Cisco Systems

 


Modules:  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  CS1  |  CS2  |  All  |

Module 9: Monitoring and Security

Module Overview
9.1 Monitoring Switched Network Performance with SPAN and VSPAN
9.1.1 Monitoring switched network performance with SPAN and VSPAN
9.1.2 Monitoring with SPAN on a port basis
9.1.3 SPAN interaction with other features
9.1.4 SPAN and VSPAN configuration limitations
9.1.5 Configuring SPAN sessions
9.1.6 VSPAN – SPAN using VLANS as monitored source
9.2 RSPAN
9.2.1 RSPAN overview
9.2.2 RSPAN reflector ports
9.2.3 RSPAN interaction with other features
9.2.4 RSPAN and RSPAN VLANs

9.2.5

Configuring RSPAN
9.2.6 Configuring RSPAN to filter trunks for specific VLAN traffic
9.3 Network Analysis Modules and Switch Fabric Modules
9.3.1 Overview of network analysis and switch fabric modules
9.3.2 The network analysis module
9.3.3 Using the NAM
9.3.4 Benefits of deploying a NAM
9.3.5 NAM troubleshooting
9.3.6 Increasing switching fabric in 6500 series switches
9.3.7 Configuring the Switch Fabric Module
9.3.8 Monitoring the Switch Fabric Module
9.4 Basic Security
9.4.1 Access control policy
9.4.2 Basic security measures
9.4.3 Physical security
9.4.4 Connecting to the switch
9.4.5 Out-of-band management
9.4.6 In-band management
9.4.7 Basic password protection
9.5 Securing Remote Management
9.5.1 Remote management security options
9.5.2 Advanced user name options
9.5.3 Encrypting communications using Secure Shell
9.5.4 Encryption key-pairs
9.5.5 Using VLANs to restrict remote management
9.5.6 Securing the web management interface
9.5.7 Using access lists to restrict remote management
9.5.8 Additional remote management session options
9.5.9 Configuring verifying, and troubleshooting SSH server
9.6 Securing User Access
9.6.1 Securing user access
9.6.2 Using port security, protected ports, and private VLANs
9.6.3 Using access lists
9.6.4 Router ACLs
9.6.5 Port ACLs
9.6.6 VLAN ACLs and VLAN maps
9.6.7 Configuring and verifying port security
9.6.8 Configuring and verifying protected ports
9.6.9 Configuring and verifying access lists
9.7 Authentication, Authorization, and Accounting
9.7.1 Introduction to AAA and security protocols
9.7.2 TACACS+
9.7.3 RADIUS
9.7.4 Cisco Secure Access Control Server (ACS)
9.7.5 Configuring AAA
9.7.6 Configuring TACACS+ and RADIUS clients
9.7.7 Configuring AAA authentication
9.7.8 Configuring AAA authorization
9.7.9 Configuring AAA accounting
9.8 802.1X Port-based Authentication
9.8.1 Understanding 802.1X
9.8.2 Authentication initiation and message exchange
9.8.3 Ports in authorized and unauthorized states
9.8.4 Supported topologies
9.8.5 802.1X configuration guidelines
9.8.6 Configuring 802.1X port-base authentication
9.9 Hands-on Lab Exercises
9.9.1 SPAN configuration
9.9.2 VSPAN configuration
9.9.3 RSPAN configuration
9.9.4 Setting encrypted passwords
9.9.5 Using local usernames and passwords
9.9.6 Advanced username options
9.9.7 Management VLANs on a single switch
9.9.8 Restricting virtual terminal sessions with access lists
9.9.9 Restricting web interface sessions with access lists
9.9.10 Configuring protected ports
9.9.11 Configuring VLAN maps
Module Summary

Module Quiz

Close Window
All contents copyright © 2003 Cisco Systems, Inc. All rights reserved.