Network Security 2.0 - Course 1 is supported by the Network Security Pod.
At the beginning of each lab exercise, NETLAB+ will automatically pre-configure supported routers and security devices using the configuration files in the instructor lab manual.
To enable Network Security labs and pod types, check the box for "AE Network Security 1 V2.0 English" in the class settings. This must be done for each class requiring access to NS 1 labs.
Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.
Importance of Choosing the Correct Lab Exercise
Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.
|1.1.1||Orientation Lab||NSP||In the original Cisco version, router interfaces E0 and E1 are reversed. In the NETLAB+ version, router interfaces match the other labs.|
|1.3.4||Vulnerabilities and Exploits||NSP||No options of using a Linux Boot CD. However, you could run Linux on the second student PC|
|2.5.2b||Controlling TCP/IP Services||NSP|
|2.5.7||Configuring Routing Authentication and Filtering||NSP|
|3.2.3||Configure Basic Security using Security Device Manager (SDM)||NSP|
|3.4.6a||Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard||NSP|
|3.6.3||Configuring the PIX Security Appliance with ASDM||NSP|
|5.2.1||Install and Configure CSACS 3.3 for Windows||NSP|
|6.1.3||Configure Local AAA on Cisco Router||NSP|
|6.1.4||Configure Authentication Proxy||NSP|
|6.3.10||Configure AAA on the PIX Security Appliance Using Cisco Secure ACS for Windows 2000||NSP|
|6.3.9||Configure Local AAA on the PIX Security Appliance||NSP|
|7.1.9||Configure EAP on Cisco ACS for Windows||NSP|
|7.2.8||Configure 802.1x Port-Based Authentication||NSP|
|8.3.13||Configure Cisco Firewall CBAC||NSP|
|9.1.7a||Configure Access through the PIX Security Appliance using ASDM||NSP|
|9.1.7b||Configure Access through the PIX Security Appliance using CLI||NSP|
|9.1.7c||Configure Multiple Interfaces using CLI - Changelle lab||NSP|
|9.1.9||Configure ACLs in the PIX Security Appliance using CLI||NSP|
|9.2.3||Configure Service Object Groups using ASDM||NSP|
|9.2.5||Configure Object Groups and Nested Object Groups using CLI||NSP|
|9.4.10||Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance||NSP|
|10.2.4||Mitigate Layer 2 Attacks||NSP|