CCIE Security Tutorial
CCIE Security Tutorial
TECCCIE-3001
TECCCIE-3001_c2
Cisco Public
Agenda
Section
Topic
10
11
12
Disclaimer
Not all the topics discussed today appear on
every exam
For time reasons, were unable to discuss every
feature and topic possible on the exam
Section 1
CCIE Program Overview
CCIEs Worldwide
Most highly respected IT certification for more than 15 years
Industryy standard for validating
g expert
p skills and experience
p
More than 20,000 CCIEs worldwideless than 3% of all
professionals certified by Cisco
Demonstrate strong commitment and investment
to networking career, life-long learning, and
dedication to remaining an active CCIE
Security
Voice
Introduced 2002
Introduced 2003
Storage Networking
Introduced 2004
1% of bookings
Labs in Brussels and RTP
Service Provider
Networks
Introduced 2002
6% of bookings
Labs in Brussels, Beijing,
Hong Kong, RTP, Sao
Paulo, Sydney
Wireless
Introduced 2009
Labs in Brussels and San
Jose
16,727
2,147
1,182
140
901
Multiple Certifications
Many CCIEs Have Gone on to Pass the Certification
Exams In Additional Tracks,
Tracks Becoming a Multiple
Multiple
CCIE. Below Are Selected Statistics on CCIEs Who
Are Certified in More Than One Track
*Updated 23-Feb-2009
1,974
739
496
35
316
http://www.cisco.com/web/learning/le3/ccie/certified_ccies/worldwide.html
Advisory Subject
Matter Experts
Technical Support
TAC Cases
Technical Bulletins, Best
Practices, Whitepapers
Feedback:
Input:
CCIE [Track]
Program
Manager
Enterprise Technical
Advisory Board
Focus Groups/Customer
Sessions
CCIE Field Surveys
Exam Objectives
and CCIE Written and
Lab Blueprints
Content
Advisory
Group
CCIE
Program
Team
Certification Process
CCIEs must pass two exams
The written qualification exam has
100 multiple-choice questions
The lab exam is what makes CCIE
different. The full-day, hands-on lab
exam tests the ability to configure
and troubleshoot equipment
Not all lab exams are offered at all
lab locations
Section 2
CCIE Security Overview
Voice
From 40% now to 69% in 5 years
Security
Growth
Security
From 46% dedicated now to 80%
in 5 years
Voice
Wireless
From 39% now to 66% in 5 years
2008 Worldwide Survey by Forrester Consulting on Behalf of Cisco
Wireless
Time
v2.0
v2.0
Answer is B
Answer is A
New v3.0
Beijing
Tokyo
Brussels
Hong Kong
San Jose
Sydney
Dubai
Bangalore
New v3.0
New v3.0
New v3.0
Context 2
BB1
BB2
ACS
ASA Multi-Context
with Failover
vs0
vs1
BB3
FR
PPP
TEST PC
CCIE Lab
Remote Location
Remote GW
Router
Rack
CommSrv
Central GW
Router
Cisco
Intranet
CCIE
BB
Candidate PC
BB1
BB2
NIC1
NIC2
ACS
TEST PC
Remote Desktop Enabled on NIC1
Summary
Topics Covered in the Exam:
1. Firewalls (ASA and IOSFW)
2 VPNs
2.
3. Intrusion protection
4. Identity authentication
5. Router plane protection
6. Advanced IOS security technologies
7. Mitigation techniques to respond to network attacks
Section 3
Core Knowledge Section Overview
Header 1
Header
SA
2 Header
Initiator
Responder
MSG 1:
MSG 2:
MSG 3:
Initiator Diffie Helman key and nounce (key value is usually a number of 1024
bit length)
l
th)
MSG 4:
MSG 5:
MSG 6:
Hacker
Protocol: TCP
Port Destination: 21
String:CWD~root
Dest Port: 21
first Segment TCP
Dest Port: 21
sec Segment TCP
Yyy~ryyy
Dest: 21
last Segment TCP
yyyootzzz
xxxCWDyyy
Target
FTP
server
@IP
10.0.0.1
Section 4
Implement Secure Networks Using
Cisco ASA Firewalls
Exam Objectives
FirewallDefined
A firewall is a security device which is configured to
permit, deny or proxy data connections set by the
organization's
i ti ' security
it policy.
