliance.

PhotoZoom: PIX 525 Security Appliance

In this PhotoZoom, students will view a PIX 525 Security Appliance.

PhotoZoom: PIX 535 Security Appliance

In this PhotoZoom, students will view a PIX 535 Security Appliance.

Demonstration Activity: Configuring and verifying NTP

In this activity, students will learn the steps to configure and verify NTP.

Demonstration Activity: TCP Initialization Inside to Outside

In this activity, students will examine the PIX Security Appliance TCP initialization process in more detail.

Demonstration Activity: UDP Initialization Inside to Outside

In this activity, students will examine the PIX Security Appliance UDP initialization process in more detail.

Demonstration Activity: Enabling Static Outside Translations

In this activity, students will learn about static outside translations and how they can help when an organization has two different locations using the same private address range.

: Trust and Identity Technology

PhotoZoom: Cisco 2950 Switch

In this PhotoZoom, students will view a Cisco 2950 switch.

PhotoZoom: Cisco Aironet 1200 Series

In this PhotoZoom, students will view an Aironet 1200 series.

PhotoZoom: Cisco AP1100 Access Point

In this PhotoZoom, students will view an AP1100 access point.

: Cisco Secure Access Control Server

Demonstration Activity: Troubleshooting Techniques for Cisco Secure ACS 3.3 for Windows

In this activity, students will learn troubleshooting techniques for Cisco Secure ACS 3.3 for Windows.

Demonstration Activity: TACACS+ Overview and Configuration

In this activity, students will learn about the overview and configuration of TACACS+.

Demonstration Activity: RADIUS Configuration Overview

In this activity, students will learn about the RADIUS protocol.

: Configure Trust and Identity at Layer 3

Demonstration Activity: Configuring AAA for Cisco Perimeter Routers

This activity describes how to configure a Cisoc perimeter router to perform AAA using a local database.

Demonstration Activity: Task 1 - AAA Server Configuration for Auth-proxy

This activity demonstrates how to configure the AAA server to provide authentication and authorization for the Cisco IOS Firewall authorization proxy.

Demonstration Activity: Task 2 - AAA Configuration for Auth-proxy

This activity discusses how to configure the Cisco IOS Firewall to work with an authentication, authorization, and accounting (AAA) server and enable the authentication proxy feature.

Demonstration Activity: Task 3 - Authentication Proxy Configuration

This activity discusses how to configure the authentication proxy settings on a Cisco router.

Demonstration Activity: Task 4 - Test and Verify the Auth-proxy Configuration

This activity discusses the procedures for testing and verifying the authentication proxy configuration.

: Configure Trust and Identity at Layer 2

There are no interactive media activities for this module.

: Configure Filtering on a Router

Demonstration Activity: Cisco IOS Firewall versus PIX Security Appliance

In this activity, students will compare the Cisco IOS Firewall to the PIX Security Appliance.

Demonstration Activity: Corporate Extranet

In this activity, students will examine the corporate Extranet.

Demonstration Activity: Corporate Internet Perimeter

In this activity, students will examine the corporate Internet perimeter.

Demonstration Activity: Corporate Intranet

In this activity, students wil examine the corporate Intranet.

Demonstration Activity: Regional/Branch Office Perimeter

In this activity, students will examine the regional/branch office perimeter.

Demonstration Activity: Telecommuter/Home Office

In this activity, students will examine the telecommuter/home office.

Demonstration Activity: Configure Traffic Filtering for a Two Interface Firewall

In this activity, students will learn how to implement a security policy that filters outbound traffic.

Demonstration Activity: Configure Traffic Filtering for a Three Interface Firewall

In this activity, students will learn how to configure inspection rules for outbound, inbound, and DMZ traffic.

: Configure Filtering on a PIX Security Appliance

Demonstration Activity: Example of ActiveX Filtering

In this activity, students will learn about ActiveX filtering.

Demonstration Activity: 7 Step Process to Configure ACLs with Object Groups

In this activity, students will learn the process of configuring and applying access groups.

Demonstration Activity: 5 Step Process to Creating Nested Object Groups

In this activity, students will learn how to configure nested object groups

: Configure Filtering on a Switch

There are no interactive media activities for this module.




Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.