Network Security 2.0 - Course 1 is supported by the Network Security Pod.

Preloaded Configuration Files

At the beginning of each lab exercise, NETLAB+ will automatically pre-configure supported routers and security devices using the configuration files in the instructor lab manual.

Enabling the Labs

To enable Network Security labs and pod types, check the box for "AE Network Security 1 V2.0 English" in the class settings. This must be done for each class requiring access to NS 1 labs.

Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.

Importance of Choosing the Correct Lab Exercise

Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.

Supported Lab List

Lab Description Pod Required Comments
1.1.1 Orientation Lab NSP In the original Cisco version, router interfaces E0 and E1 are reversed. In the NETLAB+ version, router interfaces match the other labs.
1.3.4 Vulnerabilities and Exploits NSP No options of using a Linux Boot CD. However, you could run Linux on the second student PC
2.5.2b Controlling TCP/IP Services NSP
2.5.7 Configuring Routing Authentication and Filtering NSP
3.2.3 Configure Basic Security using Security Device Manager (SDM) NSP
3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard NSP
3.6.3 Configuring the PIX Security Appliance with ASDM NSP
5.2.1 Install and Configure CSACS 3.3 for Windows NSP
6.1.3 Configure Local AAA on Cisco Router NSP
6.1.4 Configure Authentication Proxy NSP
6.3.10 Configure AAA on the PIX Security Appliance Using Cisco Secure ACS for Windows 2000 NSP
6.3.9 Configure Local AAA on the PIX Security Appliance NSP
7.1.9 Configure EAP on Cisco ACS for Windows NSP
7.2.8 Configure 802.1x Port-Based Authentication NSP
8.3.13 Configure Cisco Firewall CBAC NSP
9.1.7a Configure Access through the PIX Security Appliance using ASDM NSP
9.1.7b Configure Access through the PIX Security Appliance using CLI NSP
9.1.7c Configure Multiple Interfaces using CLI - Changelle lab NSP
9.1.9 Configure ACLs in the PIX Security Appliance using CLI NSP
9.2.3 Configure Service Object Groups using ASDM NSP
9.2.5 Configure Object Groups and Nested Object Groups using CLI NSP
9.4.10 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance NSP
10.2.4 Mitigate Layer 2 Attacks NSP