li
Fi
Firewalls
ll can either
ith b
be
hardware or software based
A firewall's basic task is to control traffic between computer
networks with different zones of trust
Todays firewalls combine multilayer stateful packet
inspection and multiprotocol application inspection
Virtual Private Network (VPN) services and Intrusion
Prevention Services (IPS) have been combined with the
firewall inspection engine(s)
Despite these enhancements, the primary role of the firewall
is to enforce security policy
Source: Wikipedia (www.wikipedia.com)
Transparent Mode
Is where the firewall acts as a bridge functioning mostly at Layer2, that
acts like a "bump in the wire," or a "stealth firewall," and is not seen as a
p to connected devices
router hop
Single Mode
Is the regular basic firewall
Multi-context Mode
Involves the use of virtual firewalls (security contexts)
VLAN Interface
Virtual LANs (VLANs) are used to create separate
broadcast domains within a single switched network
You can configure multiple logical interfaces on a single
physical interface and assign each logical interface to a
specific VLAN
ASA supports 802.1q, allowing it to send and receive
traffic for multiple VLANs on a single interface
Routing Protocols
ASA supports RIP, OSPF and EIGRP routing protocols
Practice clear text and MD5 authentication
Practice route filtering and summarization for protocols
Running multiple routing protocols concurrently on the
same Firewall is now supported
Routing protocol in multi-context mode is not
supported use static routes instead
supported,
Address Translation
Subject to NAT-Control
Dynamic translations are built using:
Network Address Translation (NAT)
(one-to-one mapping)
or
Port Address Translation (PAT)
(many-to-one mapping)
Policy NAT
Policy NAT lets you identify local traffic for address
translation by specifying the source and destination
addresses (or ports) in an access list
Regular NAT uses source addresses/ports only,
whereas policy NAT uses both source and destination
addresses/ports
With policy NAT, you can create multiple static
statements that identify the same local address as long
as the source/port and destination/port combination is
unique for each statement
Use an access list with the static command to enable
policy NAT
Object Grouping
Used for simplifying complex access control policies.
Object grouping provides a way to reduce the number
of access rule entries required to describe complex
security policies
Following types of objects:
Protocolgroup of IP protocols. It can be one of the following
keywords; icmp, ip, tcp, or udp, or an integer in the range 1 to
254 representing an IP protocol number. To match any Internet
protocol including ICMP,
protocol,
ICMP TCP,
TCP and UDP,
UDP use the keyword ip
ip.
Servicegroup of TCP or UDP port numbers assigned to
different services
icmp-typegroup of ICMP message types to which you
permit or deny access
Networkgroup of hosts or subnets
AAA
Source/Destination NAT
Object
j
Grouping
p g
VLAN
DHCP
RIP
PPPoE
OSPF
URL Filtering
EIGRP
IDS
Syslog
SSH
Failover
SNMP
TCP Intercept
NTP
Java Filtering
Packet Capture
ActiveX Filtering
Packet Tracer
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. No NAT-Control
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. No NAT-Control
Virtual Firewall
Virtualization provides a way to create multiple
firewalls in the same physical chassis
Virtual Firewallwhen a single Firewall device
can support multiple contexts
A context defines connected networks and the
policies that the Firewall enforces
Virtual Firewall
contexts
A
Admin
(mandatory)
C
System context:
Physical ports assigned
Virtual Firewall:
Multiple Security Context
Configuration
Changing single mode to Multiple Mode:
mode {single | multiple}
T allocate
To
ll
t physical/VLAN
h i l/VLAN interfaces
i t f
to
t the
th contexts
t t
context {context name}
allocate-interface Ethernet0
allocate-interface Ethernet1
Virtual Firewall:
Multiple Security Context
Sample Configuration: System Context
hostname ASA
enable password cisco
no mac-address auto
!
interface Ethernet0/0
speed auto
duplex auto
!
interface Ethernet0/0.30
vlan 30
!
interface Ethernet0/0.40
vlan 40
!
interface Ethernet0/1
speed auto
duplex auto
!
interface Ethernet0/2
speed auto
duplex auto
!
admin-context admin
!
context admin
allocate-interface Ethernet0/0
config-url flash:/admin.cfg
!
context custA
allocate-interface Ethernet0/0.30
allocate-interface Ethernet0/1
config-url flash:custA.cfg
!
context custB
allocate-interface Ethernet0/0.40
allocate-interface Ethernet0/2
config-url flash:custB.cfg
System Context
The context is not operational until the
config-url command has been entered.
Virtual Firewall:
Multiple Security Context
Inside a Context
Context CustA
ASA# changeto context custA
ASA/
ASA/custA#
tA# show
h
run
<..>
hostname custA
enable password cisco
!
interface Ethernet0/0.30
nameif outside
security-level 0
ip address 172.16.30.1 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ASA/custA# changeto system
ASA#
Context CustB
ASA/custA# changeto context custB
ASA/
ASA/custB#
tB# show
h
run
<..>
hostname custB
enable password cisco
!
interface Ethernet0/0.40
nameif outside
security-level 0
ip address 172.16.40.1 255.255.255.0
!
interface Ethernet0/2
nameif inside
security-level 100
ip address 192.168.2.1 255.255.255.0
!
