CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide

E-book Engels 2022 9780136589815
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam and excel in your day-to-day security work.

CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

* Master the topics on the CCNP Security concentration exam that focuses on the Cisco Secure Firewall and IPS (formerly known as Cisco Firepower)
* Assess your knowledge with chapter-opening quizzes
* Review key concepts with exam preparation tasks
* Practice with realistic exam questions in the practice test software

CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Long-time Cisco security insider Nazmul Rajib shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

* A test-preparation routine proven to help you pass the exams
* Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section
* Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly
* The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
* A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
* Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.

This official study guide helps you master the topics on the CCNP Security concentration exam that focuses on the Cisco Secure Firewall and IPS (formerly known as Cisco Firepower). Use it to deepen your knowledge of

* Configurations
* Integrations
* Deployments
* Management
* Troubleshooting, and more

Companion Website:
The companion website contains two full practice exams, an interactive Flash Cards application, Study Planner, Glossary, memory table and config checklist review exercises, and more.

Includes Exclusive Offers for Up to 80% Off Video Training, Practice Tests, and more

Pearson Test Prep online system requirements:
Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.
Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPad OS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7.

Pearson Test Prep offline system requirements:
Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases.

Also available from Cisco Press for CCNP Security study is the CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide Premium Edition eBook and Practice Test. This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test.

This integrated learning package

* Enables you to focus on individual topic areas or take complete, timed exams
* Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
* Provides unique sets of exam-realistic practice questions
* Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Specificaties

