PRchecker.info

مبانی شبکه، سیسکو، مایکروسافت، میکروتیک

آشنایی با مبانی و ارائه راهکار

مبانی شبکه، سیسکو، مایکروسافت، میکروتیک

آشنایی با مبانی و ارائه راهکار

مبانی شبکه، سیسکو، مایکروسافت، میکروتیک
طبقه بندی موضوعی
آخرین نظرات
  • ۵ خرداد ۹۵، ۱۰:۵۱ - سیّد محمّد جعاوله
    +++++
  • ۳۱ ارديبهشت ۹۵، ۱۸:۲۵ - سیّد محمّد جعاوله
    +++++
نویسندگان

معرفی کتاب Cyberoam Certified Network & Security Professional

دوشنبه, ۳ اسفند ۱۳۹۴، ۰۹:۲۰ ق.ظ

p8vpx1q302vg.jpg

 

TABLE OF CONTENTS

TRAINING & CERTIFICATION PROGRAMS ............................................................................................... 5

CCNSP (CYBEROAM CERTIFIED NETWORK & SECURITY PROFESSIONAL):............................................................. 5

CCNSE (CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT):....................................................................... 6

MODULE 1: BASICS OF NETWORKING & SECURITY ................................................................................ 8

MODULE 2: CYBEROAM IDENTITY BASED UTM .................................................................................... 16

CHALLENGES WITH CURRENT UTM PRODUCTS............................................................................................. 17

CYBEROAM’S SECURITY APPROACH ............................................................................................................ 18

IDENTITY-BASED SECURITY........................................................................................................................ 20

MODULE 3: CYBEROAM PRODUCTS ...................................................................................................... 21

CYBEROAM UTM APPLIANCES .................................................................................................................. 22

CYBEROAM SUBSCRIPTIONS ...................................................................................................................... 29

LOG MANAGEMENT............................................................................................................................... 40

AGGREGATED REPORTING..................................................................................................................... 41

IDENTITY-BASED REPORTING ................................................................................................................ 42

SECURITY MANAGEMENT...................................................................................................................... 44

COMPLIANCE REPORTING AND SECURITY AUDIT................................................................................. 45

FORENSIC ANALYSIS............................................................................................................................... 45

CYBEROAM CENTRAL CONSOLE (CCC) ........................................................................................................ 48

CYBEROAM IPSEC VPN CLIENT ................................................................................................................. 54

MODULE 4: CYBEROAM DEPLOYMENT ................................................................................................. 55

CYBEROAM PACKAGE CONTENTS ............................................................................................................... 56

FACTORY DEFAULT SETTINGS .................................................................................................................... 57

DEPLOYMENT MODES ............................................................................................................................. 58

TRAINING LAB SETUP............................................................................................................................... 69

LAB #1 FACTORY RESET ........................................................................................................................... 71

LAB #2 DEPLOYMENT IN BRIDGE MODE (OPTIONAL)..................................................................................... 80

LAB #3 DEPLOYMENT IN GATEWAY MODE .................................................................................................. 94

CYBEROAM REGISTRATION...................................................................................................................... 107

LAB #4 REGISTRATION, UPGRADE & SUBSCRIPTION .................................................................................... 109

MODULE 5: FIREWALL.......................................................................................................................... 121

ACCESS CONTROL (APPLIANCE ACCESS) .................................................................................................... 122

IP MANAGEMENT.................................................................................................................................. 123

FIREWALL MANAGEMENT....................................................................................................................... 126

DEFAULT FIREWALL RULES ...................................................................................................................... 129

NAT (OUTBOUND NAT)........................................................................................................................ 133

VIRTUAL HOST (INBOUND NAT) .............................................................................................................. 135

DENIAL OF SERVICE (DOS)...................................................................................................................... 140

CYBEROAM UNIFIED FIREWALL CONTROLS ................................................................................................. 143

LAB #5 SECURING THE APPLIANCE ........................................................................................................... 145

LAB #6 CREATE A DROP FIREWALL RULE FOR YOUR MACHINE’S IP ADDRESS. ................................................... 146

LAB #7 CREATE A ACCEPT FIREWALL RULE FOR YOUR MACHINE’S IP ADDRESS. ................................................ 147

LAB #8 CREATE SCHEDULE & APPLY IN FIREWALL RULE ................................................................................ 148