ASA/custB# changeto system
ASA#
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. No NAT-Control
Transparent Firewall
Backbone
Router
10.1.1.2
Vlan 20
10.1.1.2
224.0.0.x
OK if ACL
permits
Vlan 30
10.1.1.3
Router
Transparent Firewall
Sample Configuration
ciscoasa# show firewall
Firewall mode: Router
ciscoasa(config)# firewall transparent
Switched to transparent mode
ciscoasa(config)# ip address 10.1.1.254 255.255.255.0
ciscoasa(config)# interface Ethernet0
ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# security-level 0
ciscoasa(config-if)# no shut
ciscoasa(config)# interface Ethernet1
ciscoasa(config-if)# nameif inside
ciscoasa(config-if)# security-level 100
ciscoasa(config-if)# no shutdown
ciscoasa(config)# access-list 101 permit icmp any any
ciscoasa(config)# access-group 101 in interface outside
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. No NAT-Control
interface Redundant1
member-interface GigabitEthernet0/1
member-interface GigabitEthernet0/2
no nameif
no security-level
no ip address
!
interface Redundant1.4
vlan 4
nameif inside
security-level 100
ip address 172.16.10.1 255.255.255.0
!
interface Redundant1.10
vlan 10
nameif outside
security-level 0
ip address 172.16.50.10 255.255.255.0
Stateful
LAN FO
Active
Unit
Standby
Unit
Firewall HAActive/Standby FO
Supported on all ASA models
ASA only supports
LAN Based failover (no
serial cable).
Both platforms must be
identical in software,
licensing, memory and
interfaces
Not recommended to share
the state and failover link, use
a dedicated link for each
Preferably these cables will
be connected into the same
switch with no hosts
Not recommended to use a
direct connection between
firewalls (i.e. straight through
or X-over)
Internet
ISP-A
.1
Logical1-A
.4
Logical2-S
.1
ISP-B
.2
Logical1-S
.4
.3
Logical2-A
.2
.3
Inside
Network
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. No NAT-Control
Rules
Inside
Outside
Rules
Rules about
HTTP Rules about
FTP
Advanced FeaturesImportant
1. Virtual Firewall (Security Contexts)
2 Transparent Firewall
2.
3. Firewall High Availability (HA)
4. Modular Policy Framework (MPF)
5. Application Firewall
6. NAT-Control
NAT Control
The security appliance has always been a device
supporting, even requiring Network Address Translation
(NAT) for
f maximum
i
flexibility
fl ibilit and
d security.
it
Introduced in v7.0 is NAT as an option. Specifying NATCONTROL specifies the requirement to use NAT for outside
communications
To enable NAT control, use the nat-control command in
global configuration mode
To disable NAT control, which allows inside hosts to
communicate with outside networks without configuring a
NAT rule, use the command, no nat-control in global
configuration mode
By default, NAT control is disabled
NAT Control
Syntax
nat-control
Configuration
The nat-control statement is valid in routed firewall
mode and in single and multiple security context mode.
No new NAT functionality is provided with this feature.
All existing NAT functionality remains the same.
NAT Control
Consider NAT-CONTROL (v6.3 behavior)
All traffic leaving a firewall from a higher to lower security
interface requires a NAT/GLOBAL pair
All traffic entering a firewall from a lower to higher security
requires a STATIC/ACCESS-LIST pair
All other traffic is dropped
Troubleshooting Firewall
Recv
Pkt
Ingress
Interface
3
Existing No
Conn
Y
Yes
ACL
Permit
Match
xlate
Yes
Receive Packet
Ingress Interface
Existing Connection?
y Inbound ACL
Permit by
on Interface?
5. Match Translation Rule
(NAT, Static)
6. NAT Embedded IP and
Perform Security Checks/
Randomize Sequence Number
7. NAT IP Header
8. Pass Packet to Outgoing
Interface
9. Layer 3 Route Lookup?
10. Layer 2 Next Hop?
11. Transmit Packet
No
Yes
5
1.
2.
3.
4.
D
Drop
No
Drop
L7 NAT No
Sec
Checks
Drop
NAT IP
Header
Egress
Egress
Interface
Interface
Yes 10 L2
L3
Route
Addr
No
Drop
No
Drop
Yes 11 Xmit
Pkt
First Mattch
1.
2.
3.
4.
b.
b.
ii.
iii.
