NW
NW NW
Networldz
Networldz
Instant Messengers. Networldz99@yahoo.com Networldz99@hotmail.com Networldz99@gmail.com
NW NW
NW
NW
  HYDERABAD
+91-9000544423
+9140 - 40045060
NW
  BANGALORE
Email : info@networldz.com
nw
CCNA TRAINING INDIA,CCNA TRAINING BANGLORE,CCNA TRAINING HYDERABAD,CCNA TRAINING CHENNAI,CCNA TRAINING BOMBAY,CCNA TRAINING  DELHI,CCNP TRAINING INDIA,CCSP TRAINING INDIA,CCVP TRAINING INDIA,CCVP TRAINING BANGLORE,CCVP TRAINING HYDERABAD,CCVP TRAINING  CHENNAI,CCVP TRAINING  BOMBAY,CCVP TRAINING DELHI,IPCC TRAINING INDIA,IPCC ENTERPRISE TRAINING INDIA,IPCC TRAINING BANGLORE,IPCC TRAINING HYDERABAD.IPCC TRAINING DUBAI,CCVP TRAINING RIYAD,CCVP TRAINING OMAN,CCSP TRAINING OMAN,CCIP TRAINING HYDERABAD,CVPI TRAINING OMAN,CVPI TRAINING BANGLORE,CCNA VOICE TRAINING INDIA,CCNA VOICE TRAINING HYDERABAD,VOICE TRAINING INDIA,VOICE TRAINING BANGLORE,VOICE TRAINING DUBAI,VOICE TRAINING RIYAD,CISCO CERTIFICATION TRAINING,INDIA,VOCIE TRAINING OMANSECURITY TRAINING BANGLORE,SECURITY TRAINING HYDERABAD,SECURITY TRAINING INDIA,CCVP TRAINING  LONDON,CCIE VOCIE TRAINING INDIA,BEST CCIE VOICE TRAINING INDIA,GOOD CCIE VOICE TRAINING INDIA,CCIE SECURITY TRAINING INDIA,CCIE VOICE TRAINING BANGLORE,CCIE VOICE TRAINING HYDERABAD,CISCO ICM TRAINING INDIA,ICM TRAINING BANGLORE,ICM TRAINING HYDERABAD.UNITY TRAINING INDIA,UNITY TRAINING BANGLORE.
 
NW NW NW
NW
NW
NW
 
 
News@ CISCO
 
 
More news
 
 
Examination Info.
 
readmore
 
CISCO Training Course Details
 
 
DDOS v2.0 - Mitigating DDoS Using Cisco Guard and Traffic Anomaly Detector
 
Duration:

Description

 

Mitigating DDoS Using Cisco Guard and Traffic Anomaly Detector (DDOS) v2.0 is a two day course covering the implementation, configuration, and management of the Cisco Guard and Cisco Traffic Anomaly Detector. These devices, when properly deployed in enterprise or service provider networks, offer protection from distributed denial of service (DDoS) attacks. Students will discuss the present day issues associated with the ever more challenging landscape of network security and the role Cisco Guard and Detector play in the Cisco SAFE architecture.

DDOS version 2 includes several hands-on lab exercises covering interface configuration for out-of-band (OOB) management via the CLI or GUI, zone configuration, zone traffic policy creation and threshold tuning, automatic zone traffic diversion and injection, and reporting features of the Cisco Guard and Traffic Anomaly Detector.

Objectives

  • Describe how the Cisco DDoS defense solution protects network devices from suspect traffic generated during a DDoS attack
  • Describe the concepts of Anti-Spoofing, Per-Source, and Per-Destination dynamic filters used by the Multi Verification Process (MVP) architecture
  • Discuss the issues faced today as a result of DDOS attacks and the deficiencies in other security solutions to deal with DDOS attacks effectively.
  • Describe the functions of the Cisco Guard and Cisco Traffic Anomaly Detector, including zone policy construction and threshold tuning, zone protection, and the Guard protection cycle
  • Configure the Guard and Detector for automatic traffic diversion using BGP when an attack is recognized
  • Describe and discuss the various methods for traffic injection and when each is most appropriate for use.
  • Configure protection zones in the Guard and Detector using various templates, policies, and filters based on customer environments
  • Configure and monitor the Guard and Detector using both the CLI (command line interface) as well as the GUI
  • Discuss the management challenges to large scale deployments and how they are effectively handled with Cisco DDOS Multidevice Management System
  • Understand the similarities and differences between the Cisco Guard and Traffic Anomaly Detector appliances vs. the Cisco Guard and Traffic Anomaly Detector Modules for the Cisco Catalyst 6500 and Cisco 7600 Router families

Prerequisites

  • Interconnecting Cisco Network Devices
  • Basic understanding of the BGP routing protocol
  • Foundation level knowledge of Cisco security devices and principals

Who Should Attend

  • Employee
  • Channel Partner / Reseller
  • Customer
 
Course Outline
 

This is a draft copy of the course information, subject to revision.

  • Course Introduction
    • Welcome / Introductions
    • Overview
    • Student Prerequisites
    • Course Flow / Schedule
    • Goals
    • Description of resources
  • Lesson 1: Mitigation of DDOS attacks
    • Overview / Objectives
    • Definition of DDOS attacks
    • Issues with mitigation of DDOS attacks
    • Justification for need of Guard and Detector
    • Designing a DDOS protection system
    • Introduction to Guard
    • Introduction to Detector
    • Summary
  • Lesson 2: Getting Started with Cisco Guard and Traffic Detector
    • Overview / Objectives
    • Connectivity to Guard and Detector
    • Introduction and description to common commands used with the Guard and Detector
    • User accounts used in Guard and Detector
    • Additional service available
    • Summary
  • Lesson 3: Zone Configuration
    • Overview / Objectives
    • Definition of Zone
    • Zone Templates
    • Zone creation and configuration
    • Protection methods for Zones
    • Best practices for Zones
    • Various Zone examples
    • Traffic thresholds for a Zone
    • Summary
  • Lesson 4: Diverting Traffic
    • Overview / Objectives
    • Definition of Traffic Diversion
    • What types of Traffic Diversion are supported
    • Routing capabilities of the Guard
    • Configuring Diversion
    • Summary
  • Lesson 5: Injecting Traffic
    • Overview / Objectives
    • Configuring various traffic injection methods
      • - Layer 2 injection
      • - VPN Routing and Forwarding Injection
      • - PBR Injection
      • - GRE Tunnel Injection
    • Summary
  • Lesson 6: Mitigation at work
    • Overview / Objectives
    • MVP architecture
    • Anti Spoofing mechanism
    • Dynamic filters
    • Zone Filter configuration
    • Policies at work in mitigation
    • Summary
  • Lesson 7: Understanding the Cisco Guard and Traffic Anomaly Detector reports
    • Overview / Objectives
    • Understanding various Reporting Capabilities
    • Reporting commands for the Guard and Detector
    • Interpreting Guard and Detector reports
    • Summary
  • Lesson 8: Cisco DDOS Multidevice Management System
    • Overview / Objectives
    • Functionality
    • Configuration
    • Deployment
    • Summary
  • Lesson 9: Cisco Guard and Detector Blades for Catalyst 6500 and Cisco 7600 router families
    • Overview / Objectives
    • Similarities between the appliances and blades
    • Differences between the appliances and blades
    • Case studies which highlight when to use appliances vs. blades
    • Summary
 
 
 
Back Top
NW
NW
NW
NW NW NW
 
NW
NW