Implementing Cisco Unified Communications Manager, Part 2 v8.0
|System Hardening and Availability|
|Routing plane security features (e.g. protocol authentication, route filtering)|
|Routing plane security features (e.g. protocol authentication, route filtering)|
|Control Plane Policing|
|Control Plane Protection and Management Plane Protection|
|Broadcast control and switch port security|
|Additional CPU protection mechanisms (e.g. options drop, logging interval)|
|Disable unnecessary services|
|Control device access (e.g. Telnet, HTTP, SSH, Privilege levels)|
|Device services (e.g. SNMP, Syslog, NTP)|
|Transit Traffic Control and Congestion Management|
|Threat Identification and Mitigation|
|Identify and protect against fragmentation attacks|
|Identify and protect against malicious IP option usage|
|Identify and protect against network reconnaissance attacks|
|Identify and protect against IP spoofing attacks|
|Identify and protect against MAC spoofing attacks|
|Identify and protect against ARP spoofing attacks|
|Identify and protect against Denial of Service (DoS) attacks|
|Identify and protect against Distributed Denial of Service (DDoS) attacks|
|Identify and protect against Man-in-the-Middle (MiM) attacks|
|Identify and protect against port redirection attacks|
|Identify and protect against DHCP attacks|
|Identify and protect against DNS attacks|
|Identify and protect against MAC Flooding attacks|
|Identify and protect against VLAN hopping attacks|
|Identify and protect against various Layer2 and Layer3 attacks|
|Capture and utilize packet captures|
|Intrusion Prevention and Content Security|
|IPS 4200 Series Sensor Appliance|
|(a) Initialize the Sensor Appliance|
|(b) Sensor Appliance management|
|(c) Virtual Sensors on the Sensor Appliance|
|(d) Implementing security policies|
|(e) Promiscuous and inline monitoring on the Sensor Appliance|
|(f) Tune signatures on the Sensor Appliance|
|(g) Custom signatures on the Sensor Appliance|
|(h) Actions on the Sensor Appliance|
|(i) Signature engines on the Sensor Appliance|
|(j) Use IDM/IME to the Sensor Appliance|
|(k) Event action overrides/filters on the Sensor Appliance|
|(l) Event monitoring on the Sensor Appliance|
|VACL/SPAN & RSPAN on Cisco switches|
|(a) Implementing WCCP|
|(b) Active Dir Integration|
|(d) HTTPS Config|
|(e) Services Configuration (Web Reputation)|
|(f) Configuring Proxy By-pass Lists|
|(g) Web proxy modes|
|(h) App visibility and control|
|Identity Based Authentication/Authorization/Accounting|
|(a) Cisco Router/Appliance AAA|
|Device Admin (Cisco IOS Routers, ASA, ACS5.x)|
|Network Access (TrustSec Model)|
|(a) Authorization Results for Network Access (ISE)|
|(b) 802.1X (ISE)|
|(c)VSAs (ASA / Cisco IOS / ISE)|
|(d) Proxy-Authentication (ISE/ASA/Cisco IOS)|
|Cisco Identity Services Engine (ISE)|
|(a) Profiling Configuration (Probes)|
|(b) Guest Services|
|(d) Client Provisioning (CPP)|
|(e) Configuring AD Integration/Identity Sources|
|Perimeter Security and Services|
|Cisco ASA Firewall|
|(a) Basic firewall Initialization|
|(b) Device management|
|(c ) Address translation (nat, global, static)|
|(d) Access Control Lists|
|(e) IP routing/Route Tracking|
|(f) Object groups|
|(h) Configuring Etherchannel|
|(i) High Availability and Redundancy|
|(j) Layer 2 Transparent Firewall|
|(k) Security contexts (virtual firewall)|
|(l) Modular Policy Framework|
|(j) Identity Firewall Services|
|(k) Configuring ASA with ASDM|
|(l) Context-aware services|
|(m) IPS capabilities|
|(n) QoS capabilities|
|Cisco IOS Zone Based Firewall|
|(a) Network, Secure Group and User Based Policy|
|(b) Performance Tuning|
|(c) Network, Protocol and Application Inspection|
|Perimeter Security Services|
|(a) Cisco IOS QoS and Packet marking techniques|
|(b) Traffic Filtering using Access-Lists|
|(c)Cisco IOS NAT|
|(e) PAM - Port to Application Mapping|
|(f) Policy Routing and Route Maps|
|Confidentiality and Secure Access|
|IPsec LAN-to-LAN (Cisco IOS/ASA)|
|Dynamic Multipoint VPN (DMVPN)|
|Group Encrypted Transport (GET) VPN|