Syslog
Three different syslog destinations:
TrapSyslog
Trap
Syslog server
ConsoleSerial console port
MonitorTelnet sessions
Alert
Event Messages
Emergencies
Alerts
Critical
Denied packets/connections
Errors
Warnings
Notifications
Informational
Debugging
Show Traffic
The Show Traffic Command Displays the Traffic
Received and Transmitted out Each Interface of the ASA
fw# show traffic
outside:
received (in 124.650 secs):
295468 packets 167218253 bytes
2370 pkts/sec
1341502 bytes/sec
transmitted (in 124.650 secs):
260901 packets 120467981 bytes
2093 pkts/sec
966449 bytes/sec
<..>
inside:
received (in 124.650 secs):
261478 packets 120145678 bytes
2097 pkts/sec
963864 bytes/sec
transmitted (in 124.650 secs):
294649 packets 167380042 bytes
2363 pkts/sec
1342800 bytes/sec
Show Local-Host
A local-host entry is created for any source IP on a higher security
level interface
It groups the xlates, connections, and AAA information together
Very useful for seeing the connections terminating on servers
fw# show local-host
Interface inside: 1131 active, 2042 maximum active, 0 denied
local host: <10.1.1.9>,
TCP connection count/limit = 1/unlimited
TCP embryonic count = 0
TCP intercept watermark = 50
UDP connection count/limit = 0/unlimited
AAA:
user 'cisco' at 10.1.1.9, authenticated (idle for 00:00:10)
absolute
timeout: 0:05:00
inactivity timeout: 0:00:00
Xlate(s):
Global 172.18.124.69 Local 10.1.1.9
Conn(s):
TCP out 198.133.219.25:80 in 10.1.1.9:11055 idle 0:00:10 Bytes 127 flags UIO
Idle Time,
Bytes
Transferred
Connection
Flags
TCP out 198.133.219.25:23 in 10.9.9.3:11068 idle 0:00:06 Bytes 127 flags UIO
UDP out 172.18.124.1:123 in 10.1.1.9:123 idle 0:00:13 flags
detail Adds
Interface Names
fw# show conn detail
2 in use, 64511 most used
Flags: A
B
E
G
i
k
P
R
s
Inbound Connection
FW Flags
saA
A
U
UI
UIO
Uf
UfFR
UfFRr
SYN
SYN+ACK
ACK
Inbound Data
Outbound Data
FIN
FIN+ACK
ACK
Inside
TCP Flags
SYN
SYN+ACK
ACK
Inbound Data
Outbound Data
FIN
FIN+ACK
ACK
Outside
Client
Inside
Server
FW Flags
saAB
aB
UB
UIB
UIOB
UBF
UBfFr
UBfFRr
Outside
Server
Client
Packet Capture
capture <capture-name> [access-list <acl-name>] [buffer <buf-size>]
[ethernet-type <type>] [interface <if-name>] [packet-length <bytes>]
Capture Out
Inside
Outside
Packet Tracer
packet-tracer input [src-interface] [protocol] [SrcAddr] [SrcPort]
[DstAddr] [DstPort] detailed
Packet-tracer
Packet tracer command was introduced in v7
v7.2
2
In addition to capturing packets, you can trace the
lifespan of a packet through the security appliance to
see whether the packet is operating correctly. This tool
lets you do the following:
Debug all packet drops in a production network.
V if the
Verify
th configuration
fi
ti iis working
ki as iintended.
t d d
Show all rules applicable to a packet, along with the CLI
commands that caused the rule addition.
Show a time line of packet changes in a data path.
Inject tracer packets into the data path.
Section 5
Implement Secure Networks Using Cisco IOS Firewalls
Exam Objectives
Configure CBAC
Configure Audit
Configure PAM
Advanced
Firewall
Stateful filtering
Application inspection (Layer 3 through Layer 7)
Application controlApplication Layer Gateway (ALG)
engines with wide range of protocols and applications
Built-in DoS protection capabilities
y
with Virtualization ((VRFs),
)
Supports deployments
transparent mode and stateful failover
IPv6 support
http://www.cisco.com/go/iosfw
DMZ Zone
DMZ
Public-DMZ
Policy
Public Zone
Internet
Trusted
Private Zone
Private-Public
Policy
Untrusted
CBAC Overview
Cisco router performs traffic filtering, traffic inspection,
sends alerts, and tracks audit trails
Traffic filtering
Protocol filtering based on application-layer session information.
Filters packets originating in sessions from either the protected
or non-protected networks, but only forwards traffic originating
from protected network
Traffic inspection
p
Inspects packets at a firewall interface and manages state
information of TCP/UDP sessions. State information is used to
create temporary openings in access lists to permit return traffic.
