This course is part 2 of 6 in the Cisco CCNP Security (300-206) SENSS exam learning path. This course teaches one to secure the network infrastructure running Cisco IOS and ASAs, while also covering objectives of the CCNP Security (300-206) SENSS exam.
The network infrastructure is critical to enterprise businesses today. If compromised, business processes cease to function resulting in great expense, loss of reputation, and countless other effects over time. This course teaches one how to secure the network infrastructure on Cisco IOS router and Cisco Adaptive Security Appliances (ASA). This course also covers topics and objectives of the CCNP Security (300-206) SENSS exam.
Control Plane Security for Cisco IOS Well, welcome everyone to Control Plane Security for Cisco IOS. We're going to jump right into this module with a bit of an introduction here. So in this module, the first thing that we're going to do is a bit of a review on control plane security. Now we've already seen just a little bit of this, but we're going to dig a little bit deeper into this. And then after we do a little bit of a review of control plane security, we're going to go ahead and review the lab topology that we're using in this class, and we're actually going to get into that lab with a couple of demonstrations on infrastructure ACLs, control plane policing, and control plane protection in this module. Then, as we go through after we've looked at our topology that we'll be working with, I'm going to take a look at infrastructure ACLs and dig into how they're used, we'll talk about how to prevent spoofing with infrastructure ACLs, and we'll actually have a demonstration for that. Then we're going to look at control plane policing, which is what we kind of what we might consider to be the old-school way of doing things. And then we're going to take that control plane protection just a step further and we're going to look at control plane protection, and control plane protection is going to break out that control plane into a couple of sub-interfaces. We'll see what those are and how they work. So with that said, let's go ahead and dive right into this module with a review of control plane security.
Configuring CPPr and Routing Protocol Security Well, welcome to another module everyone. This is configuring CPPr and Routing Protocol Security. Let's take a look at what we'll see in this module. We're going to start out by configuring Control Plane Protection. So in the last module we covered all of the theory of control plane policing, control plane protection, and we saw the subinterfaces. So in this module we're going to start out by diving right into the command line. Then, after we finish that, we're going to come back in here to the slides and we're going to take a look at routing protocol protection and we're going to talk both about how to do authentication between our routing protocols and we're also going to touch on filtering our routing protocol information, and using that as a security mechanism. So with that said, let's go ahead and get into our demonstration of configuring control plane protection and control plane policing.