CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

ca generate rsa key command (SSH)

       PIX firewall access   2nd  

cable-based firewalls  

       failovers  

               clock settings  

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               enabling  

               IP address settings   2nd  

               stateful example  

               stateful settings   2nd  

               system address settings   2nd  

CD-ROM

       PrepLogic Practice Exams, Preview Edition   2nd  

certificate authorities (CAs)

       configuring (VPNs)  

Cisco

       licenses

               failover  

               restricted  

               unrestricted  

Cisco Intrusion Detection Systems (CSIDS)  

Cisco Management Center for Firewall (PIX MC)

       access rules   2nd  

       additional resources   2nd  

       configuration tabs   2nd  

               Devices   2nd   3rd   4th   5th   6th  

       exam prep questions   2nd   3rd   4th   5th   6th  

        group attributes   2nd  

       login methods  

       management functions   2nd   3rd  

       splash screen  

Cisco PIX 501 Firewall   2nd  

       default factory configurations   2nd  

Cisco PIX 506E Firewall  

       default factory configurations   2nd  

Cisco PIX 515E Firewall  

Cisco PIX 525 Firewall  

Cisco PIX 535 Firewall   2nd  

Cisco PIX Firewalls  

Cisco Press Web site  

Cisco Secure Access Control Server (CSACS)  

       downloadable access control lists   2nd   3rd   4th  

       installing   2nd  

       users

               adding to database   2nd  

Cisco Secure Encyclopedia  

Cisco Secure PIX Firewalls  

Cisco Secure Policy Manager (CSPM)  

Cisco Secure Scanner  

Cisco Security Wheel

       security process   2nd  

               monitoring the environment  

               policy improvements  

               securing the environment  

               testing the environment  

Cisco VPN/Security Management Solution (VMS)

       functions of   2nd  

Cisco Web site

       exam resources  

       practice test resources  

CiscoWorks

       additional resources   2nd  

       exam prep questions   2nd   3rd   4th   5th   6th  

CiscoWorks Auto Update Server (AUS)

       configuration tabs

               Devices   2nd   3rd   4th   5th  

       update process   2nd  

clear aaa command  

clear access-group command

       options  

       syntax  

clear access-list command

       options   2nd  

       syntax   2nd  

clear arp command (CLI)  

clear clock command  

clear crypto ipsec sa command (IPSec)  

clear crypto isakmp command (IPSec)  

clear fixup commmand  

clear logging command  

clear object-group command  

clear shun command (IDS)  

clear uauth command  

clear xlate command (CLI)  

CLI

       (Command Line Interface)  

       commands

               clear arp  

               clear xlate  

               config terminal   2nd   3rd  

               disable  

               enable   2nd  

               hostname  

               password  

               ping  

               reload  

               show arp  

               show conn  

               show history  

               show interface   2nd  

               show IP address  

               show startup  

               show version   2nd  

               show xlate  

               telnet   2nd  

               write memory  

               write standby  

               write terminal  

       configuration mode  

       monitor mode   2nd  

       PIX firewall configuration

               saving   2nd  

               viewing   2nd   3rd   4th   5th   6th   7th  

       privileged mode  

        unprivileged mode   2nd  

clients

       DHCP

               ip address command   2nd  

       NTP

               configuring on PIX firewall   2nd   3rd  

       PDM support  

clock set command  

       Using the clock set Command (Listing 7.1)  

clock summer-time command  

clock timezone command   2nd  

code listings

       Blocking a Single Destination (6.9)   2nd  

       Configuring a DHCP Server with Automatic Options (8.3)  

       Configuring a DHCP Server with Manual Options (8.2)  

       Configuring Traffic to Come In (6.8)  

       Creating Three Entries in an Access List (6.6)  

       Example of the object-group icmp-type Command (6.19)   2nd  

       Example of the object-group network Command (6.13)   2nd  

       Example of the object-group protocol Command (6.17)   2nd  

       Example of the object-group services Command (6.15)   2nd  

       static and access-list Commands (6.2)   2nd  

       static and conduit Commands (6.1)  

