Implementing Cisco IOS Network Security v2.0 (IINS 2.0)
Request a Quote for this class
About this Course
Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners to end users and channel partner customers. The content focuses on the design, implementation, and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies as examples. The course covers security controls of Cisco IOS devices as well as a functional introduction to the Cisco ASA adaptive security appliance. Using instructor-led discussion, lecture, and hands-on lab exercises, this course allows students to perform basic tasks to secure a small branch office network using Cisco IOS security features that are available through web-based GUIs (Cisco Configuration Professional) and the CLI on Cisco routers, switches, and ASA appliances.
Audience Profile
The primary audience for this course is as follows:
- Network designers
- Network administrators
- Network engineers
- Network managers
- System engineers
At Course Completion
Upon completing this course, the student will be able to meet these overall objectives:
- Describe the components of a comprehensive network security policy that can be used to counter threats against IT systems, within the context of a security policy life cycle
- Develop and implement security countermeasures that are aimed at protecting network elements as part of the network infrastructure
- Deploy and maintain threat control and containment technologies for perimeter security in small and midsize networks
- Describe secure connectivity strategies and technologies using VPNs, as well as configure site-to-site and remote-access VPNs using Cisco IOS features
Prerequisites
The knowledge and skills that a student must have before attending this course are as follows:
- Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)
- Working knowledge of the Windows operating system
- Working knowledge of Cisco IOS networking and concepts
Course Outline
Module 1: Networking Security Fundamentals
Lesson 1: Introducing Networking Security Concepts
- Describe information security within the context of risk management and its underlying concepts
- Explain the motivation behind networking security, describing the business and security environment of organizations today
- Classify threat vectors according to multiple criteria, in order to define and plan mitigation strategies
- Analyze and compare design principles and considerations for network security
Lesson 2: Understanding Security Policies Using a Life-Cycle Approach
- Describe risk management within the context of business and organizational drivers
- Compare different compliance regulations and describe them as drivers of information security
- Provide a high-level definition of a security policy along with the benefits of creating a sound policy as part of the life-cycle process
- Analyze the benefits of using a life-cycle approach to information and network security
- Describe the assessment phases of the life-cycle approach, comparing and contrasting different methods and considerations
- Describe the testing phases of the life-cycle approach and how they relate to other phases
- Describe the incident response phases of the life-cycle approach, comparing high-level techniques that are commonly used to respond efficiently and effectively to security threats
- Describe the disaster recovery phases of the life-cycle approach and their importance in business continuity
Lesson 3: Building a Security Strategy for Borderless Networks
- Describe the Cisco Borderless Networks Architecture to position it as a framework to present the Cisco security portfolio of products
- Describe the Cisco SecureX Architecture at a high level, highlighting its features and benefits and providing examples of Cisco products that fall within this category
- Describe Cisco threat control and containment products and technologies, illustrating their high-level features and benefits
- Describe Cisco content security products and technologies, illustrating their high-level features and benefits
- Describe Cisco VPN solutions and technologies, illustrating their high-level features and benefits
- Describe security management products and technologies, illustrating their high-level features and benefit
Module 2: Protecting the Network Infrastructure
Lesson 1: Introducing Cisco Network Foundation Protection
- Categorize common threats against the network infrastructure
- Describe Cisco NFP as a framework to develop and implement security controls to protect the network infrastructure
- List and compare security controls that protect the control plane
- List and compare security controls that protect the data plane
- List and compare security controls that protect the management plane
Lesson 2: Protecting the Network Infrastructure Using Cisco Configuration Professional
- Articulate the features and benefits of Cisco Configuration Professional, describing its requirements and installation options
- Demonstrate the Cisco Configuration Professional GUI, showcasing the most relevant options and features
- Describe the unique components of Cisco Configuration Professional that are used for effective security policy deployment and configuration
- Describe and implement the One-Step Lockdown and audit features that are found on Cisco Configuration Professional
Lesson 3: Securing the Management Plane on Cisco IOS Devices
- Describe the management security features of the Cisco IOS Software on Cisco routers
- Demonstrate the configuration of management access using RBAC
- Describe the support for AAA services on Cisco routers
- Demonstrate the use of Cisco Configuration Professional to configure AAA services using the local user database
- Compare and contrast different device monitoring options, including SNMP and syslog
Lesson 4: Configuring AAA on Cisco IOS Devices Using Cisco Secure ACS
- Describe the features of the Cisco Secure ACS in the context of a management protection strategy
- Compare and contrast two popular AAA protocols: TACACS and RADIUS
- Demonstrate the configuration of network elements to use AAA authentication and authorization
- Demonstrate the initialization and basic configuration of Cisco Secure ACS acting as a AAA server
- Utilize CLI commands to verify the correct configuration of the router
Lesson 5: Securing the Data Plane on Cisco Catalyst Switches
- Introduce fundamental switching concepts, starting with the building blocks of VLANs and trunking
- Introduce other building blocks of the switch, including spanning tree for high availability
- Revisit and explain security threats that exploit vulnerabilities in the switching infrastructure
- Plan and develop a strategy for protecting the switch data plane
- Describe the Spanning Tree Protocol Toolkit that is found on Cisco IOS routers that prevents STP operations from having an impact on the security posture