ISBN13:9780136589815
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Introduction xxv <br> Part I General Deployment <br> Chapter 1 Introduction to Cisco Secure Firewall and IPS 2 <br>“Do I Know This Already?” Quiz 3 <br>Foundation Topics 4 <br>Evolution of Next-Generation Firewall 4 <br>Cisco Secure Firewall Solutions 8 <br>Product Evolution and Lifecycle 11 <br>Software and Hardware Architecture 14 <br>Scalability and Resiliency 18 <br>&nbsp;&nbsp;&nbsp; Clustering 18 <br>&nbsp;&nbsp;&nbsp; Multi-Instance 19 <br>&nbsp;&nbsp;&nbsp; High Availability 20 <br>&nbsp;&nbsp;&nbsp; Resiliency in Connectivity 21 <br>Summary 22 <br>Exam Preparation Tasks 22 <br> Chapter 2 Deployment of Secure Firewall Virtual 24 <br>“Do I Know This Already?” Quiz 24 <br>Foundation Topics 26 <br>Cisco Secure Firewall on a Virtual Platform 26 <br>&nbsp;&nbsp;&nbsp; Hosting Environment Settings 27 <br>&nbsp;&nbsp;&nbsp; Virtual Resource Allocation 28 <br>&nbsp;&nbsp;&nbsp; Software Package Selection 28 <br>Best Practices 30 <br>Configuration 31 <br>&nbsp;&nbsp;&nbsp; Virtual Network for Management Traffic 32 <br>&nbsp;&nbsp;&nbsp; Virtual Network for Data Traffic 33 <br>&nbsp;&nbsp;&nbsp; Virtual Machine Creation for Secure Firewall 35 <br>System Initialization and Validation 41 <br>Summary 45 <br>Exam Preparation Tasks 46 <br> Chapter 3 Licensing and Registration 48 <br>Do I Know This Already? 48 <br>Foundation Topics 50 <br>Cisco Licensing Architecture 50 <br>&nbsp;&nbsp;&nbsp; Direct Cloud Access 52 <br>&nbsp;&nbsp;&nbsp; On-Premises Server 52 <br>&nbsp;&nbsp;&nbsp; Offline Access 53 <br>Cisco Secure Firewall Licenses 54 <br>&nbsp;&nbsp;&nbsp; Feature License 54 <br>&nbsp;&nbsp;&nbsp; Export-Controlled License 55 <br>&nbsp;&nbsp;&nbsp; Evaluation License 56 <br>Validation of Licensing 59 <br>Device Registration 61 <br>&nbsp;&nbsp;&nbsp; Best Practices for Registration 61 <br>&nbsp;&nbsp;&nbsp; Configurations on Threat Defense 62 <br>&nbsp;&nbsp;&nbsp; Configurations on Management Center 63 <br>&nbsp;&nbsp;&nbsp; Management Communication over the Internet 65 <br>Validation of Registration 67 <br>Summary 68 <br>Exam Preparation Tasks 69 <br> Chapter 4 Firewall Deployment in Routed Mode 70 <br>“Do I Know This Already?” Quiz 70 <br>Foundation Topics 72 <br>Routed Mode Essentials 72 <br>Best Practices for Routed Mode Configuration 73 <br>Fulfilling Prerequisites 73 <br>&nbsp;&nbsp;&nbsp; Enabling the Routed Firewall Mode 75 <br>Configuration of the Routed Interface 75 <br>&nbsp;&nbsp;&nbsp; Configuring Interfaces with Static IP Addresses 76 <br>&nbsp;&nbsp;&nbsp; Configuring Interfaces with Automatic IP Addresses 80 <br>Validation of Interface Configuration 82 <br>Summary 88 <br>Exam Preparation Tasks 89 <br> Chapter 5 Firewall Deployment in Transparent Mode 90 <br>“Do I Know This Already?” Quiz 90 <br>Foundation Topics 92 <br>Transparent Mode Essentials 92 <br>Best Practices for Transparent Mode Configuration 93 <br>Fulfilling Prerequisites 94 <br>&nbsp;&nbsp;&nbsp; Enabling the Transparent Firewall Mode 95 <br>Configuring Transparent Mode in a Layer 2 Network 96 <br>&nbsp;&nbsp;&nbsp; Configuring the Physical and Virtual Interfaces 96 <br>&nbsp;&nbsp;&nbsp; Verifying the Interface Status 103 <br>&nbsp;&nbsp;&nbsp; Verifying Basic Connectivity and Operations 104 <br>Deploying a Threat Defense Between Layer 3 Networks 108 <br>&nbsp;&nbsp;&nbsp; Selecting a Default Action 108 <br>&nbsp;&nbsp;&nbsp; Adding an Access Control Rule for a Routing Protocol 111 <br>&nbsp;&nbsp;&nbsp; Creating an Access