Bookmark this page and check back often for updates! As you can see it is very much a work in progress, but I will be making updates.

I. Implement secure networks using Cisco ASA Firewalls

A. Perform basic firewall Initialization

1. Restoring the Factory Default Configuration

a. configure factory-default [ip_address [mask]]

2. Saving Configuration Changes

a. write memory all [/noconfirm]

3. Setting the Login Password

a. Used for Telnet and SSH connections; default is cisco
b. {passwd | password} password

4. Setting the Enable Password

a. Default is blank
b. enable password password

5. Setting the Hostname

a. hostname name

6. Setting the Domain Name

a. Appended to unqualified names
b. Default is default.domain.invalid
c. domain-name name

7. Setting the Date and Time

a. NTP server will override any manually set time
b. clock timezone zone [-]hours [minutes]
c. clock summer-time zone date {day month | month day} year hh:mm {day month | month day} year hh:mm [offset]
d. clock summer-time zone recurring [week weekday month hh:mm week weekday month hh:mm] [offset]
e. ntp authenticate
ntp trusted-key key_id
ntp authentication-key key_id md5 key
ntp server ip_address [key key_id] [source interface_name] [pref er]
f. clock set hh:mm:ss {month day | day month} year

8. Configuring Ethernet Interfaces

a. interface physical_interface
speed {auto | 10 | 100 | 1000 | nonegotiate}
duplex {auto | full | half}
no shutdown

9. Configuring Fiber Interfaces

a. interface gigabitethernet 1/port
media-type sfp
speed nonegotiate
no shutdown

10. Configuring a Redundant Interface

a. interface redundant number
interface redundant number
redundant-interface redundantnumber active-member physical_interface

11. Configuring Interface Parameters

a. no shutdown
b. nameif
c. security-level
d. management-only
e. ip address
f. mac-address

12. Allowing Communication Between Interfaces of Same Security Level

a. same-security-traffic permit inter-interface

B. Configure device management

1. Local Database

a. username name {nopassword | password password [mschap]} [privilege

2. AAA Servers

a. aaa-server server_group protocol {kerberos | ldap | nt | radius |
sdi | tacacs+}
aaa-server server_group (interface_name) host server_ip

3. Allowing Telnet Access

a. telnet source_IP_address mask source_interface

4. Allowing SSH Access

a. crypto key generate rsa modulus modulus_size
write mem
ssh source_IP_address mask source_interface

5. Allowing HTTPS Access for ASDM

a. http source_IP_address mask source_interface
http server enable [port]
asdm image disk0:/asdmfile

6. Managing the Security Appliance on a Different Interface from the VPN Tunnel Termination Interface

a. management access management_interface

7. LDAP Authentication Support

C. Configure address translation (nat, global, static)
D. Configure ACLs
E. Configure IP routing

1. Static Routing
2. Default Routing
4. RIP

a. Generating a default route

b. Disabling route summarization

c. Network filtering

d. Send and receive versions

e. RIP Authentication

6. Route Maps
7. Multicast Routing

a. Enabling
c. Stub Multicast Routing
d. Static Multicast Routes
e. PIM Features

F. Configure object groups

1. Enhanced Service Object Groups

G. Configure VLANs

1. VLAN Support for RA VPN

H. Configure filtering
I. Configure failover
J. Configure Layer 2 Transparent Firewall

1. Transparent Firewall NAT

K. Configure security contexts (virtual firewall)
L. Configure Modular Policy Framework
M. Configure Application-Aware Inspection
N. Configure high availability solutions
O. Configure QoS policies
P. Cisco Secure Desktop
Q. Other Advanced Features

1. Local CA
2. Dynamic Access Policies
3. Inspection for Web/SSL VPN Traffic
4. Enahcned ASA protection (Threat Detection)

II. Implement secure networks using Cisco IOS Firewalls

A. Configure CBAC

1. CBAC Enhancements

B. Configure Zone-Based Firewall
C. Configure Audit
D. Configure Auth Proxy
E. Configure PAM
F. Configure access control
G. Configure performance tuning
H. Configure advanced IOS Firewall features

1. ACL IP Option Selective Drop
2. IOS L2 Transparent Firewall
3. Application Firewall
4. HTTP Inspection
5. HTTP Applications
6. Instant Messaging
7. Flexible Packet Matching

