Objectives
- On completion of this program, the participants are in a position to:
- Understand OSI model
- Understand TCP/IP principles
- Understand TCP/IP security problems
- Understand Common attack means that
- Understand the definition and classification of firewalls
- Understand firewall Main options and technologies
- Understand the info forwarding method and basic configuration of firewalls
- Understand the functions and classification of ACLs
- Understand firewall Security Policy and configuration
- Understand the principles of the NAT technology
- Understand the applying of NAT
- Understand the NAT configuration of firewalls
- Understand firewall Dual-System Hot Backup basic technology
- Understand firewall User Management
- Understand firewall VLAN//SA/E1/ADSL/WLAN/3G technology
- Understand the conception and functions of VPN
- Understand key VPN technologies
- Understand the classification and application of VPN
- Understand the applying eventualities of VPDN
- Understand the principles of L2TP
- Understand the applying eventualities of client-initialized and NAS-initialized L2TP VPN
- Understand the configuration of L2TP
- Understand the principles and implementation of GRE VPN
- Understand the safety mechanism of GRE VPN
- Understand the everyday application and configuration of GRE VPN
- Understand the principles of the IPSec technology
- Understand the AH and clairvoyance technologies
- Understand the service method of Dwight Eisenhower
- Understand the applying eventualities and configuration of IPSec VPN
- Understand the principles of the SSL VPN technology
- Understand the essential functions and options of the SVN product
- Understand the configuration of SSL VPN
- Understand firewall UTM basic technology
- Understand firewall UTM basic technology
- Understand what terminal security is
- Understand the parts and preparation of the Policy Center system
- Understand the structure management and access management functions of the terminal security system
- Understand the safety policy configuration of the terminal security system
Duration
5 operating days, as well as active exercise a pair of operating days
Exam Content
The HCNA-Security-CBSN test covers network security basis, firewall basis like package filter, NAT, etc. and VPN technologies like IPSec, SSL etc., likewise as their implementation in Huawei firewall product, firewall user management technology, UTM technology and implementation, and additionally terminal security with security policy configurations.
2.2 data points
Firewall
1).Basic principles of network security.
2).Firewall classicfications, work mode, security zone, basic options and configuration.
3).Package filter technology and configuration on interface and between zones, ACL application and configuration.
4).Different types of NAT technologies and configurations, like NAT supported supply science, NAT supported target science, NAT between or within zones, bidirection NAT, NAT server, target NAT.
5).Firewall dual-system hot backup technologies and configurations.
6).Firewall user management, user authentication, abdominal aortic aneurysm conception.
7).VLAN technologies, wireless fidelity technologies, WAN interface options.
VPN
1).VPN basic principles, classifications and secret writing technology.
2).L2TP principles, Client-Initialized L2TP, NAS-Initialized L2TP.
3).GRE principles and configurations.
4).IPSec basic principles, AH principles, clairvoyance principles, IKEprinciples, IPSec configurations.
5).SSL principles, Virtual entree conception and configurations, net proxy configurations, file sharing configurations, port forwarding configurations, network extention configurations.
UTM Technology
1).UTM conception, firewall UTM options and configurations.
Comments
Post a Comment