Network Security 2.0 - Course 2 is supported by the Network Security Pod.
At the beginning of each lab exercise, NETLAB+ will automatically pre-configure supported routers and security devices using the configuration files in the instructor lab manual.
To enable Network Security labs and pod types, check the box for "AE Network Security 1 V2.0 English" in the class settings. This must be done for each class requiring access to NS 2 labs.
Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.
Importance of Choosing the Correct Lab Exercise
Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.
|2.1.6||Configure a Router with the IOS Instrusion Prevention System||NSP|
|2.3.3||Configure Intrusion Prevention on the PIX Security Appliance||NSP|
|4.4.7||Configure Cisco IOS IPSec using Pre-Shared Keys||NSP|
|4.4.8a||Conofigure a Cisco GRE over IPSec Tunnel using SDM||NSP|
|4.4.8b||Configure Cisco IOS IPSec with Pre-Shared Keys using SDM||NSP|
|4.5.5a||Configure a PIX Security Appliance Site-to-Site IPSec VPN||NSP|
|4.5.5b||Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel Using ASDM||NSP|
|5.2.6||Configure a Cisco Router for IPSec using Digital Certificates||NSP||The CA server will run on RBB|
|5.3.2||Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel with CA Support||NSP|
|6.1.12a||Configure Remote Access Using Cisco Easy VPN||NSP||The VPN client is installed on the Backbone Server|
|6.2.12b||Configure Cisco Easy VPN Server with NAT||NSP||The VPN client is installed on the Backbone Server|
|6.5.9a||Configure a Secure VPN Using IPSec between a PIX and a VPN Client using ASDM||NSP||The VPN client is installed on the Backbone Server|
|6.5.9b||Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI||NSP||The VPN client is installed on the Backbone Server|
|7.4.5||Configure SNMP Messages on a Cisco Router||NSP|
|7.4.6||Configure SNMP Monitoring of the PIX Security Appliance Using ASDM||NSP|
|8.2.4||Configure LAN-Based Failover Between Two PIX Security Appliances (Optional)||NSP||Able to do Active/Standby failover. Unable to do Active/Active Failover|
|8.3.3||Configure a PIX Security Appliance as a Transparent Firewall||NSP|
|8.4.3a||Configure User Authentication and Command Authorization using ASDM||NSP|
|8.4.3b||Configure SSH, Command Authotization, and Local User Authentication using CLI||NSP|