معرفی کتاب Cyberoam Certified Network & Security Professional
TABLE OF CONTENTS
TRAINING & CERTIFICATION PROGRAMS ............................................................................................... 5
CCNSP (CYBEROAM CERTIFIED NETWORK & SECURITY PROFESSIONAL):............................................................. 5
CCNSE (CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT):....................................................................... 6
MODULE 1: BASICS OF NETWORKING & SECURITY ................................................................................ 8
MODULE 2: CYBEROAM IDENTITY BASED UTM .................................................................................... 16
CHALLENGES WITH CURRENT UTM PRODUCTS............................................................................................. 17
CYBEROAM’S SECURITY APPROACH ............................................................................................................ 18
IDENTITY-BASED SECURITY........................................................................................................................ 20
MODULE 3: CYBEROAM PRODUCTS ...................................................................................................... 21
CYBEROAM UTM APPLIANCES .................................................................................................................. 22
CYBEROAM SUBSCRIPTIONS ...................................................................................................................... 29
LOG MANAGEMENT............................................................................................................................... 40
AGGREGATED REPORTING..................................................................................................................... 41
IDENTITY-BASED REPORTING ................................................................................................................ 42
SECURITY MANAGEMENT...................................................................................................................... 44
COMPLIANCE REPORTING AND SECURITY AUDIT................................................................................. 45
FORENSIC ANALYSIS............................................................................................................................... 45
CYBEROAM CENTRAL CONSOLE (CCC) ........................................................................................................ 48
CYBEROAM IPSEC VPN CLIENT ................................................................................................................. 54
MODULE 4: CYBEROAM DEPLOYMENT ................................................................................................. 55
CYBEROAM PACKAGE CONTENTS ............................................................................................................... 56
FACTORY DEFAULT SETTINGS .................................................................................................................... 57
DEPLOYMENT MODES ............................................................................................................................. 58
TRAINING LAB SETUP............................................................................................................................... 69
LAB #1 FACTORY RESET ........................................................................................................................... 71
LAB #2 DEPLOYMENT IN BRIDGE MODE (OPTIONAL)..................................................................................... 80
LAB #3 DEPLOYMENT IN GATEWAY MODE .................................................................................................. 94
CYBEROAM REGISTRATION...................................................................................................................... 107
LAB #4 REGISTRATION, UPGRADE & SUBSCRIPTION .................................................................................... 109
MODULE 5: FIREWALL.......................................................................................................................... 121
ACCESS CONTROL (APPLIANCE ACCESS) .................................................................................................... 122
IP MANAGEMENT.................................................................................................................................. 123
FIREWALL MANAGEMENT....................................................................................................................... 126
DEFAULT FIREWALL RULES ...................................................................................................................... 129
NAT (OUTBOUND NAT)........................................................................................................................ 133
VIRTUAL HOST (INBOUND NAT) .............................................................................................................. 135
DENIAL OF SERVICE (DOS)...................................................................................................................... 140
CYBEROAM UNIFIED FIREWALL CONTROLS ................................................................................................. 143
LAB #5 SECURING THE APPLIANCE ........................................................................................................... 145
LAB #6 CREATE A DROP FIREWALL RULE FOR YOUR MACHINE’S IP ADDRESS. ................................................... 146
LAB #7 CREATE A ACCEPT FIREWALL RULE FOR YOUR MACHINE’S IP ADDRESS. ................................................ 147
LAB #8 CREATE SCHEDULE & APPLY IN FIREWALL RULE ................................................................................ 148
LAB #9 ENABLE / DISABLE ANTI-VIRUS & ANTI-SPAM SCANNING .................................................................. 149
LAB #10 TEST ANTI-VIRUS SCANNING ...................................................................................................... 150
LAB #11 CREATE FIREWALL RULE TO ALLOW DNS TRAFFIC .......................................................................... 151
LAB #12 CREATE VIRTUAL HOST TO PUBLISH A RDP SERVER RESIDING IN THE LAN........................................... 152
MODULE 6: USER AUTHENTICATION................................................................................................... 156
LOCAL & EXTERNAL AUTHENTICATION: ..................................................................................................... 158
AUTHENTICATION SETTINGS:................................................................................................................... 161
TYPE OF AUTHENTICATION:..................................................................................................................... 162
SINGLE SIGN ON CONCEPT ..................................................................................................................... 163
IDENTITY BASED POLICIES ....................................................................................................................... 165
GROUP MANAGEMENT .......................................................................................................................... 178
USER MANAGEMENT............................................................................................................................. 183
IDENTITY BASED FIREWALL...................................................................................................................... 190
LAB #14 ENFORCE AUTHENTICATION ....................................................................................................... 197
LAB #15 HOW TO AUTHENTICATE USERS THROUGH CAPTIVE PORTAL / CYBEROAM CORPORATE CLIENT ................ 200
LAB #17 CREATE GROUP, USER AND APPLY CUSTOM POLICIES ...................................................................... 214
LAB #19 SINGLE SIGN ON IMPLEMENTATION WITH ACTIVE DIRECTORY (OPTIONAL).......................................... 220
LAB #20 CUSTOMISE CYBEROAM CAPTIVE PORTAL ..................................................................................... 235
MODULE 7: CONTENT FILTER............................................................................................................... 237
BASICS OF CONTENT FILTER .................................................................................................................... 237
CYBEROAM CONTENT FILTER FEATURES .................................................................................................... 238
WEB FILTER CATEGORIES ....................................................................................................................... 239
CUSTOM CATEGORY .............................................................................................................................. 247
UPGRADE ............................................................................................................................................ 249
IM..................................................................................................................................................... 254
MODULE 8: GATEWAY ANTI-VIRUS / ANTI-SPAM .............................................................................. 262
