300-730 SVPN

Current Status
Not Enrolled
Price
Get Started

Implementing Secure Solutions with Virtual Private Networks v1.1 (300-730)

Exam Description: Implementing Secure Solutions with Virtual Private Networks v1.1 (SVPN 300-730) is a 90-minute exam associated with the CCNP Security Certification. This exam certifies a candidate’s knowledge of implementing secure remote communications with virtual private network (VPN) solutions including secure communications, architectures, and troubleshooting. The course, Implementing Secure Solutions with Virtual Private Networks, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

  1. 15% Site-to-Site Virtual Private Networks on Routers and Firewalls
    1. Describe GETVPN
    2. Implement DMVPN
    3. Implement FlexVPN using local AAA
  2. 20% Remote Access VPNs
    1. Implement AnyConnect IKEv2 VPNs on ASA and routers
    2. Implement AnyConnect SSL VPN on ASA
    3. Implement Clientless SSL VPN on ASA
    4. Implement Flex VPN on routers
  3. 35% Troubleshooting Using ASDM and CLI
    1. Troubleshoot IPsec
    2. Troubleshoot DMVPN
    3. Troubleshoot FlexVPN
    4. Troubleshoot AnyConnect IKEv2 and SSL VPNs on ASA and routers
    5. Troubleshoot and Clientless SSL VPN on ASA
  4. 30% Secure Communications Architectures
    1. Identify functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions
    2. Identify functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions
    3. Identify VPN technology based on configuration output for site-to-site VPN solutions
    4. Identify VPN technology based on configuration output for remote access VPN solutions
    5. Identify split tunneling requirements for remote access VPN solutions
    6. Design site-to-site VPN solutions
      1. VPN technology considerations based on functional requirements
      2. High Availability Considerations
    7. Design remote access VPN solutions
      1. VPN technology considerations based on functional requirements
      2. High Availability Considerations
      3. Clientless SSL browser and client considerations and requirements
    8. Identify Elliptic Curve Cryptography (ECC) Algorithms