Control Rule for the SSH Protocol 113 <br>&nbsp;&nbsp;&nbsp; Verifying Access Control Lists 115 <br>Integrated Routing and Bridging (IRB) 118 <br>Summary 118 <br>Exam Preparation Tasks 118 <br> Chapter 6 IPS-Only Deployment in Inline Mode 120 <br>“Do I Know This Already?” Quiz 120 <br>Foundation Topics 122 <br>Inline Mode Essentials <br>&nbsp;&nbsp;&nbsp; Inline Mode Versus Passive Mode 123 <br>&nbsp;&nbsp;&nbsp; Inline Mode Versus Transparent Mode 125 <br>Best Practices for Inline Mode 125 <br>Inline Mode Configuration 126 <br>&nbsp;&nbsp;&nbsp; Fulfilling Prerequisites 126 <br>&nbsp;&nbsp;&nbsp; Interface Setup 127 <br>&nbsp;&nbsp;&nbsp; Inline Set Configuration 129 <br>Verification 132 <br>&nbsp;&nbsp;&nbsp; Event Analysis in IPS-Only Mode 135 <br>Summary 136 <br>Exam Preparation Tasks 136 <br> Chapter 7 Deployment in Detection-Only Mode 138 <br>“Do I Know This Already?” Quiz 139 <br>Foundation Topics 141 <br>Detection-Only Mode Essentials 141 <br>&nbsp;&nbsp;&nbsp; Passive Monitoring Technology 141 <br>&nbsp;&nbsp;&nbsp; Interface Modes: Inline, Inline Tap, and Passive 142 <br>Best Practices for Detection-Only Deployment 143 <br>Inline Tap Mode 145 <br>&nbsp;&nbsp;&nbsp; Configuration of Inline Tap Mode 145 <br>&nbsp;&nbsp;&nbsp; Verification of Inline Tap Configuration 147 <br>Passive Interface Mode 149 <br>&nbsp;&nbsp;&nbsp; Configuration of Passive Interface Mode 149 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configuring Passive Interface Mode on a Threat Defense 150 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configuring a SPAN Port on a Switch 151 <br>&nbsp;&nbsp;&nbsp; Verification of Passive Interface Configuration 152 <br>Event Analysis in Detection-Only Mode 153 <br>Summary 154 <br>Exam Preparation Tasks 154 <br> Part II Basic Security Operations <br> Chapter 8 Capturing Traffic for Advanced Analysis 156 <br>“Do I Know This Already?” Quiz 157 <br>Foundation Topics 158 <br>Packet Capture Essentials 158 <br>Best Practices for Capturing Traffic 160 <br>Capturing of Packets Using Secure Firewall 162 <br>&nbsp;&nbsp;&nbsp; Configuration 162 <br>&nbsp;&nbsp;&nbsp; Verification 165 <br>&nbsp;&nbsp;&nbsp; Packet Capture versus Packet Tracer 169 <br>Summary 170 <br>Exam Preparation Tasks 170 <br> Chapter 9 Network Discovery Policy 172 <br>“Do I Know This Already?” Quiz 172 <br>Foundation Topics 174 <br>Network Discovery Essentials 174 <br>&nbsp;&nbsp;&nbsp; Application Detectors 175 <br>&nbsp;&nbsp;&nbsp; Network Discovery Operations 176 <br>Best Practices for Network Discovery 178 <br>Fulfilling Prerequisites 179 <br>Configurations 180 <br>&nbsp;&nbsp;&nbsp; Reusable Objects 181 <br>&nbsp;&nbsp;&nbsp; Network Discovery Policy 183 <br>Verification 186 <br>&nbsp;&nbsp;&nbsp; Analyzing Application Discovery 186 <br>&nbsp;&nbsp;&nbsp; Analyzing Host Discovery 186 <br>&nbsp;&nbsp;&nbsp; Undiscovered New Hosts 188 <br>Summary 191 <br>Exam Preparation Tasks 191 <br> Chapter 10 Access Control Policy 194 <br>“Do I Know This Already?” Quiz 194 <br>Foundation Topics 196 <br>Access Control Policy Essentials 196 <br>&nbsp;&nbsp;&nbsp; Policy Editor 196 <br>&nbsp;&nbsp;&nbsp; Rule Editor 198 <br>Best Practices for Access Control Policy 199 <br>Access Control Policy Configuration 200 <br>&nbsp;&nbsp;&nbsp; Fulfilling Prerequisites 201 <br>&nbsp;&nbsp;&nbsp; Creating Rules 202 <br>Verification 208 <br>Summary 222 <br>Exam Preparation Tasks 222 <br> Chapter 11 Prefilter Policy 224 <br>“Do I Know This Already?” Quiz 224 <br>Foundation Topics 226 <br>Prefilter Policy