- Revisit port security and configure it to illustrate security controls that are aimed at mitigating ARP spoofing and other threats
Lesson 6: Securing the Data Plane in IPv6 Environments
- Explain the need for IPv6 from the general perspective of the transition to IPv6 from IPv4
- List and describe the fundamental features of IPv6, as well as enhancements when compared to IPv4
- Analyze the IPv6 addressing scheme, components, and design principles and configure IPv6 addressing
- Describe the IPv6 routing function
- Evaluate how common and specific threats affect IPv6
- Develop and implement a strategy for IPv6 security
Module 3: Threat Control and Containment
Lesson 1: Planning a Threat Control Strategy
- Evaluate the current state of enterprise security in the presence of evolving threats
- Describe design considerations for a threat protection strategy to mitigate threats as part of a risk management strategy
- Describe how Cisco strategizes threat control and containment
Lesson 2: Implementing Access Control Lists for Threat Mitigation
- List the benefits of ACLs in general
- Describe the building blocks and operational framework of ACLs
- Describe summarizable address blocks in the context of CIDR and VLSM environments, demonstrating how ACL wildcard masks allow for threat mitigation in those environments
- List design considerations when deploying ACLs in general
- Demonstrate the use of Cisco Configuration Professional and the CLI to deploy and verify a threat containment strategy using ACLs
- Demonstrate the use of Cisco Configuration Professional and the CLI to correlate ACL log and alarm information to monitor their impact and effectiveness
- Configure object groups to simplify the implementation of ACLs for threat control
- Configure ACLs in IPv6 environments, highlighting the operational differences with IPv4 ACLs
Lesson 3: Understanding Firewall Fundamentals
- Describe firewall technologies that historically have played, and still play, a role in network access control and security architectures
- Introduce and describe the function and building blocks of NAT
- List design considerations for firewall deployment
- Describe guidelines for firewall ruleset creation
Lesson 4: Implementing Cisco IOS Zone-Based Policy Firewalls
- Introduce and describe the function, operational framework, and building blocks of Cisco IOS zone-based firewalls
- Describe the functions of zones and zone pairs, as well as their relationship in hierarchical policies
- Describe the Cisco Common Classification Policy Language for creating zone-based firewall policies
- List the default policies for the different combinations of zone types
- Demonstrate the configuration and verification of zone-based firewalls using Cisco Configuration Professional and the CLI
- Demonstrate the configuration of NAT services for zone-based firewalls
Lesson 5: Configuring Basic Firewall Policies on Cisco ASA Appliances
- Describe the Cisco ASA family of products, identifying the primary supported features
- Describe the building blocks of Cisco ASA configuration
- Describe the navigation options, features, and requirements of Cisco ASDM
- Describe the use of ACLs on Cisco ASA appliances
- Briefly describe the deployment of policies using the Cisco Modular Policy Framework
- Describe the configuration procedure to deploy basic outbound access control on Cisco ASA appliances using Cisco ASDM
Lesson 6: Understanding IPS Fundamentals
- Discuss the fundamentals of intrusion prevention and compare IDS and IPS
- Describe the building blocks of IPS and introduce the underlying technologies and deployment options
- Describe the use of signatures in intrusion prevention and highlight their benefits and drawbacks
- Discuss the need for IPS alarm monitoring and evaluate the options for event managers
- Analyze the design considerations in deploying IPS
Lesson 7: Implementing Cisco IOS IPS
- Describe the operational framework and requirements of Cisco IOS IPS
- Describe signature files and signature definitions from the operational and maintenance perspectives
- Evaluate scenarios and analyze a strategy for signature tuning
- Describe the options for event management using Cisco IOS IPS
- List the steps to configure Cisco IOS IPS using Cisco Configuration Professional, and implement the configuration using Cisco Configuration Professional wizards
- Implement signature tuning with Cisco Configuration Professional options
- Use Cisco Configuration Professional as an event manager, and monitor IPS operations
Module 4: Secure Connectivity
Lesson 1: Understanding the Fundamentals of VPN Technologies
- Discuss the state of VPN security and the business and technical drivers behind it
- Describe the required components and deployment options for VPNs
- Introduce the use of encryption in VPN deployments
- Introduce symmetric encryption algorithms and describe their use in VPN operations
- Introduce asymmetric encryption algorithms and describe their use in VPN operations
- Introduce hashing mechanisms and describe their use in VPN operations
- Describe the use of cryptographic keys in VPN operations and list the considerations in key management
- Describe how cryptography plays a role in commercial implementations such as IPsec and SSL/TLS
Lesson 2: Introducing Public Key Infrastructure
- Describe the asymmetric cryptography fundamentals behind PKI
- Explain the reasoning and components behind digital signatures and the RSA protocol
- Describe PKI requirements, components, and operations
- List PKI standards and their functions
- Detail the operations of CAs and RAs
Lesson 3: Examining IPsec Fundamentals
- Analyze the architecture of the IPsec protocol
- Detail the role and operational impact of the main IPsec components
- Describe IPsec modes of operation in various scenarios
- Describe the phases of IPsec connectivity
- Overview the operations of IPv6 VPNs
Lesson 4: Implementing Site-to-Site VPNs on Cisco IOS Routers
- Evaluate the requirements and configuration of site-to-site IPsec VPNs
- Use Cisco Configuration Professional to configure site-to-site IPsec VPNs
- Use CLI commands and Cisco Configuration Professional monitoring options to validate the VPN configuration
- Use CLI commands and Cisco Configuration Professional monitoring options to monitor and troubleshoot the VPN configuration
Lesson 5: Implementing SSL VPNs Using Cisco ASA Appliances
- Describe the use cases and operational requirements of SSL VPNs
- Describe the protocol framework for SSL and TLS
- Describe a configuration that is based on deployment options and other design considerations
- Describe the steps to configure Cisco VPN clientless mode on the Cisco ASA appliance, and demonstrate the configuration on Cisco ASDM
- Describe the steps to configure Cisco full tunnel mode on the Cisco ASA appliance, and demonstrate the configuration on Cisco ASDM using the Cisco AnyConnect client