III. Implement secure networks using Cisco VPN solutions

A. Configure IPsec LAN-to-LAN (IOS/ASA)
B. Configure SSL VPN (IOS/ASA)
C. Configure Dynamic Multipoint VPN (DMVPN)

1. Advanced DMVPN
2. DMVPN Phase 3

D. Configure Group Encrypted Transport (GET) VPN
E. Configure Easy VPN (IOS/ASA)

1. EZVPN Enhancements

a. Multiple Inside/Outside Interfaces
b. Proxy DNS
c. Peer Hostname
d. VTI Support
e. DPD Enhancements

F. Configure CA (PKI)


b. Subordinate/RA Mode IOS Certificate Server (CS) Rollover
c. Certificate ACLs
d. Key Rollover for Certificate Renewal

G. Configure Remote Access VPN
H. Configure Cisco Unity Client
I. Configure Clientless WebVPN
J. Configure AnyConnect VPN
K. Configure XAuth, Split-Tunnel, RRI, NAT-T
L. Configure High Availability
M. Configure QoS for VPN
N. Configure GRE, mGRE
O. Configure L2TP
P. Configure advanced Cisco VPN features

1. IPsec VPN Enhancements

a. VTI Support
b. Encrypted PSK

IV. Configure Cisco IPS to mitigate network threats

A. Configure IPS 4200 Series Sensor Appliance
B. Initialize the Sensor Appliance

1. Sensor Password Recovery

C. Configure Sensor Appliance management
D. Configure virtual Sensors on the Sensor Appliance
E. Configure security policies
F. Configure promiscuous and inline monitoring on the Sensor Appliance
G. Configure and tune signatures on the Sensor Appliance
H. Configure custom signatures on the Sensor Appliance
I. Configure blocking on the Sensor Appliance
J. Configure TCP resets on the Sensor Appliance
K. Configure rate limiting on the Sensor Appliance
L. Configure signature engines on the Sensor Appliance
M. Use IDM to configure the Sensor Appliance
N. Configure event action on the Sensor Appliance
O. Configure event monitoring on the Sensor Appliance
P. Configure advanced features on the Sensor Appliance

1. Threat Rating
2. Anomaly Detection
3. TCP Session Tracking Modes
4. Configuration via the IME

Q. Configure and tune Cisco IOS IPS
R. Configure SPAN & RSPAN on Cisco switches

V. Implement Identity Management

A. Configure RADIUS and TACACS+ security protocols
B. Configure LDAP
C. Configure Cisco Secure ACS
D. Configure certificate-based authentication
E. Configure proxy authentication
F. Configure 802.1x
G. Configure advanced identity management features
H. Configure Cisco NAC Framework
J. PKI AAA Authorization

VI. Implement Control Plane and Management Plane Security

A. Implement routing plane security features (protocol authentication, route filtering)
B. Configure Control Plane Policing
C. Configure CP protection and management protection
D. Configure broadcast control and switchport security
E. Configure additional CPU protection mechanisms (options drop, logging interval)
F. Disable unnecessary services
G. Control device access (Telnet, HTTP, SSH, Privilege levels)
H. Configure SNMP, Syslog, AAA, NTP
I. Configure service authentication (FTP, Telnet, HTTP, other)
J. Configure RADIUS and TACACS+ security protocols
K. Configure device management and security

1. IOS Login Enhancements
2. IP Source Tracker
3. Role Based CLI
4. IOS Resilient Configuration
5. Buffer Overflow Detection and correction
6. Additional CPU protection mechanisms (options drop, logging interval)

VII. Configure Advanced Security

A. Configure mitigation techniques to respond to network attacks
B. Configure packet marking techniques
C. Implement security RFCs (RFC1918/3330, RFC2827/3704)
D. Configure Black Hole and Sink Hole solutions
E. Configure RTBH filtering (Remote Triggered Black Hole)
F. Configure Traffic Filtering using Access-Lists
G. Configure IOS NAT
H. Configure TCP Intercept
I. Configure uRPF
J. Configure CAR
K. Configure NBAR
L. Configure NetFlow
M. Configure Anti-Spoofing solutions
N. Configure Policing
O. Capture and utilize packet captures
P. Configure Transit Traffic Control and Congestion Management
Q. Configure Cisco Catalyst advanced security features
R. IOS Security Features