Inspection helps prevent DoS attacks
Internet
interface Serial0
description outside
ip inspect MYFW out
CBAC
s0
ACL
101 Inspect
Secured
Network
e0
Wireless
Fa 0/0
Internet
VLAN 1
192.168.1.2
Transparent
Firewall
URL Filtering
Internet Usage Control
Control employee access to entertainment sites during
work hours
Control downloads of objectionable or offensive material,
limit liabilities
Cisco IOS supports static whitelist and blacklist URL filtering
External filtering servers such as Websense, Smartfilter can
be used at the corporate office, with Cisco IOS static lists
p
as backup
Internet
Branch
Office
Web
Surfing
Get www.cisco.com
Allowed
Black/white lists
Third-party filter server
N2H2
Websense
SmartFilter
Section 6
Implement Secure Networks Using
Cisco VPN Solutions
Exam Objectives
Configure IPsec LAN-to-LAN (IOS/ASA)
Configure SSL VPN (IOS/ASA)
Configure Dynamic Multipoint VPN (DMVPN)
Configure Group Encrypted Transport (GET) VPN
Configure Easy VPN (IOS/ASA)
Configure CA (PKI)
Configure Remote Access VPN
Configure Cisco Unity Client
Configure Clientless WebVPN
Configure AnyConnect VPN
Configure XAuth, Split-Tunnel, RRI, NAT-T
Configure High Availability
Configure QoS for VPN
Configure GRE, mGRE
Configure L2TP
Configure advanced Cisco VPN features
Part 1:
IPSec
Network Security
Data Security Assurance Model (CIA)
Confidentiality
Integrity
Authentication
Benefit
Benefit
Benefit
Ensures data
is unaltered
during transit
Ensures identity
of originator or
recipient of data
Shuns
Shuns
Alteration
Impersonation
Replay
Replay
Shuns
Sniffing
Replay
What Is IPsec?
Internet Protocol Security
A set of security protocols and algorithms used to
secure IP data at the network layer
IPsec provides data confidentiality (encryption),
integrity (hash), authentication (signature/certificates)
of IP packets while maintaining the ability to route them
through existing IP networks
Deployment Scenarios:
Basic Peer-to-Peer Topology
R2
IPsec
3.1.0.0/24
2.0.0.1/30
3.2.0.0/24
2.0.0.2/30
R2
IPsec
3.1.0.0/24
2.0.0.1/30
3.2.0.0/24
2.0.0.2/30
R2
IPsec
3.1.0.0/24
2.0.0.1/30
3.2.0.0/24
2.0.0.2/30
Site_A
ISP
set transform-set
match address 101
crypto map vpn 20 IPSec-isakmp
Site B
Site_B
Need to VPN p
peer, crypto
yp
ACL, IPsec transform-set
Split Tunneling
Definition: Split Tunneling Is the Ability of a Device to
Forward Clear and Encrypted Traffic at the Same Time
over the
th Same
S
I t f
Interface
In site-to-site VPN, use routing and crypto ACL to control
split tunneling
Without Split Tunneling
http://www.cisco.com/
http://www.cisco.com/
Central Site
VPN Head-End
Central Site
VPN
VPN Head-End
VPN
Filtering/Access Control
When filtering at the edge theres not much to see
IKE
UDP port 500
ESP, AH
IP protocol numbers 50, 51 respectively
NAT transparency-enabled
UDP port 4500
High Availability
Common High Availability (HA) practice in conjunction
with IPsec HA features
Design options
Local HA using link resiliency
Local HA using HSRP and RRI
Cisco IOS IPsec Stateful Failover
Geographical HA using IPsec backup peers
Local/geographical HA using GRE over IPsec
(dynamic routing)
ISPs
SA Established to Primary
Sending IKE Keepalives
R
Remote
t
P
Internet
Head-End
10.1.1.0/24
(6) New SA Established to Secondary
Sending IKE Keepalives
Internet
I t
Internal
l
Network
N t
Net
Gateway
HA-2
Branch
B
h
Office
Corporate
Network
ISPs
200.1.5.1
Local/Geographical HA Using
GRE over IPsec: Dynamic Routing
San Jose
s1
Corporate
Network
Branch
Internet
h1
h2
s2
New York
Geographical HA
Primary Tunnel
Secondary Tunnel
Local HA with Redundant Hub Design
Troubleshooting IPsec
Troubleshooting IPsec
Determine the Problem Characteristics
Is the problem in connection establishment?
Phase 1 failure
Transaction Mode/XAUTH
Phase 2 failure
Debug Commands
debug crypto isakmp
Important
Debugs
spoke traffic
Design options:
Cisco IOS: uses crypto ACL summarization for smaller scale
deployment; uses GRE over IPsec with dynamic routing protocol
for larger scale deployment
ASA use summarized network lists for small scale deployment
Data
IPsec Tunnel
GRE Tunnel
IP GRE
HDR HDR
IP Data
HDR
IP
HDR
ESP
HDR
IP
HDR
GRE
HDR
IP
HDR
IP
Data
HDR
Encrypted
Data
Decapsulate
Twice
192.168.100.0/30
.1
.2
Tunnel0
.1
192
2.168.2.0/24
192
2.168.1.0/24
.1
172.16.171.20
Backbone
Router1
10.1.1.0/24
Router2
10.1.2.0/24
authentication pre-shared
authentication pre-shared
hash sha
hash sha
group 5
crypto isakmp key cisco address
172.16.171.20 netmask 255.255.255.255
group 5
crypto isakmp key cisco address
172.16.172.10 netmask 255.255.255.255
172.16.171.20
Backbone
Router1
10.1.1.0/24
Router2
10.1.2.0/24
172.16.171.20
Backbone
Router1
10.1.1.0/24
interface Tunnel0
ip address 10.10.10.1 255.255.255.0
tunnel mode ipsec ipv4
tunnel source 172.16.172.10
tunnel destination 172.16.171.20
tunnel protection ipsec profile VTI
Router2
10.1.2.0/24
interface Tunnel0
ip address 11.11.11.1
11 11 11 1 255
255.255.255.0
255 255 0
tunnel mode ipsec ipv4
tunnel source 172.16.172.20
tunnel destination 172.16.171.10
tunnel protection ipsec profile VTI
Description
Virtual Template Is a Generic Infrastructure Which
Provides Template for Configuration
Virtual Template
Cloning
Local
Auth.
