642-533 Blueprint
Following information is on Cisco Learning Network.
Exam Topics
The following topics are general guidelines for the content likely to be included on the Remote Access exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
Describe how Cisco IPS sensors are used to mitigate network security threats
- List sensor requirements for inline operations
- Explain the difference between inline and promiscuous mode sensor operations
- Explain how Cisco IPS protects network devices from attacks (Describe signatures, alerts, and actions)
- Explain the evasive techniques used by hackers and how Cisco IPS defeats those techniques
- Describe the considerations necessary for selection, placement, and deployment of a network intrusion prevention system
- Explain the Cisco IPS signature features
Install Cisco IPS sensors/modules and configure essential system parameters
- Explain AIP-SSM functionalities
- Use the CLI to initialize the sensor
- Configure user accounts and explain the different user roles
- Configure management access to the sensor appliance
- Explain how allowed hosts are used and how they are configured
- Describe sensor interfaces, interface pairs, VLAN-pairs, and VLAN-groups
- Use the Cisco IDM to configure sensor interfaces (enable, create pairs, assign to virtual sensors)
- Describe and configure software bypass
- Describe sensor communications with external management and monitoring systems
- Launch, navigate, and use the Cisco IDM to manage and monitor the sensor
- Describe the various CLI configuration modes and sub modes and navigate between them
- List the tasks for installing and configuring the IDSM-2 and AIP-SSM
Describe Cisco IPS sensor advanced system parameters
- Plan the mitigation of specific network vulnerabilities and exploits
- Describe sensor tuning
- Explain IP fragment and TCP stream reassembly options
- Explain how IP logging should be used and how it is configured
- Explain the use of Event Variables
- Describe signature engines and their functionality
- Determine which response actions need to be configured for a given scenario
- Describe the purpose of the Meta Event Generator
- Explain Target Value Ratings and how they are used
- Determine the need for Event Action Rules in a given scenario
- Explain event Risk Ratings and how they are used
Tune Cisco IPS sensor advanced system parameters to optimize attack mitigation performance
- Use the IDM to tune the sensor to work optimally in the network
- Use the IDM to tune signatures to provide maximum protection for a network
- Given a scenario, use the IDM to create custom signature to meet the requirements
- Configure response actions for a signature
- Configure the sensor to take response actions based on a risk rating
- Use the Cisco IDM to create a Meta signature and disable alert production for the component signatures
- Configure Event Action Filters
- Configure Target Value Ratings
- Configure general settings for Event Action Rules
- Configure Event Variables
- Use the sensor application policy enforcement feature
- Configure passive OS fingerprinting (POSFP)
- Explain the External Product Interface, its benefits, and specifications
- Configure a virtual sensor
- Configure anomaly detection
- Use IDM/CLI to monitor advanced features such as POSFP and AD
Analyze Cisco IPS sensor events to determine the appropriate response to network attacks
- Use the CLI and the Cisco IDM and IEV to monitor events
Upgrade and maintain Cisco IPS sensors
- Move software images/upgrades and configuration files via HTTP, HTTPS, SCP, and FTP
- Apply the appropriate system image to the sensor
- Perform sensor password recovery
- Explain sensor licensing and how to install a license
- Describe service pack and signature update file names and how to install them