1. DHCP Secured/Authorized ARP
2. Router IP Traffic Export
3. Virtual Fragmentation and Reassembly

VIII. Identify and Mitigate Network Attacks

A. Identify and protect against fragmentation attacks
B. Identify and protect against malicious IP option usage
C. Identify and protect against network reconnaissance attacks
D. Identify and protect against IP spoofing attacks
E. Identify and protect against MAC spoofing attacks
F. Identify and protect against ARP spoofing attacks
G. Identify and protect against Denial of Service (DoS) attacks
H. Identify and protect against Distributed Denial of Service (DDoS) attacks
I. Identify and protect against Man-in-the-Middle (MiM) attacks
J. Identify and protect against port redirection attacks
K. Identify and protect against DHCP attacks
L. Identify and protect against DNS attacks
M. Identify and protect against Smurf attacks
N. Identify and protect against SYN attacks
O. Identify and protect against MAC Flooding attacks
P. Identify and protect against VLAN hopping attacks
Q. Identify and protect against various Layer2 and Layer3 attacks

You can leave a response, or trackback from your own site.

15 Responses to “CCIE Security Lab Expanded Blueprint 3.X”

  1. Ismail says:

    Your articles are of great help,I have been planning to prepare such a guide for my self.Thank you very much


  2. Rizzo says:


    Really excited about new CCIE Security Lab because its really worth giving a go for it. More challenging then ever before.

    How much do we need to know about Routing & Switching? as everything will be pre-configed for lab.

    Yes, I am fully tuned to RSS feed on this page. :)

    I love to know about lab diagram, IOS versions for all devices and connections, so I can start putting my gear in right order.

  3. Hi Ismail!

    Thanks so much for the kind words – and thanks so much for participating in Blog here at IntExp!

  4. Deepak Arora says:

    Changes to CCIE Lab and Written Exam Question Format and Scoring

    Effective February 1, 2009, Cisco will introduce a new type of question format to CCIE Routing and Switching lab exams. In addition to the live configuration scenarios, candidates will be asked a series of four or five open-ended questions, drawn from a pool of questions based on the material covered on the lab blueprint. No new topics are being added. The exams are not been increased in difficulty and the well-prepared candidate should have no trouble answering the questions. The length of the exam will remain eight hours. Candidates will need to achieve a passing score on both the open-ended questions and the lab portion in order to pass the lab and become certified. Other CCIE tracks will change over the next year, with exact dates announced in advance.

    Effective February 17th, 2009, candidates will also see two other changes in CCIE written exams. First, candidates will now be required to answer each question before moving on to the next question; candidates will no longer be allowed to skip a question and come back to it at a later time. Second, there will be an update to the score report. The overall exam score and the exam passing score will now be reported as a scaled score, on a scale from 300-1000. This change will not affect the difficulty of the current set of exams and will assure CCIE written exams will be consistent with Cisco’s other career certification exams.

  5. matt clark says:

    i have a friend attempting the R & S lab just after the 1st Feb 2009 so it will be interesting to hear his comments on the “open-ended” questions.
    perhaps the proctor is kind and askes them as you are busy verfiying something or when you are itching to start at the beginning (after reading the lab through twice ;-) )
    Does anyone know the passing score to these questions?

  6. Zal Amin says:

    I’ve a rack that fits the blueprint 2.0 requirements. I’m hoping I can practice on that and then just get some rental time to familiarize myself with the ISR.

    Is that a good approach or is the ISR going to be way different from the individual components that are found in v2.0 ?

  7. Zal – you should be just fine.

  8. Zal Amin says:


    Thanks a lot for that reaffirmation.

  9. [...] Further Reading: CCIE Security Lab Expanded Blueprint [...]

  10. Sara says:


    This is a great help..really you dont know how much this means to me and i hope your updates continue..I look forward to reading your blog everyday.


  11. Marc La Porte says:


    Are there also plans to create an expanded blueprint for SP? It would be much appreciated ;-)


  12. [...] types/mitigation techniques which are present in the CCIE v3 blue-print  , which you can find HERE. The link will point to InternetworkExpert’s expanded Blueprint, which i feel is better than [...]

  13. [...] PDRTJS_settings_546374_post_65 = { "id" : "546374", "unique_id" : "wp-post-65", "title" : "CCIE+Security+Lab+Expanded+Blueprint+3.X", "item_id" : "_post_65", "permalink" : "http%3A%2F%2Fzecure.wordpress.com%2F2010%2F01%2F14%2Fccie-security-lab-expanded-blueprint-3-x%2F" } CCIE Security Lab Expanded Blueprint 3.X [...]

  14. [...] going to be doing from tomorrow is , i’m going to take each and every section  of the blueprint and i’m going to try and tear it apart ( as much as possible ). Instead of focusing on 1 [...]


Leave a Reply


CCIE Bloggers