Command Line Interface,   [See CLI]

commands

       ACLs

               access-group   2nd  

               access-list   2nd   3rd  

               apply  

               clear access-group  

               clear access-list   2nd  

               outbound   2nd  

               show access-group  

               show access-list   2nd  

       clear clock  

       clear logging  

       clear shun (IDS)  

       clock set  

       clock summer-time  

       clock timezone   2nd  

       filter activex  

       filter java  

       firewall configuration   2nd   3rd  

               global  

               interface  

               ip address  

                nameif  

               nat  

               route  

       fixup protocol smtp (Mail Guard)   2nd  

       fixups

               clear fixup  

               fixup protocol  

               show fixup  

       HTTP

               http   2nd  

               http server  

       logging monitor  

       logging on  

       logging standby  

       logging timestamp  

       logging trap  

       NTP  

               ntp authenticate  

               ntp authentication-key  

               ntp server  

               ntp trusted-key  

               show ntp  

               show ntp associations  

               show ntp status  

       ntp server  

       object groups

               clear object-group  

               object-group icmp-type   2nd   3rd  

               object-group network   2nd   3rd   4th  

               object-group protocol   2nd   3rd  

               object-group services   2nd   3rd  

               show object-group  

       PDM

               unsupported   2nd  

       PPPoE

               ip address command  

               vpdn group authentication command  

               vpdn group command   2nd  

               vpdn group localname command  

               vpdn username and password command  

       RSH

               fixup protocol rsh   2nd  

       show clock  

       show logging  

       show shun (IDS)  

       shun (IDS)  

       SQL*Net

               fixup protocol sqlnet  

       SSH

               ca generate rsa key   2nd  

               ca save all  

               domain- name  

               hostname  

               show ca mypubkey rsa  

               show ssh sessions  

               ssh   2nd  

               ssh disconnect session  

       turbo ACLs

               access-list compile   2nd  

       URL filters

               filter-url  

               show perfmon  

               show url-cache stat  

               show url-server  

               url-cache  

               url-server  

Computer Security Institute (CSI)  

Computer Security Institute Web site  

conduit command   2nd   3rd  

       example  

       ICMP ping traffic

               allowing in  

       options  

        pairing with static command   2nd  

       syntax  

       traffic flow control measure  

config terminal command (CLI)   2nd   3rd  

configuration mode

       CLI  

Configuration tab

       PIX MC (Cisco Management Center for Firewall)   2nd  

configure net command

       TFTP servers

               configuring   2nd  

configuring

       AAA services  

               accounting   2nd  

               authentication   2nd  

               authorization   2nd   3rd  

               cut-through proxy authentication   2nd   3rd  

               cut-through proxy authorization  

               server locations   2nd  

               usernames   2nd   3rd   4th   5th  

       failovers   2nd   3rd   4th   5th  

               cable-based   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               commands   2nd  

               LAN-based   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       firewalls

               ACLs   2nd   3rd  

       HTTP servers

               PDM installations   2nd  

       IPSec

               VPN site-to-site connections   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th  

       NTP clients

               on PIX firewall   2nd   3rd  

       PIX firewall

               CLI   2nd   3rd   4th   5th   6th   7th  

               console port  

               global command   2nd   3rd  

               interface command   2nd   3rd  

               IP address command  

               nameif command   2nd  

               nat command   2nd   3rd  

               route command   2nd  

               sample code (Listing 4.10)   2nd  

       PIX firewalls

               Cisco PIX 501 default settings   2nd  

               Cisco PIX 506E default settings   2nd  

               PDM   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       PPPoE

               on PIX firewall   2nd   3rd   4th   5th   6th   7th   8th  

       SNMP

               on PIX firewall   2nd  

       TFTP servers

               configure net command   2nd  

               write erase command  

               write net command   2nd  

conn commands   2nd   3rd  

connecting

       PDM

               via HTTP servers   2nd   3rd  

connection (conn) table   2nd   3rd   4th   5th  

connection tables

       adaptive security algorithm (ASA)

               PIX firewalls  

console port

       logging on PIX firewall  

       PIX firewall

               configuring  

       PIX firewall access  

controlling

       traffic flow  

               ACLs   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

               conduit command   2nd   3rd   4th   5th  

copy command

       images

               TFTP servers   2nd   3rd  

copying

       TFTP server images

               to PIX firewalls   2nd   3rd  

CramSession Web site

       practice test resources  

crypto access-list command  

crypto ipsec security-association lifetime command  

crypto map command   2nd   3rd   4th  

crypto map interface command  

crypto maps

       IPSec

               configuring   2nd  

cut-through proxy

       PIX firewall  

cut-through proxy authentication

       AAA services   2nd   3rd  

cut-through proxy authorization

       AAA services  

Категории