Essentials 226 <br>&nbsp;&nbsp;&nbsp; Prefilter Policy: Rules and Actions 226 <br>&nbsp;&nbsp;&nbsp; Bypassing Deep Packet Inspection 227 <br>Best Practices for a Prefilter Policy 230 <br>Enabling Bypass Through a Prefilter Policy 230 <br>&nbsp;&nbsp;&nbsp; Fulfilling Prerequisites 230 <br>&nbsp;&nbsp;&nbsp; Configuring a Rule in a Prefilter Policy 230 <br>&nbsp;&nbsp;&nbsp; Invoking a Prefilter Policy into an Access Control Policy 235 <br>Establishing Trust Through an Access Control Policy 237 <br>Verification 240 <br>Managing Encapsulated Traffic Inspection 242 <br>Summary 245 <br>Exam Preparation Tasks 245 <br> Chapter 12 Security Intelligence 248 <br>“Do I Know This Already?” Quiz 249 <br>Foundation Topics 251 <br>Security Intelligence Essentials 251 <br>Best Practices for Security Intelligence 256 <br>Fulfilling Prerequisites 257 <br>Automatic Blocking Using Cisco Intelligence Feed 259 <br>&nbsp;&nbsp;&nbsp; Verifying the Action of Cisco Intelligence Feed 262 <br>&nbsp;&nbsp;&nbsp; Overriding the Cisco Intelligence Feed Outcome 265 <br>Instant Blocking Using Context Menu 267 <br>&nbsp;&nbsp;&nbsp; Adding an Address to the Block List 267 <br>&nbsp;&nbsp;&nbsp; Deleting an Address from the Block List 268 <br>Manual Blocking Using Custom List 269 <br>&nbsp;&nbsp;&nbsp; Enabling Security Intelligence in Monitor-Only Mode 272 <br>Threat Intelligence Director 274 <br>&nbsp;&nbsp;&nbsp; Enabling Threat Intelligence Director 276 <br>&nbsp;&nbsp;&nbsp; Adding Sources and Importing Indicators 277 <br>Summary 280 <br>Exam Preparation Tasks 281 <br> Chapter 13 Domain Name System (DNS) Policy 282 <br>“Do I Know This Already?” Quiz 282 <br>Foundation Topics 284 <br>DNS Policy Essentials 284 <br>&nbsp;&nbsp;&nbsp; Domain Name System (DNS) 284 <br>&nbsp;&nbsp;&nbsp; Blocking of a DNS Query Using a Secure Firewall 285 <br>&nbsp;&nbsp;&nbsp; DNS Rule Actions 287 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Actions That Can Interrupt DNS Queries 288 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Actions That Allow DNS Queries 292 <br>&nbsp;&nbsp;&nbsp; Sources of Intelligence 293 <br>Best Practices for Blocking DNS Queries 295 <br>Fulfilling Prerequisites 296 <br>Configuring DNS Policy 297 <br>&nbsp;&nbsp;&nbsp; Add a New Rule to a DNS Policy 298 <br>&nbsp;&nbsp;&nbsp; Invoke the DNS Policy 301 <br>Verification 302 <br>Summary 307 <br>Exam Preparation Tasks 307 <br> Chapter 14 URL Filtering 310 <br>“Do I Know This Already?” Quiz 310 <br>Foundation Topics 312 <br>URL Filtering Essentials 312 <br>&nbsp;&nbsp;&nbsp; Category and Reputation 312 <br>&nbsp;&nbsp;&nbsp; URL Database 314 <br>Fulfilling Prerequisites 315 <br>Best Practices for URL Filtering Configuration 317 <br>Enabling URL Filtering 322 <br>&nbsp;&nbsp;&nbsp; Blocking URLs of a Certain Category 323 <br>&nbsp;&nbsp;&nbsp; Verifying the Operation of a URL Filtering Rule 325 <br>&nbsp;&nbsp;&nbsp; Allowing a Specific URL 329 <br>&nbsp;&nbsp;&nbsp; Analyzing the Default Category Override 331 <br>&nbsp;&nbsp;&nbsp; Handling Uncategorized URLs 335 <br>&nbsp;&nbsp;&nbsp; Investigating the Uncategorized URLs 338 <br>Summary 340 <br>Exam Preparation Tasks 341 <br> Part III Advanced Configurations <br> Chapter 15 Network Analysis and Intrusion Policies 342 <br>“Do I Know This Already?” Quiz 343 <br>Foundation Topics 345 <br>Intrusion Prevention System Essentials 345 <br>&nbsp;&nbsp;&nbsp; Network Analysis Policy 346 <br>&nbsp;&nbsp;&nbsp; Intrusion Policy 346 <br>&nbsp;&nbsp;&nbsp; System-Provided Variable Sets 352 <br>&nbsp;&nbsp;&nbsp; System-Provided Base Policies 353 <br>Best Practices for Intrusion Policy Deployment 356 <br>Configuring a Network Analysis Policy 359 <br>Configuring an Intrusion Policy 364 <br>&nbsp;&nbsp;&nbsp; Creating a Policy with a Default Ruleset 364 <br>&nbsp;&nbsp;&nbsp; Incorporating Intrusion Rule Recommendations 365 <br>&nbsp;&nbsp;&nbsp; Enabling or Disabling an Intrusion Rule 368 <br>&nbsp;&nbsp;&nbsp; Setting Up a Variable Set 369 <br>Policy Deployment 371 <br>Verification 373 <br>Summary 379 <br>Exam Preparation Tasks 379 <br> Chapter 16 Malware and File Policy 380 <br>“Do I Know This Already?” Quiz 380 <br>Foundation Topics 382 <br>File Policy Essentials 382 <br>&nbsp;&nbsp;&nbsp; File Type Detection 382 <br>&nbsp;&nbsp;&nbsp; Malware Analysis 382 <br>Best Practices for File Policy Configuration 386 <br>Fulfilling Prerequisites 387 <br>Configuring a File Policy 390 <br>&nbsp;&nbsp;&nbsp; Creating a File Policy 390 <br>&nbsp;&nbsp;&nbsp; Deploying a File Policy 396 <br>Verification 398 <br>&nbsp;&nbsp;&nbsp; Analyzing File Events 399 <br>&nbsp;&nbsp;&nbsp; Analyzing Malware Events 404 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Management Center Is Unable to Communicate with the Cloud 404 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Management Center Performs a Cloud Lookup 408 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Threat Defense Blocks Malware 409 <br>&nbsp;&nbsp;&nbsp; Overriding a Malware Disposition 412 <br>&nbsp;&nbsp;&nbsp; Network Trajectory 413 <br>Summary 414 <br>Exam Preparation Tasks 414 <br> Chapter 17 Network Address Translation (NAT) 416 <br>“Do I Know This Already?” Quiz 417 <br>Foundation Topics 418 <br>NAT Essentials 418 <br>&nbsp;&nbsp;&nbsp; NAT Techniques 420 <br>&nbsp;&nbsp;&nbsp; NAT Rule Types 422 <br>Best Practices for NAT Deployment 423 <br>Fulfilling Prerequisites 425 <br>Configuring NAT 427 <br>&nbsp;&nbsp;&nbsp; Masquerading a Source Address (Source NAT for Outbound Connection) 427 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configuring a Dynamic NAT Rule 427 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verifying the Configuration 433 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verifying the Operation: Inside to Outside 434 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verifying the Operation: Outside to Inside 441 <br>&nbsp;&nbsp;&nbsp; Connecting to a Masqueraded Destination (Destination NAT for Inbound Connection) 446 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configuring a Static NAT Rule 446 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verifying the Operation: Outside to DMZ 449 <br>Summary 457 <br>Exam Preparation Tasks 457 <br> Chapter 18 Traffic Decryption Policy 460 <br>“Do I Know This Already?” Quiz 460 <br>Foundation Topics 462 <br>Traffic Decryption Essentials 462 <br>&nbsp;&nbsp;&nbsp; Overview of SSL and TLS Protocols 462 <br>&nbsp;&nbsp;&nbsp; Decryption Techniques on Secure Firewall 466 <br>Best Practices for Traffic Decryption 467 <br>Configuring a Decryption Policy 468 <br>&nbsp;&nbsp;&nbsp; PKI Objects 468 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Internal CAs Object 469 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Internal Certs Object 469 <br>&nbsp;&nbsp;&nbsp; SSL Policy 470 <br>&nbsp;&nbsp;&nbsp; File Policy 474 <br>&nbsp;&nbsp;&nbsp; Access Control Policy 474 <br>Verification 476 <br>Summary 480 <br>Exam Preparation Tasks 480 <br> Chapter 19 Virtual Private Network (VPN) 482 <br>“Do I Know This Already?” Quiz 