CCIE安全实验考试大纲变动情况
来源:优易学(YouYiXue.com) 2009-11-20 20:34:07   【优易学:中国教育考试第一门户】   资料下载   IT书店

Ⅴ Implement Identity Management
  Configure RADIUS and TACACS+ security protocols
  Configure LDAP
  Configure Cisco Secure ACS
  Configure certificate-based authentication
  Configure proxy authentication
  Configure 802.1x
  Configure advanced identity management features
  Configure Cisco NAC Framework
  Ⅵ Implement Control Plane and Management Plane Security
  Implement routing plane security features (protocol authentication, route filtering)
  Configure Control Plane Policing
  Configure CP protection and management protection
  Configure broadcast control and switchport security
  Configure additional CPU protection mechanisms (options drop, logging interval)
  Disable unnecessary services
  Control device access (Telnet, HTTP, SSH, Privilege levels)
  Configure SNMP, Syslog, AAA, NTP
  Configure service authentication (FTP, Telnet, HTTP, other)
  Configure RADIUS and TACACS+ security protocols
  Configure device management and security
  Ⅶ Configure Advanced Security
  Configure mitigation techniques to respond to network attacks
  Configure packet marking techniques
  Implement security RFCs (RFC1918/3330, RFC2827/3704)
  Configure Black Hole and Sink Hole solutions
  Configure RTBH filtering (Remote Triggered Black Hole)
  Configure Traffic Filtering using Access-Lists
  Configure IOS NAT
  Configure TCP Intercept
  Configure uRPF
  Configure CAR
  Configure NBAR
  Configure NetFlow
  Configure Anti-Spoofing solutions
  Configure Policing
  Capture and utilize packet captures
  Configure Transit Traffic Control and Congestion Management
  Configure Cisco Catalyst advanced security features
  Ⅷ Identify and Mitigate Network Attacks
  Identify and protect against fragmentation attacks
  Identify and protect against malicious IP option usage
  Identify and protect against network reconnaissance attacks
  Identify and protect against IP spoofing attacks
  Identify and protect against MAC spoofing attacks
  Identify and protect against ARP spoofing attacks
  Identify and protect against Denial of Service (DoS) attacks
  Identify and protect against Distributed Denial of Service (DDoS) attacks
  Identify and protect against Man-in-the-Middle (MiM) attacks
  Identify and protect against port redirection attacks
  Identify and protect against DHCP attacks
  Identify and protect against DNS attacks
  Identify and protect against Smurf attacks
  Identify and protect against SYN attacks
  Identify and protect against MAC Flooding attacks
  Identify and protect against VLAN hoping attacks
  Identify and protect against various Layer2 and Layer3 attacks

上一页  [1] [2] 

责任编辑:虫虫

收藏此页】【 】【打印】【回到顶部
文章搜索:
 相关文章
热点资讯
热门课程培训