GATEWAY ANTI-VIRUS FEATURES ............................................................................................................ 263
BASICS OF VIRUS / SPYWARE / MALWARE / PHISHING ................................................................................. 265
WEB ANTI-VIRUS CONFIGURATION .......................................................................................................... 268
MAIL ANTI-VIRUS CONFIGURATION.......................................................................................................... 270
FTP ANTI-VIRUS CONFIGURATION ........................................................................................................... 276
BASICS OF SPAM................................................................................................................................... 279
BASICS OF ANTI-SPAM TECHNOLOGIES...................................................................................................... 280
CYBEROAM RPD TECHNOLOGY ............................................................................................................... 281
ANTI-SPAM RULES ................................................................................................................................ 286
UPGRADE ............................................................................................................................................ 290
REPORTS ............................................................................................................................................. 291
MODULE 9: INTRUSION PREVENTION SYSTEM (IPS)........................................................................... 293
IPS BASICS: ......................................................................................................................................... 294
CYBEROAM IPS FEATURES: ..................................................................................................................... 295
IPS SIGNATURES................................................................................................................................... 296
IPS POLICIES:....................................................................................................................................... 297
CUSTOM IPS SIGNATURE: ...................................................................................................................... 298
UPGRADE ............................................................................................................................................ 299
MODULE 10: VIRTUAL PRIVATE NETWORK (VPN) .............................................................................. 301
VPN BASIC.......................................................................................................................................... 302
IPSEC PROTOCOL BASICS........................................................................................................................ 303
L2TP PROTOCOL BASICS ........................................................................................................................ 306
PPTP PROTOCOL BASICS........................................................................................................................ 308
CYBEROAM VPN FEATURES .................................................................................................................... 310
CYBEROAM VPN TECHNOLOGY COMPARISON ............................................................................................ 317
LAB #22 IPSEC REMOTE ACCESS CONFIGURATION USING PRE-SHARED KEY..................................................... 325
LAB #23 IPSEC SITE-TO-SITE CONFIGURATION USING PRE-SHARED KEY.......................................................... 335
LAB# 24 CREATE L2TP TUNNEL ALLOWING THE TUNNEL USERS TO ACCESS ONLY WEB SERVICES OF INTRANET IN LAN
ENABLING THE DMZ IPS POLICY. ............................................................................................................. 342
LAB# 25 CREATE PPTP TUNNEL ALLOWING THE TUNNEL USERS TO ACCESS ONLY WEB SERVICES OF INTERNAL NETWORK IN LAN ENABLING THE DMZ IPS POLICY. .................................................................................................. 345
LAB 26# CREATE GLOBAL POLICY FOR SSL VPN USING SELF SIGNED CERTIFICATES FOR CLIENT AND SEVER.............. 346
LAB# 27CREATE AN SSL VPN TUNNEL WITH WEB ACCESS APPLYING IT TO USER WITH ACCESS ONLY TO INTRANET... 349
LAB# 28 CREATE AN SSL VPN TUNNEL WITH FULL ACCESS IN SPLIT TUNNEL MODE APPLYING IT TO MANAGER USER GIVING ACCESS TO THE INTERNAL NETWORK. .............................................................................................. 352
LAB #29 L2TP CONFIGURATION (ONLINE – OPTIONAL)............................................................................... 355
LAB #30 PPTP CONFIGURATION (ONLINE – OPTIONAL) .............................................................................. 355
CYBEROAM VPN FAILOVER OVERVIEW ..................................................................................................... 355
MODULE 11: MULTILINK MANAGER ................................................................................................... 356
CYBEROAM MULTILINK – AN INTRODUCTION ............................................................................................. 357
ACTIVE-ACTIVE LOAD BALANCING AND GATEWAY FAILOVER ........................................................................... 360
GATEWAY LOAD BALANCING ................................................................................................................... 362
ACTIVE-PASSIVE GATEWAY FAILOVER THROUGH FIREWALL RULE ITSELF ............................................................ 367
TROUBLESHOOTING............................................................................................................................... 368
MODULE 12: ROUTING ........................................................................................................................ 370
BASICS OF ROUTING .............................................................................................................................. 370
CYBEROAM ROUTING FEATURES .............................................................................................................. 372
STATIC ROUTING .................................................................................................................................. 373
POLICY BASED ROUTING......................................................................................................................... 373
DYNAMIC ROUTING............................................................................................................................... 376
MULTICAST ROUTING: ........................................................................................................................... 377
MODULE 13: GENERAL ADMINISTRATION .......................................................................................... 378
PORT SETTINGS .................................................................................................................................... 378
ROLE BASED ADMINISTRATION ................................................................................................................ 379
LOGGING MANAGEMENT ....................................................................................................................... 381
REPORT MANAGEMENT ......................................................................................................................... 383
NTP TIME SERVER SUPPORT FOR TIME SYNCHRONIZATION ............................................................................ 394
CYBEROAM UPGRADE ............................................................................................................................ 395
BACKUP – RESTORE MANAGEMENT ......................................................................................................... 396
TROUBLESHOOTING AND DEBUGGING TOOLS ............................................................................................. 403
SUPPORT RESOURCES .......................................................................................................................... 406
ON APPLIANCE HELP ............................................................................................................................. 407
ONLINE RESOURCE (WEB RESOURCE)....................................................................................................... 408
CUSTOMER MY ACCOUNT ...................................................................................................................... 411
PARTNER PORTAL ................................................................................................................................. 412
PRESALES CONTACT DETAILS:.................................................................................................................. 413
POST SALES SUPPORT CONTACT .............................................................................................................. 414
حجم: 18 مگابایت
زبان : انگلیسی
تعداد صفحات: 414
دانلود کتاب Cyberoam Certified Network & Security Professional