300-730-SVPN: Implementing Secure Solutions with Virtual Private Networks

300-730-SVPN: Implementing Secure Solutions with Virtual Private Networks

Implementing Secure Solutions with Virtual Private Networks v1.1 (SVPN 300-730) is a 90-minute exam associated with the CCNP Security Certification. This exam tests a candidate's knowledge of implementing secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting. The course, Implementing Secure Solutions with Virtual Private Networks, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.1 Describe GETVPN

1.2 Describe uses of DMVPN

1.3 Describe uses of FlexVPN

2.1 Implement AnyConnect IKEv2 VPNs on ASA and routers

2.2 Implement AnyConnect SSLVPN on ASA

2.3 Implement Clientless SSLVPN on ASA

2.4 Implement Flex VPN on routers

3.1 Troubleshoot IPsec

3.2 Troubleshoot DMVPN

3.3 Troubleshoot FlexVPN

3.4 Troubleshoot AnyConnect IKEv2 on ASA and routers

3.5 Troubleshoot SSL VPN and Clientless SSLVPN on ASA

4.1 Describe functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions

4.2 Describe functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions

4.3 Recognize VPN technology based on configuration output for site-to-site VPN solutions

4.4 Recognize VPN technology based on configuration output for remote access VPN solutions

4.5 Describe split tunneling requirements for remote access VPN solutions

4.6 Design site-to-site VPN solutions

4.6.a VPN technology considerations based on functional requirements

4.6.b High availability considerations 2019 Cisco Systems, Inc. This document is Cisco Public.

4.7 Design remote access VPN solutions

4.7.a VPN technology considerations based on functional requirements

4.7.b High availability considerations

4.7.c Clientless SSL browser and client considerations and requirements

4.8 Describe Elliptic Curve Cryptography (ECC) algorithms