483 <br>Foundation Topics 484 <br>VPN Essentials 484 <br>&nbsp;&nbsp;&nbsp; Site-to-Site VPN 485 <br>&nbsp;&nbsp;&nbsp; Remote-Access VPN 488 <br>IPsec Essentials 489 <br>&nbsp;&nbsp;&nbsp; Mode of Operation 490 <br>&nbsp;&nbsp;&nbsp; Security Association and Key Exchange 492 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IKEv1 492 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IKEv2 494 <br>&nbsp;&nbsp;&nbsp; Authentication 495 <br>Site-to-Site VPN Deployment 496 <br>&nbsp;&nbsp;&nbsp; Prerequisites 496 <br>&nbsp;&nbsp;&nbsp; Configurations 499 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Access Control Policy 503 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NAT Policy 504 <br>&nbsp;&nbsp;&nbsp; Verification 507 <br>Remote-Access VPN Deployment 513 <br>&nbsp;&nbsp;&nbsp; Prerequisites 513 <br>&nbsp;&nbsp;&nbsp; Configuration 516 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AnyConnect File 517 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RADIUS Server Group 518 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Certificate Enrollment 518 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network and IP Address Pool 521 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Remote-Access VPN Policy 522 <br>&nbsp;&nbsp;&nbsp; Verification 527 <br>Summary 534 <br>Exam Preparation Tasks 535 <br> Chapter 20 Quality of Service (QoS) 536 <br>“Do I Know This Already?” Quiz 536 <br>Foundation Topics 538 <br>Quality of Service Essentials 538 <br>Best Practices for Enabling QoS 541 <br>Fulfilling Prerequisites 541 <br>Configuring QoS Policy 542 <br>Verification 546 <br>&nbsp;&nbsp;&nbsp; Analyzing QoS Events and Statistics 550 <br>Summary 554 <br>Exam Preparation Tasks 554 <br> Chapter 21 System Logging (Syslog) 556 <br>“Do I Know This Already?” Quiz 557 <br>Foundation Topics 558 <br>Secure Firewall Logging Essentials 558 <br>Best Practices for Logging 560 <br>Prerequisites 560 <br>Sending Syslog from Threat Defense 564 <br>&nbsp;&nbsp;&nbsp; Add a Syslog Server on Platform Settings 564 <br>&nbsp;&nbsp;&nbsp; Enable Logging on Access Control Policy 568 <br>&nbsp;&nbsp;&nbsp; Verification 568 <br>Sending Syslog from Management Center 569 <br>&nbsp;&nbsp;&nbsp; Create Syslog Alerts 569 <br>&nbsp;&nbsp;&nbsp; Verification 572 <br>&nbsp;&nbsp;&nbsp; Correlate Events to Send Syslog Alerts 574 <br>Troubleshooting Logs 578 <br>Summary 581 <br>Exam Preparation Tasks 581 <br> Part IV Conclusion <br> Chapter 22 Final Preparation 582 <br>Getting Ready for the Exam 582 <br>&nbsp;&nbsp;&nbsp; Tools for Final Review 582 <br>Exam Day 583 <br>Practice Tests 583 <br>&nbsp;&nbsp;&nbsp; Pearson Cert Practice Test Engine and Questions on the Website 583 <br>&nbsp;&nbsp;&nbsp; Accessing the Pearson Test Prep Software Online 584 <br>&nbsp;&nbsp;&nbsp; Accessing the Pearson Test Prep Software Offline 584 <br>&nbsp;&nbsp;&nbsp; Customizing Your Exams 585 <br>&nbsp;&nbsp;&nbsp; Updating Your Exams 585 <br>&nbsp;&nbsp;&nbsp; Premium Edition 586 <br>Chapter-Ending Review Tools 586 <br>Summary 586 <br> Part V Appendixes <br> Appendix A Answers to the “Do I Know This Already?” Questions 588 <br> Appendix B CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide Updates 598 <br> Glossary 601 <br> <br> Online Elements <br>Appendix C Memory Tables <br>Appendix D Memory Tables Answer Key <br>Appendix E Study Planner <br>Glossary <br> <br> <br>9780136589709&nbsp;&nbsp; TOC&nbsp;&nbsp; 4/21/2022 <br> <br> <br>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide