CCNP Security VPN 642-648 Official Cert Guide: CCNP Sec VPN 642-648 ePub _2

CCNP Security VPN 642-648 Official Cert Guide: CCNP Sec VPN 642-648 ePub _2

by Howard Hooper

NOOK Book(eBook)

$55.49 $58.99 Save 6% Current price is $55.49, Original price is $58.99. You Save 6%.
View All Available Formats & Editions

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Product Details

ISBN-13: 9780132966382
Publisher: Pearson Education
Publication date: 06/22/2012
Sold by: Barnes & Noble
Format: NOOK Book
Pages: 832
File size: 93 MB
Note: This product may take a few minutes to download.

About the Author

Howard Hooper, CCIE No. 23470, CCNP, CCNA, CCDA, JNCIA, works as a network consultant and trainer for Transcend Networks Ltd., specializing in network design, installation, and automation for enterprise and government clients. He has worked in the network industry for 10 years, starting his career in the service provider field as a support engineer, before moving on to installations engineer and network architect roles, working on small, medium, enterprise, and service provider networks. In his spare time, Howard is a professional skydiver and Cisco Academy instructor. When he is not freefalling from more than 13,500 feet at his local drop zone, he is teaching the CCNA syllabus at his local Cisco Academy.

Table of Contents

Introduction

Part I ASA Architecture and Technologies Overview

Chapter 1 Examining the Role of VPNs and the Technologies Supported by the ASA

“Do I Know This Already?” Quiz

Foundation Topics

Introducing the Virtual Private Network

    VPN Termination Device (ASA) Placement

Meet the Protocols

    Symmetric and Asymmetric Key Algorithms

    IPsec

    IKEv1

    Authentication Header and Encapsulating Security Payload

    IKEv2

    SSL/TLS

    SSL Tunnel Negotiation

    Handshake

    DTLS

ASA Packet Processing

The Good, the Bad, and the Licensing

    Time-Based Licenses

        When Time-Based and Permanent Licenses Combine

    Shared SSL VPN Licenses

        Failover Licensing

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 2 Configuring Policies, Inheritance, and Attributes

“Do I Know This Already?” Quiz

Foundation Topics

Policies and Their Relationships

Understanding Connection Profiles

    Group URL

    Group Alias

    Certificate-to-Connection Profile Mapping

    Per-User Connection Profile Lock

    Default Connection Profiles

Understanding Group Policies

Configure User Attributes

Using External Servers for AAA and Policies

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part II Cisco Clientless Remote-Access VPN Solutions

Chapter 3 Deploying a Clientless SSL VPN Solution

“Do I Know This Already?” Quiz

Foundation Topics

Clientless SSL VPN Overview

Deployment Procedures and Strategies

Deploying Your First Clientless SSL VPN Solution

    IP Addressing

    Hostname, Domain Name, and DNS

    Become a Member of a Public Key Infrastructure

    Adding a CA Root Certificate

    Certificate Revocation List

    Revocation Check

    CRL Retrieval Policy

    CRL Retrieval Method

    OCSP Rules

    Advanced

    Enable the Relevant Interfaces for SSL

    Create Local User Accounts for Authentication

    Create a Connection Profile (Optional)

Basic Access Control

    Bookmarks

    HTTP and HTTPS

    CIFS

    FTP

    Group Policies

Content Transformation

    Gateway Content Rewriting

    Application Helper Profiles

    Java Code Signing

Troubleshooting a Basic Clientless SSL VPN

    Troubleshooting Session Establishment

    Troubleshooting Certificate Errors

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 4 Advanced Clientless SSL VPN Settings

“Do I Know This Already?” Quiz

Foundation Topics

Overview of Advanced Clientless SSL VPN Settings

Application Access Through Port Forwarding

    Configuring Port Forwarding

Application Access Using Client-Server Plug-Ins

    Configuring Client-Server Plug-In Access

Application Access Through Smart Tunnels

    Configuring Smart Tunnel Access

Configuring SSL/TLS Proxies

    Email Proxy

    Internal HTTP and HTTPS Proxy

Troubleshooting Advanced Application Access

    Troubleshooting Application Access

    Client

    ASA/VPN Termination Appliance

    Application/Web Server

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 5 Customizing the Clientless Portal

“Do I Know This Already?” Quiz

Foundation Topics

Basic Portal Layout Configuration

    Logon Page Customization

    Portal Page Customization

    Logout Page Customization

Outside-the-Box Portal Configuration

Portal Language Localization

Getting Portal Help

AnyConnect Portal Integration

Clientless SSL VPN Advanced Authentication

Using an External and Internal CA for Clientless Access

Clientless SSL VPN Double Authentication

Deploying Clientless SSL VPN Single Signon

Troubleshooting PKI and SSO Integration

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 6 Clientless SSL VPN Advanced Authentication and Authorization

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

    Create a DAP

    Specify User AAA Attributes

    Specify Endpoint Attributes

    Configure Authorization Parameters

    Configure Authorization Parameters for the Default DAP

DAP Record Aggregation

Troubleshooting DAP Deployment

    ASDM Test Feature

    ASA Logging

    DAP Debugging

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 7 Clientless SSL High Availability and Performance

“Do I Know This Already?” Quiz

Foundation Topics

High-Availability Deployment Information and Common Strategies

    Failover

    Active/Active

    Active/Standby

    VPN Load Balancing (Clustering)

    External Load Balancing

    Redundant VPN Peering

Content Caching for Optimization

Clientless SSL VPN Load Sharing Using an External Load Balancer

Clustering Configuration for Clientless SSL VPN

Troubleshooting Load Balancing and Clustering

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part III Cisco AnyConnect Remote-Access VPN Solutions

Chapter 8 Deploying an AnyConnect Remote-Access VPN Solution

“Do I Know This Already?” Quiz

Foundation Topics

AnyConnect Full-Tunnel SSL VPN Overview

Configuration Procedures, Deployment Strategies, and Information Gathering

    AnyConnect Secure Mobility Client Installation

Deploying Your First Full-Tunnel AnyConnect SSL VPN Solution

    IP Addressing

    Enable IPv6 Access

    Hostname, Domain Name, and DNS

    Enroll with a CA and Become a Member of a PKI

    Add an Identity Certificate

    Add the Signing Root CA Certificate

    Enable the Interfaces for SSL/DTLS and AnyConnect Client Connections

    Create a Connection Profile

Deploying Your First AnyConnect IKEv2 VPN Solution

    Enable the Relevant Interfaces for IKEv2 and AnyConnect Client Access

    Create Your IKEv2 Policies

    Create a Connection Profile

Client IP Address Allocation

    Connection Profile Address Assignment

    Group Policy Address Assignment

    Direct User Address Assignment

Advanced Controls for Your Environment

    ACLs and Downloadable ACLs

    Split Tunneling

    Access Hours/Time Range

Troubleshooting the AnyConnect Secure Mobility Client

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 9 Advanced Authentication and Authorization of AnyConnect VPNs

“Do I Know This Already?” Quiz

Foundation Topics

Authentication Options and Strategies

Provisioning Certificates as a Local CA

Configuring Certificate Mappings

    Certificate-to-Connection Profile Maps

    Mapping Criteria

Provisioning Certificates from a Third-Party CA

    Configure an XML Profile for Use by the AnyConnect Client

    Configure a Dedicated Connection Profile for Enrollment

    Enroll the AnyConnect Client into a PKI

    Optionally, Configure Client Certificate Selection

    Import the Issuing CA’s Certificate into the ASA

    Create a Connection Profile Using Certificate-Based Authentication

Advanced PKI Deployment Strategies

Doubling Up on Client Authentication

Troubleshooting Your Advanced Configuration

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 10 Advanced Deployment and Management of the AnyConnect Client

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

AnyConnect Installation Options

    Manual Predeployment

    Automatic Web Deployment

Managing AnyConnect Client Profiles

Advanced Profile Features

    Start Before Login

    Trusted Network Detection

Advanced AnyConnect Customization and Management

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 11 AnyConnect Advanced Authorization Using AAA and DAPs

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

Configuring Local and Remote Group Policies

Full SSL VPN Accountability

Authorization Through Dynamic Access Policies

Troubleshooting Advanced Authorization Settings

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 12 AnyConnect High Availability and Performance

“Do I Know This Already?” Quiz

Foundation Topics

Overview of High Availability and Redundancy Methods  

    Hardware-Based Failover

    VPN Clustering (VPN Load Balancing)

    Redundant VPN Peering

    External Load Balancing

Deploying DTLS

Performance Assurance with QOS

    Basic ASDM QoS Configuration

    Basic CLI QoS Configuration

AnyConnect Redundant Peering and Failover

Hardware-Based Failover with VPNs

    Configure LAN Failover Interfaces

    Configure Standby Addresses on Interfaces Used for Traffic Forwarding

    Define Failover Criteria

    Configure Nondefault MAC Addresses

Redundancy in the VPN Core

    VPN Clustering

    Load Balancing Using an External Load Balancer

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part IV Cisco Secure Desktop

Chapter 13 Cisco Secure Desktop

“Do I Know This Already?” Quiz

Foundation Topics

Cisco Secure Desktop Overview and Configuration

    Prelogin Assessment

    Host Scan

    Secure Desktop (Vault)

    Cache Cleaner

    Keystroke Logger

    Integration with DAP

    Host Emulation Detection

    Windows Mobile Device Management

    Standalone Installation Packages

    CSD Manual Launch

CSD Order of Operations

    Prelogin Phase

    Post-Login Phase

    Session-Termination Phase

    CSD Supported Browsers, Operating Systems, and Credentials

    Enabling Cisco Secure Desktop on the ASA

Configure Prelogin Criteria

    Keystroke Logger and Safety Checks

    Cache Cleaner

    Secure Desktop (Vault) General

    Secure Desktop (Vault) Settings

    Secure Desktop (Vault) Browser

Host Endpoint Assessment

Authorization Using DAPs

Troubleshooting Cisco Secure Desktop

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part V Cisco IPsec Remote-Access Client Solutions

Chapter 14 Deploying and Managing the Cisco VPN Client

“Do I Know This Already?” Quiz

Foundation Topics

Cisco IPsec VPN Client Features

Cisco ASA Basic Remote IPsec Client Configuration

IPsec Client Software Installation and Basic Configuration

    Create New VPN Connection Entry, Main Window

    Authentication Tab

    Transport Tab

    Backup Servers Tab

    Dial-Up Tab

Advanced Profile Settings

VPN Client Software GUI Customization

Troubleshooting VPN Client Connectivity

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part VI Cisco Easy VPN Solutions

Chapter 15 Deploying Easy VPN Solutions

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Procedures, and Information Gathering

Easy VPN Basic Configuration

    ASA IP Addresses

    Configure Required Routing

    Enable IPsec Connectivity

    Configure Preferred IKEv1 and IPsec Policies

    Client IP Address Assignment

    VPN Client Authentication Using Pre-Shared Keys

    Using XAUTH for VPN Client Access

    IP Address Allocation Using the VPN Client

    DHCP Configuration

Controlling Your Environment with Advanced Features

    ACL Bypass Configuration

    Basic Interface ACL Configuration

    Per-Group ACL Configuration

    Per-User ACL Configuration

    Split-Tunneling Configuration

Troubleshooting a Basic Easy VPN

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 16 Advanced Authentication and Authorization Using Easy VPN

“Do I Know This Already?” Quiz

Foundation Topics

Authentication Options and Strategies

Configuring PKI for Use with Easy VPN

Configuring Mutual/Hybrid Authentication

Configuring Digital Certificate Mappings

Provisioning Certificates from a Third-Party CA

Advanced PKI Deployment Strategies

    CRLs

    OCSP

    AAA

Troubleshooting Advanced Authentication for Easy VPN

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 17 Advanced Easy VPN Authorization