LAB #9 ENABLE / DISABLE ANTI-VIRUS & ANTI-SPAM SCANNING .................................................................. 149

LAB #10 TEST ANTI-VIRUS SCANNING ...................................................................................................... 150

LAB #11 CREATE FIREWALL RULE TO ALLOW DNS TRAFFIC .......................................................................... 151

LAB #12 CREATE VIRTUAL HOST TO PUBLISH A RDP SERVER RESIDING IN THE LAN........................................... 152

MODULE 6: USER AUTHENTICATION................................................................................................... 156

LOCAL & EXTERNAL AUTHENTICATION: ..................................................................................................... 158

AUTHENTICATION SETTINGS:................................................................................................................... 161

TYPE OF AUTHENTICATION:..................................................................................................................... 162

SINGLE SIGN ON CONCEPT ..................................................................................................................... 163

IDENTITY BASED POLICIES ....................................................................................................................... 165

GROUP MANAGEMENT .......................................................................................................................... 178

USER MANAGEMENT............................................................................................................................. 183

IDENTITY BASED FIREWALL...................................................................................................................... 190

LAB #14 ENFORCE AUTHENTICATION ....................................................................................................... 197

LAB #15 HOW TO AUTHENTICATE USERS THROUGH CAPTIVE PORTAL / CYBEROAM CORPORATE CLIENT ................ 200

LAB #17 CREATE GROUP, USER AND APPLY CUSTOM POLICIES ...................................................................... 214

LAB #19 SINGLE SIGN ON IMPLEMENTATION WITH ACTIVE DIRECTORY (OPTIONAL).......................................... 220

LAB #20 CUSTOMISE CYBEROAM CAPTIVE PORTAL ..................................................................................... 235

MODULE 7: CONTENT FILTER............................................................................................................... 237

BASICS OF CONTENT FILTER .................................................................................................................... 237

CYBEROAM CONTENT FILTER FEATURES .................................................................................................... 238

WEB FILTER CATEGORIES ....................................................................................................................... 239

CUSTOM CATEGORY .............................................................................................................................. 247

UPGRADE ............................................................................................................................................ 249

IM..................................................................................................................................................... 254

MODULE 8: GATEWAY ANTI-VIRUS / ANTI-SPAM .............................................................................. 262

GATEWAY ANTI-VIRUS FEATURES ............................................................................................................ 263

BASICS OF VIRUS / SPYWARE / MALWARE / PHISHING ................................................................................. 265

WEB ANTI-VIRUS CONFIGURATION .......................................................................................................... 268

MAIL ANTI-VIRUS CONFIGURATION.......................................................................................................... 270

FTP ANTI-VIRUS CONFIGURATION ........................................................................................................... 276

BASICS OF SPAM................................................................................................................................... 279

BASICS OF ANTI-SPAM TECHNOLOGIES...................................................................................................... 280

CYBEROAM RPD TECHNOLOGY ............................................................................................................... 281

ANTI-SPAM RULES ................................................................................................................................ 286

UPGRADE ............................................................................................................................................ 290

REPORTS ............................................................................................................................................. 291

MODULE 9: INTRUSION PREVENTION SYSTEM (IPS)........................................................................... 293

IPS BASICS: ......................................................................................................................................... 294

CYBEROAM IPS FEATURES: ..................................................................................................................... 295

IPS SIGNATURES................................................................................................................................... 296

IPS POLICIES:....................................................................................................................................... 297

CUSTOM IPS SIGNATURE: ...................................................................................................................... 298

UPGRADE ............................................................................................................................................ 299

MODULE 10: VIRTUAL PRIVATE NETWORK (VPN) .............................................................................. 301

VPN BASIC.......................................................................................................................................... 302

IPSEC PROTOCOL BASICS........................................................................................................................ 303

L2TP PROTOCOL BASICS ........................................................................................................................ 306

PPTP PROTOCOL BASICS........................................................................................................................ 308

CYBEROAM VPN FEATURES .................................................................................................................... 310

CYBEROAM VPN TECHNOLOGY COMPARISON ............................................................................................ 317

LAB #22 IPSEC REMOTE ACCESS CONFIGURATION USING PRE-SHARED KEY..................................................... 325

LAB #23 IPSEC SITE-TO-SITE CONFIGURATION USING PRE-SHARED KEY.......................................................... 335

LAB# 24 CREATE L2TP TUNNEL ALLOWING THE TUNNEL USERS TO ACCESS ONLY WEB SERVICES OF INTRANET IN LAN

ENABLING THE DMZ IPS POLICY. ............................................................................................................. 342

LAB# 25 CREATE PPTP TUNNEL ALLOWING THE TUNNEL USERS TO ACCESS ONLY WEB SERVICES OF INTERNAL NETWORK IN LAN ENABLING THE DMZ IPS POLICY. .................................................................................................. 345

LAB 26# CREATE GLOBAL POLICY FOR SSL VPN USING SELF SIGNED CERTIFICATES FOR CLIENT AND SEVER.............. 346

LAB# 27CREATE AN SSL VPN TUNNEL WITH WEB ACCESS APPLYING IT TO USER WITH ACCESS ONLY TO INTRANET... 349

LAB# 28 CREATE AN SSL VPN TUNNEL WITH FULL ACCESS IN SPLIT TUNNEL MODE APPLYING IT TO MANAGER USER GIVING ACCESS TO THE INTERNAL NETWORK. .............................................................................................. 352

LAB #29 L2TP CONFIGURATION (ONLINE – OPTIONAL)............................................................................... 355

LAB #30 PPTP CONFIGURATION (ONLINE – OPTIONAL) .............................................................................. 355

CYBEROAM VPN FAILOVER OVERVIEW ..................................................................................................... 355

MODULE 11: MULTILINK MANAGER ................................................................................................... 356

CYBEROAM MULTILINK – AN INTRODUCTION ............................................................................................. 357

ACTIVE-ACTIVE LOAD BALANCING AND GATEWAY FAILOVER ........................................................................... 360

GATEWAY LOAD BALANCING ................................................................................................................... 362

ACTIVE-PASSIVE GATEWAY FAILOVER THROUGH FIREWALL RULE ITSELF ............................................................ 367

TROUBLESHOOTING............................................................................................................................... 368

MODULE 12: ROUTING ........................................................................................................................ 370

BASICS OF ROUTING .............................................................................................................................. 370

CYBEROAM ROUTING FEATURES .............................................................................................................. 372

STATIC ROUTING .................................................................................................................................. 373

POLICY BASED ROUTING......................................................................................................................... 373

DYNAMIC ROUTING............................................................................................................................... 376

MULTICAST ROUTING: ........................................................................................................................... 377

MODULE 13: GENERAL ADMINISTRATION .......................................................................................... 378

PORT SETTINGS .................................................................................................................................... 378

ROLE BASED ADMINISTRATION ................................................................................................................ 379

LOGGING MANAGEMENT ....................................................................................................................... 381

REPORT MANAGEMENT ......................................................................................................................... 383

NTP TIME SERVER SUPPORT FOR TIME SYNCHRONIZATION ............................................................................ 394

CYBEROAM UPGRADE ............................................................................................................................ 395

BACKUP – RESTORE MANAGEMENT ......................................................................................................... 396

TROUBLESHOOTING AND DEBUGGING TOOLS ............................................................................................. 403

SUPPORT RESOURCES .......................................................................................................................... 406

ON APPLIANCE HELP ............................................................................................................................. 407

ONLINE RESOURCE (WEB RESOURCE)....................................................................................................... 408

CUSTOMER MY ACCOUNT ...................................................................................................................... 411

PARTNER PORTAL ................................................................................................................................. 412

PRESALES CONTACT DETAILS:.................................................................................................................. 413

POST SALES SUPPORT CONTACT .............................................................................................................. 414

حجم: 18 مگابایت
زبان : انگلیسی
تعداد صفحات: 414

دانلود کتاب Cyberoam Certified Network & Security Professional

نظرات  (۰)

هیچ نظری هنوز ثبت نشده است

ارسال نظر

ارسال نظر آزاد است، اما اگر قبلا در بیان ثبت نام کرده اید می توانید ابتدا وارد شوید.
شما میتوانید از این تگهای html استفاده کنید:
<b> یا <strong>، <em> یا <i>، <u>، <strike> یا <s>، <sup>، <sub>، <blockquote>، <code>، <pre>، <hr>، <br>، <p>، <a href="" title="">، <span style="">، <div align="">
تجدید کد امنیتی