Network Security 2.0 - Course 2 is supported by the Network Security Pod.

Preloaded Configuration Files

At the beginning of each lab exercise, NETLAB+ will automatically pre-configure supported routers and security devices using the configuration files in the instructor lab manual.

Enabling the Labs

To enable Network Security labs and pod types, check the box for "AE Network Security 1 V2.0 English" in the class settings. This must be done for each class requiring access to NS 2 labs.

Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.

Importance of Choosing the Correct Lab Exercise

Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.

Supported Lab List

Lab Description Pod Required Comments
2.1.6 Configure a Router with the IOS Instrusion Prevention System NSP
2.3.3 Configure Intrusion Prevention on the PIX Security Appliance NSP
4.4.7 Configure Cisco IOS IPSec using Pre-Shared Keys NSP
4.4.8a Conofigure a Cisco GRE over IPSec Tunnel using SDM NSP
4.4.8b Configure Cisco IOS IPSec with Pre-Shared Keys using SDM NSP
4.5.5a Configure a PIX Security Appliance Site-to-Site IPSec VPN NSP
4.5.5b Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel Using ASDM NSP
5.2.6 Configure a Cisco Router for IPSec using Digital Certificates NSP The CA server will run on RBB
5.3.2 Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel with CA Support NSP
6.1.12a Configure Remote Access Using Cisco Easy VPN NSP The VPN client is installed on the Backbone Server
6.2.12b Configure Cisco Easy VPN Server with NAT NSP The VPN client is installed on the Backbone Server
6.5.9a Configure a Secure VPN Using IPSec between a PIX and a VPN Client using ASDM NSP The VPN client is installed on the Backbone Server
6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI NSP The VPN client is installed on the Backbone Server
7.4.5 Configure SNMP Messages on a Cisco Router NSP
7.4.6 Configure SNMP Monitoring of the PIX Security Appliance Using ASDM NSP
8.2.4 Configure LAN-Based Failover Between Two PIX Security Appliances (Optional) NSP Able to do Active/Standby failover. Unable to do Active/Active Failover
8.3.3 Configure a PIX Security Appliance as a Transparent Firewall NSP
8.4.3a Configure User Authentication and Command Authorization using ASDM NSP
8.4.3b Configure SSH, Command Authotization, and Local User Authentication using CLI NSP