auth
1
2
ISDN
DSL
Single User
Client
Virtual
Template
Interface
Physical
Interface
4
4
Router
Virtual
Access
Interface
AAA
2
ISDN
DSL
Physical
Interface
Router
4
4
Single User
Client
Virtual
Template
T
l t
Interface
Virtual
Access
Interface
Head-end configuration
Old way: easy VPN server with dynamic crypto map
New way: IPsec virtual interface
Part 2:
Dynamic Multipoint VPN (DMVPN)
10.1.0.0 255.255.255.0
10.1.0.1
Static
Public IP
Address
130.25.13.1
Dynamic
(or Static)
Public IP
Addresses
10.1.3.1
10.1.3.0 255.255.255.0
Spoke
10.1.1.1
10.1.1.0 255.255.255.0
10.1.2.1
10.1.2.0 255.255.255.0
DMVPN Advantages
Supports IP Unicast, IP Multicast, and dynamic
routing protocols
Supports spoke routers behind dynamic NAT
and hub routers behind static NAT
Dynamic partial-mesh or full-mesh VPNs
Usable with or without IPsec encryption
DMVPN Components
Next Hop Resolution Protocol (NHRP)
NHRP Registration
NHRP Resolution and Redirect
Routing
Dynamic advertisement of branch networks; almost all routing
protocols (EIGRP, RIP, OSPF, BGP, ODR) are supported
Network Designs
Hub-and-spoke Design
Spoke-to-spoke traffic via hub
Spokes configured with pt-to-pt GRE tunnels
Dual DMVPN Clouds
Hub-and-Spoke
Spoke-to-spoke Design
Spoke to spoke data traffic over dynamic tunnels
Spoke-to-Spoke
Network Designs
Spoke-to-hub tunnels
Spoke-to-spoke path
Spoke-to-spoke (Phase 2)
Hierarchical (Phase 3)
Phase 2
Phase 3
Spoke to spoke
functionality 12.3(4)T
Architecture and
scaling 12.4(6)T
Single mGRE
interface in spokes
Support dynamically
address CPE
Increase number of
hub with same hub
and spoke ratio
Cannot summarize
spoke routes on hub
Route on spoke must
have IP next hop of
remote spoke
Troubleshooting DMVPN
No hub daisy-chain
Spokes dont
don t need full
routing table
OSPF routing protocol
not limited to 2 hubs
Cannot mix phase 2
and phase 3 in same
DMVPN cloud
Debug
debug dmvpn [ { error | event | detail | packet | all }
{ nhrp
h | crypto
t | tunnel
t
l | socket
k t | allll } ]
debug dmvpn condition [ peer
{{{ nbma | tunnel } ip_address } | { network ip_address mask } |
{ interface tunnel# } | { vrf vrf_name }}]
Logging
logging dmvpn { <cr> | rate-limit < 0-3600 > }
Hub-1
192.100.1.0
Tu1: 172.20.1.100
3.3.3.3
1.1.1.1
2.2.2.2
Tu1: 172.20.1.2
Tu1: 172.20.1.1
192.1.1.0
Spoke-1
HUB-1#show dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
Tunnel1, Type:Hub, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- ----1
1.1.1.1
172.20.1.1
UP 00:04:32 D
1
2.2.2.2
172.20.1.2
UP 00:01:25 D
SPOKE-1#show dmvpn
p
Legend: Attrb --> S - Static, D - Dynamic, I - Incompletea
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
Tunnel1, Type:Spoke, NHRP Peers:1,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- ----1
3.3.3.3
172.20.1.100
UP 00:21:56 S
192.2.2.0
Spoke-2
Hub-1
192.100.1.0
Tu1: 172.20.1.100
3.3.3.3
1.1.1.1
2.2.2.2
Tu1: 172.20.1.2
Tu1: 172.20.1.1
192.1.1.0
Spoke-1
192.2.2.0
Spoke-2
Hub-1
192.100.1.0
Tu1: 172.20.1.100
3.3.3.3
1.1.1.1
2.2.2.2
Tu1: 172.20.1.2
Tu1: 172.20.1.1
192.1.1.0
Spoke-1
192.2.2.0
Spoke-2
Hub-1
192.100.1.0
Tu1: 172.20.1.100
3.3.3.3
1.1.1.1
2.2.2.2
Tu1: 172.20.1.2
Tu1: 172.20.1.1
192.1.1.0
Spoke-1
192.2.2.0
Spoke-2
Part 3:
Group Encrypted Transport (GET) VPN
Any-to-Any
Any-to-Any
Connectivity
Connectivity
Transport agnosticprivate
LAN/WAN, FR/AATM, IP, MPLS
Cisco GET
VPN
Scalable
Real Time
M lti
Multicast
t traffic
t ffi encryption
ti through
th
h E
Encryption
ti
supported
t d for
f Native
N ti Multicast
M lti
t and
d
IPsec tunnels:
Unicast traffic with GDOI
Not scalable
Allows higher scalability
Difficult to troubleshoot
Simplifies Troubleshooting
Extensible standards-based framework
Overlay VPN Network
Overlay Routing
Sub-optimal Multicast
replication
li ti
Lack of Advanced QoS
No Overlay
Leverages Core network for Multicast
replication via IP Header preservation
Optimal
O ti l Routing
R ti iintroduced
t d
d iin VPN
Advanced QoS for encrypted traffic
GET VPN
Overview
Key Server
Routing Member
Forwarding
Replication
Routing
Group
Member
Routing
Members
Group
Member
Group Member
Encryption Devices
Route Between Secure / Unsecure
Regions
Multicast Participation
Group
Member
Group
Member
Group Policy
Proprietary: KS
Cooperative Protocol
Group
Member
Routing
Members
Group
Member
Group
Member
RFC3547:
Group Domain of
Interpretation
(GDOI)
Group
Member
Group Keys
Key Encryption Key (KEK)
Used to encrypt GDOI (i.e. control
traffic) between KS and GM
Key Server
KEK
TEK1
IP VPN
Group Member
Group Member
Group Member
GET VPN
Data Plane
IP Packet
Group
E
Encrypted
t d
Transport
IP Header
Copy of Original
IP Header
IP Payload
ESP
S
IP Header
IP Payload
Data Protection
Secure
Multicast
?
GM
GM
GM
Data Protection
Secure
Multicast
KS
GM
GM
GM
GM
Data Protection
Secure
Multicast
KS
GM
GM
GM
GM
Corollary:
Secure Data Plane Unicast
Data Protection
Secure
Unicast
?
GM
?
?
GM
GM
GM
Corollary:
Secure Data Plane Unicast
Premise: Receiver advertises
destination prefix but does
not know the potential
encryption sources
Data Protection
Secure
Unicast
KS
Receiver assumes
that legitimate
group members
GM
obtain Traffic Encryption
Key from key server
for the group
GM
GM
GM
Corollary:
Secure Data Plane Unicast
Premise: Receiver advertises
destination prefix but does
not know the potential
encryption sources
Receiver assumes
that legitimate
group members
GM
obtain Traffic Encryption
Key from key server
for the group
Receiver can authenticate
the group membership
Data Protection
Secure
Unicast
KS
GM
GM
GM
GET VPN
Control Plane GM-KS
Unknown
Reboot
Initialize
Initialize
Reset
Mis-configured
Cleared
Fail-Closed
Blocking/Dropping
Fail-Closed
Expired,
Retry
Fail-Open
Fail-Open
Authentication
Fail-Open
Registration
Fail-Closed
Registration
Forwarding
Registration
Expiring
TEK
Authenticating
Group Member
Authorization
Authorization
Group Member
Forwarding/Encrypting
Retry
Authentication
Rekey
Receiving Rekeys
GDOI Protocol
Registration
RFC3547 Definitions
IKE Phase 1
Group Member
GROUP-ID
GROUPKEY-PULL (a.k.a
Registration)
Key Server
Policy / Key
SA-Policy
Protection
IKE SA
Acknowledge
Key
Lifetime
p Member Acknowledges
g
Group
and asks for Keys
Key Server Supplies Keys
GROUPKEY-PUSH
(a.k.a Rekey)
Key Server refreshes Keys
and/or Policy
Rekey
y
Protection
REKEY SA
Rekey
Key
Lifetime
X
Rekey
Registration
IKE Phase 1
Protection
IKE SA
GROUP-ID
Group Member
Secured Group Member Interface
interface Serial0/0
ip address 192.168.1.14 255.255.255.252
crypto map svn
access-group fail-closed out
F il l
Fail-closed
d Policy
P li
ip access-list extended fail-closed
permit esp any any
permit ip host 192.168.1.14 host 192.168.1.13
permit tcp host 192.168.1.14 eq ssh any
<<<<-
GROUP ENCRYPTION
MEMBERS GROUP IDENTITY
KS ADDRESS TO REGISTER
ALTERNATE KS REGISTRATION
Unknown
Mis-configured
Cleared
Initialize
Reset
Secondary
Receiving Policies and Keys via
Primary Announcements
Evaluate
Serving Registration
Election
Announcement of new GM
Primary
Creating Policies and Keys
Service Registration
Announcing Policies and Keys
Rekey
Announcement of GM database
Secondary
Evaluate &
Announce
Primary
Yield &
Demote
Reset
Key Server
<<<<<<<<<<<-
GROUP ID
KEY SERVER
REKEY ADDRESSES REKEY
REKEY RETRANSMITS
KS MSG AUTHENTICATION
GROUP MEMBER AUTHORIZATION
SECURITY ASSOCIATION
CRYPTO ATTRIBUTES SELECTION
ENCRYPTION POLICY LAN-to-LAN
NO ANTI-REPLAY
KS ADDRESS
G
Group
Member
M b Authorization
A th i ti List
Li t (optional)