|Remote Access VPN|
|(a) Easy VPN Server (Cisco IOS/ASA)|
|(b) VPN Client 5.X|
|(c) Clientless WebVPN|
|(d) AnyConnect VPN|
|(e) EasyVPN Remote|
|(f) SSL VPN Gateway|
|VPN High Availability|
|QoS for VPN|
|Digital Certificates (Enrollment and Policy Matching)|
|(a) EAP methods|
The Implementing Cisco Unified Communications Manager, Part 2 v8.0 (CIPT2 v8.0) 642-457 is the exam associated with the CCNP Voice certification. This exam tests a candidate’s skills in implementing a Cisco Unified Communications Manager solution in a multisite environment and applying a dial plan for a multisite environment, configuring survivability for remote sites during WAN failure and implementing solutions to reduce bandwidth requirements in the IP WAN. Candidates can prepare for this exam by taking the CIPT2 v8.0 Implementing Cisco Unified Communications Manager, Part 2 v8.0 (CIPT2 v8.0) 642-457 course.
The following information provides general guidelines for the content likely to be included on the 642-457 CIPT2 v8.0 exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.
Hi, I am Zita from the Republic of Gabon, a student of Inter-Networkz. I did my CCNA ..
Inter-networkz is the best and peaceful course provider which not only provided good ..
CEH gives the very basic idea of getting into the mindset of hackers and ECSA will he..
I would like to express my gratitude for the training that I received from Inter-netw..
I followed a 10 days program in CEH training at Internetworkz, which was finished on ..
This is regarding the ECSA training i recieved from Internetworkz, Bangalore. ECSA is..
I have joined Internetworkz for the CCIE course and found the training to be very use..
Hi I am Manjunath. I enrolled for MCITP course in Internetworkz and had a very good l..
I would like to express my gratitude for the training that I received from Internetwo..
I had enrolled myself for the CCNA course in Inter-networkz in Jan 2010. I found the ..
Hi, I am R.Saminathan and am doing my CCNP at Internetworkz, BNGLR. After finishing m..
Hi, I joined InterNetworkz after my graduation and did CCNA and CCNP courses from her..
Hi, i am Gagan and I have completed my online tutorials in CCNA from Internetworkz. M..
The MCITP and CCNA training that i had at Inter-networkz was really interesting and u..
I joined Internetworkz 2 months back and i got good training in CCNA. My learning exp..
The CCNA training that i had in the Inter-networkz was really interesting and useful...
Hi, I thank Inter-networkz for providing me a platform to enhance my skills and an en..
“Inter-networkz is one of the best institutes i have found. I got all the required ..
Hi, i am Mayur. I did my CCNA from Inter-Networkz. After i finished my graduation, I ..
I find Inter-networkz a very good institute for Networking. I got all the required eq..
Hi, I’m CCNA certified from Inter-networkz. And i have finished my CCNP training as..
Hi, I am Santhosh B, a B.TECH (ECE)graduate.I am happy to say that I have done my CCN..
Hi,I am Vaseem, a student of Inter-networkz. I had joined CCNA Security course in Int..
Hi, I had joined internetworkz in March 2012 for CCNA and CCNP (R&S) . The experience..
Dear Internetworkz,I would like to inform you that I have got selected at Engage IT S..
Hi, I am so excited to say about the days which i spend at Inter-networkz.One of my f..
The MCITP and CCNA training that i had in the Inter-networkz was really interesting a..
“..It has been great pleasure to pass CCIE from first attempt July 2012, My thanks ..
Hi, I chose networking as i have an interest in it and plan to make a career in it. I..
I am very happy today because my hard work and rigorous training at Internetworkz pai..
Finally, after many months of study, hundreds of hours of practice, now I am proud to..
Hi, I am Mohammed Babiker Zainalabdeen from Republic of Sudan, a student of Inter-Net..
This year I set myself a challenge of becoming a Cisco Certified Internetworking Expe..
Hi this is Travis K, I passed my CCIE Security recently. Thanks to InterNetworkz. I s..