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

Configuring Local and Remote Group Policies

    Assigning a Group Policy to a Local User Account

    Assigning a Group Policy to a Connection Profile

Accounting Methods for Operational Information

    NetFlow 9

    RADIUS VPN Accounting

    SNMP

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 18 High Availability and Performance for Easy VPN

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

VPN Client HA and Failover

Hardware-Based Failover with VPNs

    Configure Optional Active/Standby Failover Settings

Clustering Configuration for Easy VPN

Troubleshooting Device Failover and Clustering

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 19 Easy VPN Operation Using the ASA 5505 as a Hardware Client

“Do I Know This Already?” Quiz

Foundation Topics

Easy VPN Remote Hardware Client Overview

    Client Mode

    Network Extension Mode

Configuring a Basic Easy VPN Remote Client Using the ASA 5505

Configuring Advanced Easy VPN Remote Client Settings for the ASA 5505

    X-Auth and Device Authentication

    Remote Management

    Tunneled Management

    Clear Tunneled Management

    NAT Traversal

    Device Pass-Through

Troubleshooting the ASA 5505 Easy VPN Remote Hardware Client

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part VII Cisco IPsec Site-to-Site VPN Solutions

Chapter 20 Deploying IPsec Site-to-Site VPNs

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

IKEv1

    Phase 1

    Phase 2 (Quick Mode)

IKEv2

    Phase 1

    Phase 2

Configuring a Basic IKEv1 IPsec Site-to-Site VPN

    Configure Basic Peer Authentication

        Enable IKEv1 on the Interface

        Configure IKEv1 Policies

        Configure Pre-Shared Keys

    Configure Transmission Protection

        Select Transform Set and VPN Peer

        Define Interesting Traffic

Configuring a Basic IKEv2 IPsec Site-to-Site VPN

Configure Advanced Authentication for IKEv1 IPsec Site-to-Site VPNs

Troubleshooting an IPsec Site-to-Site VPN Connection

    Tunnel Not Establishing: Phase 1

    Tunnel Not Establishing: Phase 2

    Traffic Not Passing Through Your Tunnel

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Chapter 21 High Availability and Performance Strategies for IPsec Site-to-Site VPNs

“Do I Know This Already?” Quiz

Foundation Topics

Configuration Procedures, Deployment Strategies, and Information Gathering

High Assurance with QoS

    Basic QoS Configuration

Deploying Redundant Peering for Site-to-Site VPNs

Site-to-Site VPN Redundancy Using Routing

Hardware-Based Failover with VPNs

    Configure LAN Failover Interfaces

    Configure Standby Addresses on Interfaces Used for Traffic Forwarding

    Define Failover Criteria

    Configure Nondefault Mac Addresses

Troubleshooting HA Deployment

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Part VIII Exam Preparation

Chapter 22 Final Exam Preparation

Tools for Final Preparation

    Pearson Cert Practice Test Engine and Questions on the CD

        Install the Software from the CD

        Activate and Download the Practice Exam

        Activating Other Exams

        Premium Edition

    The Cisco Learning Network

Memory Tables

Suggested Plan for Final Review/Study

    Using the Exam Engine

Summary

Part IX Appendixes

Appendix A Answers to the “Do I Know This Already?” Quizzes

Appendix B 642-648 CCNP Security VPN Exam Updates, Version 1.0

Appendix C Memory Tables (CD-only) 3

Appendix D Memory Tables Answer Key (CD-only) 19

Glossary

 

9781587204470   TOC   5/21/2012

 

