Cisco Edge Network Security (300-206)
Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This 90-minute exam consists of 65-75 questions and focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course. in our CCNP Security Training Center
The exam also covers the configuration of highly secure routing solutions to support branch offices and mobile workers. The following topics are general guidelines for the content that is likely to be included on the exam. However, other related topics may also appear on any specific version of the exam. To better reflect the contents of the exam and for clarity, the following guidelines may change at any time without notice.
25% 1.0 Threat Defense
1.1 Implement firewall (ASA or IOS depending on which supports the implementation)
1.1.a Implement ACLs
1.1.b Implement static/dynamic NAT/PAT
1.1.c Implement object groups
1.1.d Describe threat detection features
1.1.e Implement botnet traffic filtering
1.1.f Configure application filtering and protocol inspection
1.1.g Describe ASA security contexts
1.2 Implement Layer 2 Security
1.2.a Configure DHCP snooping
1.2.b Describe dynamic ARP inspection
1.2.c Describe storm control
1.2.d Configure port security
1.2.e Describe common Layer 2 threats and attacks and mitigation
1.2.f Describe MACSec
1.2.g Configure IP source verification
1.3 Configure device hardening per best practices
1.3.a Routers
1.3.b Switches
1.3.c Firewalls
25% 2.0 Cisco Security Devices GUIs and Secured CLI Management
2.1 Implement SSHv2, HTTPS, and SNMPv3 access on the network devices
2.2 Implement RBAC on the ASA/IOS using CLI and ASDM
2.3 Describe Cisco Prime Infrastructure
2.3.a Functions and use cases of Cisco Prime
2.3.b Device Management
2.4 Describe Cisco Security Manager (CSM)
2.4.a Functions and use cases of CSM
2.4.b Device Management
2.5 Implement Device Managers
2.5.a Implement ASA firewall features using ASDM
12% 3.0 Management Services on Cisco Devices
3.1 Configure NetFlow exporter on Cisco Routers, Switches, and ASA
3.2 Implement SNMPv3
3.2.a Create views, groups, users, authentication, and encryption
3.3 Implement logging on Cisco Routers, Switches, and ASA using Cisco best practices
3.4 Implement NTP with authentication on Cisco Routers, Switches, and ASA
3.5 Describe CDP, DNS, SCP, SFTP, and DHCP
3.5.a Describe security implications of using CDP on routers and switches
3.5.b Need for dnssec
10% 4.0 Troubleshooting, Monitoring and Reporting Tools
4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog
4.1.a Analyze packet tracer on the firewall using CLI/ASDM
4.1.b Configure and analyze packet capture using CLI/ASDM
4.1.c Analyze syslog events generated from ASA
16% 5.0 Threat Defense Architectures
5.1 Design a Firewall Solution
5.1.a High-availability
5.1.b Basic concepts of security zoning
5.1.c Transparent & Routed Modes
5.1.d Security Contexts
5.2 Layer 2 Security Solutions
5.2.a Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
5.2.b Describe best practices for implementation
5.2.c Describe how PVLANs can be used to segregate network traffic at Layer 2
12% 6.0 Security Components and Considerations
6.1 Describe security operations management architectures
6.1.a Single device manager vs. multi-device manager
6.2 Describe Data Center security components and considerations
6.2.a Virtualization and Cloud security
6.3 Describe Collaboration security components and considerations
6.3.a Basic ASA UC Inspection features
6.4 Describe common IPv6 security considerations
6.4.a Unified IPv6/IPv4 ACL on the ASA
Cisco Threat Control (300-207)
Exam Description:The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
22% 1.0 Content Security
1.1 Cisco ASA 5500-X NGFW Security Services
1.1.a Describe features and functionality 1.1.b Implement web usage control (URL-filtering, reputation based, file filtering)
1.1.c Implement AVC
1.1.d Implement decryption policies
1.1.e Describe traffic redirection and capture methods
1.2 Cisco Cloud Web Security
1.2.a Describe features and functionality
1.2.b Implement IOS and ASA connectors
1.2.c Implement AnyConnect web security module
1.2.d Describe web usage control
1.2.e Implement AVC
1.2.f Implement anti-malware
1.2.g Describe decryption policies
1.3 Cisco WSA
1.3.a Describe features and functionality
1.3.b Implement data security
1.3.c Implement WSA Identity and Authentication, including Transparent User Identification
1.3.d Describe web usage control
1.3.e Implement AVC
1.3.f Implement anti-malware
1.3.g Describe decryption policies
1.3.h Describe traffic redirection and capture methods (Explicit Proxy vs. Transparent Proxy)
1.4 Cisco ESA
1.4.a Describe features and functionality
1.4.b Implement email encryption
1.4.c Implement anti-spam policies
1.4.d Implement virus outbreak filter
1.4.e Implement DLP policies
1.4.f Implement anti-malware
1.4.g Implement inbound and outbound mail policies and authentication
1.4.h Describe traffic redirection and capture methods
23% 2.0 Threat Defense
2.1 Network IPS
2.1.a Implement traffic redirection and capture methods
2.1.b Implement network IPS deployment modes
2.1.c Describe signatures engines
2.1.d Implement event actions & overrides/filters
2.1.e Implement anomaly detection
2.1.f Implement risk ratings
2.1.g Describe IOS IPS
2.2 Configure device hardening per best practices
2.2.a IPS
2.2.b Content Security appliances
16% 3.0 Device GUIs and Secured CLI
3.1 Content Security
3.1.a Implement HTTPS and SSH access
3.1.b Describe configuration elements
3.1.c Implement ESA GUI for message tracking
19% 4.0 Troubleshooting, Monitoring, and Reporting Tools
4.1 Configure IME and IP logging for IPS
4.2 Content Security
4.2.a Describe reporting functionality
4.2.b Implement the WSA Policy Trace tool
4.2.c Implement the ESA Message Tracking tool
4.2.d Implement the ESA Trace tool
4.2.e Use web interface to verify traffic is being redirected to CWS
4.2.f Use CLI on IOS to verify CWS operations
4.2.g Use CLI on ASA to verify CWS operations
4.2.h Use the PRSM Event Viewer to verify ASA NGFW operations
4.2.i Describe the PRSM Dashboards and Reports
4.3 Monitor Cisco Security IntelliShield
2014 Cisco Systems, Inc. This document is Cisco Public. 12May2014 Page 3
4.3.a Describe at a high level the features of the Cisco Security IntelliShield Alert Manager Service
8% 5.0 Threat Defense Architectures
5.1 Design IPS solution
5.1.a Deploy Inline or Promiscuous
5.1.b Deploy as IPS appliance, IPS software or hardware module or IOS IPS
5.1.c Describe methods of IPS appliance load-balancing
5.1.d Describe the need for Traffic Symmetry
5.1.e Inline modes comparison – inline interface pair, inline VLAN pair, and inline VLAN group
5.1.f Management options
12% 6.0 Content Security Architectures
6.1 Design Web Security solution
6.1.a Compare ASA NGFW vs. WSA vs. CWS
6.1.b Compare Physical WSA vs. Virtual WSA
6.1.c List available CWS connectors
6.2 Design Email Security solution
6.2.a Compare Physical ESA vs. Virtual ESA
6.2.b Describe Hybrid mode
6.3 Design Application Security solution
6.3.a Describe the need for application visibility and control