EVE-NG CCIE Security V6.1 Practice Lab | CCIE Security Practice Lab
Scenario 1
CCIE Security v6.1 Practice Lab + Workbook
Objective: In this scenario, candidates will have the opportunity to practice their skills in the field of network security with the CCIE Security v6.1 Practice Lab. This lab is designed to simulate real-world scenarios and challenges that professionals may encounter in their day-to-day work. By participating in this lab, candidates can assess their understanding of various security concepts and technologies and gain valuable hands-on experience. This practice lab serves as an excellent opportunity for individuals to sharpen their skills, identify areas for improvement, and prepare for the CCIE Security v6.1 certification exam.
Scenario 2
Web Security LAB Configuration
Objective: This scenario focuses on Web Security use cases. The tasks include configuring supplicant onboarding, WCCP redirection, identification profiles, explicit proxy, Active Directory group membership, URL filtering, transparent mode, and decryption policies. In this lab, you will work with ISE, WSA, Active Directory, and DNS Server.
Scenario 3
Cisco security FTD FMC routed mode Lab
Objective: This lab exercise, we will be focusing on Cisco security FTD FMC in routed mode. This means we will be configuring and testing the routing capabilities of the Cisco Firepower Threat Defense (FTD) and Firepower Management Center (FMC). By using this lab scenario, we will gain hands-on experience with basic routing configurations and understand how FTD and FMC work together to ensure network security.
Scenario 4
Cisco Security IOSEC IKEv2 Site to Site VPN HA Lab
Objective: Cisco Security CCNA IOSEC IKEv2 VTI Site to Site VPN HA Lab involves a comprehensive study of Cisco’s security protocols, specifically focusing on the CCNA IOSEC IKEv2 VTI Site to Site VPN High Availability Lab. This lab enables students to gain practical knowledge and hands-on experience in configuring and implementing secure VPN connections using Cisco’s renowned security features. By delving into this scenario, students can learn about the intricacies of secure VPN communication, the importance of High Availability for uninterrupted connectivity, and how to utilize industry-standard security protocols for safeguarding network connections. This lab is an excellent opportunity for aspiring network security professionals to enhance their understanding and skills in Cisco’s security technologies.
Scenario 5
ASAv Site to Site VPN IKEv2
Objective: This scenario focuses on Site-To-Site VPN use cases. The tasks include configuring LAN–To–LAN IPSec VPNs using IOS CA, FlexVPN D-VTI, DMVPN, IKEv2 S-VTI using CA, FlexVPN Hub-Spoke, and GETVPN. In this lab you will work with CSR1K.
Scenario 6
dot1x ISE Lab Book
Objective: dot1x ISE Lab Book Pro In this scenario, we will be utilizing dot1x (IEEE 802.1x) with Cisco Identity Services Engine (ISE) in a lab environment. The focus of the lab will be to configure and validate the functionality of dot1x authentication using ISE. We will be using the ISE Lab Book Pro, which provides a comprehensive guide for step-by-step configuration and troubleshooting. This lab will help us understand the importance of network access control and the role played by ISE in ensuring secure and authorized network access.
Scenario 7
2 Factor Authentication DUO Cloud with FirePower FMC & FTD
Anyconnect VPN PoC Lab
Objective: In Scenario 7, we are dealing with the use of 2 Factor Authentication DUO Cloud along with FirePower 6.3 FMC & FTD Anyconnect VPN PoC Lab. This lab setup allows us to test and validate the effectiveness of using DUO Cloud for enhanced security measures. By implementing 2 Factor Authentication, we can ensure an extra layer of protection for users accessing the VPN. This integration with FirePower 6.3 FMC and FTD adds further security by enabling access control and monitoring capabilities. This scenario provides an opportunity to evaluate the functionality and efficiency of this setup.
Scenario 8
Cisco Security Firepower Threat Defense Policies Lab
Objective: Cisco Security Firepower Threat Defense Policies Lab In this lab, we will delve into the intricacies of Cisco Security Firepower Threat Defense Policies. This scenario offers us an opportunity to understand and apply the concepts of threat defense policies in a practical setting. By engaging in this lab, we will gain hands-on experience and enhance our skills in configuring and managing security policies using Cisco Firepower Threat Defense. Through a step-by-step approach, we will analyze various scenarios and learn how to effectively protect our network infrastructure from potential threats. Let’s dive in and explore the world of Cisco Security Firepower Threat Defense Policies.
Scenario 9
Cisco Security TrustSec SXT DOT1X ISE 3 Lab
Objective: In this scenario, we will be delving into the world of Cisco Security TrustSec SXT DOT1X ISE 3 Lab. It is an exciting opportunity to explore the trust and security mechanisms implemented by Cisco. By utilizing dynamic user and device authentication, we can establish secure connections within our network. The ISE 3 Lab plays a crucial role in managing and enforcing policies, ensuring that only trusted connections are established. We will navigate through various processes, such as defining policies, configuring switches and endpoints, and monitoring the entire network for any security breaches. This laboratory enables us to enhance our understanding of network security, making our systems robust and resilient.
Scenario 10Cisco IPSec Series
Objective: This scenario focuses on Remote Access VPN use cases. The tasks include configuring client’s SSL VPN, port forwarding, AnyConnect with ASA HA mode, Cisco TrustSec with ISE, VPN users dynamic mapping and posture assessment. In this lab you will work with ISE, AnyConnect, ASA, CSR1K, Active Directory and DNS Server.
FREE DOWNLOAD
Workbook Sample
What's included?
- CCIE Security v6.1
- WSA Security Lab basic configuration lab
- ASAv HA Active-Standby IPSEC VTI