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

CCNP Security VPN 642-648 Official Cert Guide 4.5 out of 5 based on 0 ratings. 2 reviews.
Boudville More than 1 year ago
Given the sheer length of this book, Hooper (and perhaps his editor also) is to be commended for including a "Do I Know This Already" quiz at the start of each chapter. It can greatly help you either prepare for the Cisco Security VPN exam or simply to efficiently study this topic for your own needs. The latter could arise in the context of you being a network administrator who has to setup a VPN using Cisco hardware and firmware. The book is suitable in this dual role. The early chapters provide an overview of how a VPN works that is a fairly general discussion, largely independent of Cisco hardware. You get a good idea of the state of VPN usage. One example is the recent deprecation of port forwarding. Mostly because it needs root (superuser) access on the remote client, and because an application needs to be installed there and only rudimentary TCP applications are usually supported. Instead, smart tunnels are the recommended alternative. The local user no longer needs root access on her machine, there are more supported applications and she does not have to reconfigure her local application settings. The text relates that smart tunnels are faster than client server plug-ins. What else looks interesting in the book? There is a mass of material. But the Cisco Secure Desktop seems a nifty package. The idea is to pre-check the machine that the user uses, and to do a clean up operation after she finishes. The latter is to remove any settings (like in the registry of a Microsoft machine) that she made that could be used later by a rogue. For example, in a replay attack. While the pre-check attempts tests like looking for a keystroke logger. The logger is an insidious malware attack vector, which can be instantiated as hardware or software. Unfortunately I cannot tell from the text whether the attempted detection of the logger is for only a hardware logger, only a software logger or both. Nor does the book say what its efficacy is. A pity. From my background in antispam and antiphishing, how the logger detector works was the most interesting part of the book. Now granted, Cisco might well want to keep its details as a trade secret, in part to avoid crackers trying to circumvent.
FRINGEINDEPENEDENTREVIEW More than 1 year ago
Do you need help in trying to pass the CCNP Security VPN certification exam (642-648)? If you do, then this book is for you! Author Howard Hooper, has done an outstanding job of writing a second edition of a book that focuses on the application of security principles, with regard to Cisco IOS routers, switches, and virtual private network devices. Author Hooper, begins with a discussion of the ASA operation and architecture. Then, the author focuses on the different methods that are used to apply policies and their contained attributes for controlling and ultimately securing remote servers. Next, he introduces you to the Cisco clientless Secure Sockets Layer VPN implementation. The author also covers the advanced settings that are available for the clientless SSL VPN deployment and the available application access methods and their configuration. He continues by focusing on the available customization options when approaching the task of customizing the clientless SSL VPN environment for remote users. Then, the author examines the implementation and configuration of group policies and the available attributes contained within. Next, he examines the available HA and performance enhancements that can be deployed when working with clientless SSL VPN solutions. The author also introduces you to the Cisco AnyConnect remote-access VPN configuration and client software. He continues by discussing the available mechanisms that can be configured to successfully authenticate your remote users. Then, the author reviews the various methods of the AnyConnect client deployment and installation available. Next, he describes the role and implementation of advanced authorization, which enables you to maintain complete control over the resources of remote users that can or cannot access before and during their connection to the VPN deployment. The author also reviews the different types of redundancy and high availability that you can deploy on the ASA device through configuration of the AnyConnect client or with external hardware. He continues by reviewing the Cisco Secure Desktop environment and associated modules for use with both the AnyConnect client and the clientless SSL VPN. Next, he introduces you to the Cisco IPSec VPN Client and its available methods of installation, configuration, and advanced customization. The author also introduces you to the Cisco Easy VPN client and server architecture. He continues by reviewing the configuration of PKI and its subsequent implementation with Easy VPN deployments. Then, the author describes the implementation of group policies and the attributes that can be included to provide advanced authorization of remote users. Next, he shows you how to put the mechanisms in place to provide a high-availability solution that will protect an organization form outages alongside an Easy VPN deployment. The author also introduces you to the Easy VPN hardware client capabilities of the ASA 5505 device and the configuration required for successful deployment. Finally, he lists the exam preparation tools that are useful at this point in the study process, and provides a suggested study plan.This most excellent book has been written with the same format and incorporates tools to assist you by assessing your current knowledge and emphasizing specific areas of interest. Perhaps more importantly, as you read through this great book, you will find that your test-taking skills will improve by continued exposure to the test format