( ti
l)
ip access-list extended member-list
permit <ks_peer_address>
permit <gm_address>
Part 4:
Easy VPN
ENCRYPTION POLICY
<- ALLOW GDOI
<- UNICAST
<- MULTICAST
Central Site
Internet
Software Client:
Cisco VPN Client on
PC/MAC/Unix
Mobile Users
1. Cisco Easy VPN Unity Framework: Remote/branch device can be Cisco IOS
router, ASA or PC/Mac/Unix computer running VPN Client software
2. Call Home/Authentication: Remote device contacts central-site router/concentrator,
and provides authentication credentials
3. Centralized Policy Push: Central-site checks credentials and pushes configuration
securely to the remote device
4. VPN is established
Network extension
Remote subnet IP addresses are fully routable and reachable by the
server side network over the tunnel
172.19.168.0/24
Internet
10.10.10.0/24
Cisco Easy
VPN Server
172.19.168.9
10.10.10.0/24
Dynamic IPsec
interface is
required
Part 5:
SSL VPN
HTTPSTCP/443
HTTPTCP/80
If HTTP redirection desired
Manual
MSI installer
Cisco AnyConnect
VPN client
Approximate size
~10 MB
~1.2 MB
Initial install
distribute
yes
auto download
distribute
yes
initial install only
IP
IPsec
DTLS TLS
DTLS,
ASA/PIX/IOS
ASA/IOS
yes
no
Part 6:
Public Key Infrastructure (PKI)IOS
CA Server
Why PKI?
Need a method to authenticate IKE
Wildcard preshared keys are scalable but are not
secure
Pair-wise preshared keys are more secure but is not
scalable
PKI is both secure and scalable
Core Concepts
Core Concepts
Core Concepts
Digital Signatures
Building Block 2How Signatures Are Built
One-way function; easy to produce
hash from message, impossible
to produce message from hash
Hash
Function
Alice
Hash of Message
s74hr7sh7040236fw
7sr7ewq7ytoj56o457
Core Concepts
Message
1. Hash the
message
Signature
1. Decrypt the signature
using the public key
2. Decrypted signature
should contain the
hash of the message
If Hashes
Are Equal
Signature
Is Verified
Digital Certificate
Core Concepts
Certificate Authorities
Core Concepts
PKI/CA Enrollment
Core Concepts
Section 7
Configure Cisco IPS to Mitigate
Network Threats
Exam Objectives
Configure IPS 4200 Series Sensor Appliance
Initialize the Sensor Appliance
Configure Sensor Appliance management
Configure virtual Sensors on the Sensor Appliance
Configure security policies
Configure promiscuous and inline monitoring on the Sensor Appliance
Configure and tune signatures on the Sensor Appliance
Configure custom signatures on the Sensor Appliance
Configure blocking on the Sensor Appliance
Configure TCP resets on the Sensor Appliance
Configure rate limiting on the Sensor Appliance
Configure signature engines on the Sensor Appliance
Use IDM to configure the Sensor Appliance
Configure event action on the Sensor Appliance
Configure event monitoring on the Sensor Appliance
Configure advanced features on the Sensor Appliance
Configure and tune Cisco IOS IPS
Configure SPAN & RSPAN on Cisco switches
IPS Terminology:
The Marketing of IPS/IDS
IDS Intrusion Detection SystemTypically limited to
promiscuous sensors (out of packet stream)
IPS Intrusion Prevention/Protection SystemThe term
most commonly applied to a sensor that sits inline (in
the packet stream) and can drop malicious packets,
flows or attackers
IDP Intrusion Detection and PreventionMarketing
term coined by a vendor for product differentiation
IPS Components
Network-based sensors
Specialized software and/or hardware used to collect and
analyze network traffic (either in IPS or IDS mode: inline or
promiscuous)
Appliances, modules, embedded in network infrastructure (either
inline or promiscuous)
Network IDS: Appliances, modules, embedded
Host IDS: Server-specific agent
Promiscuous Interface
No IP Address
Data Capture using
SPAN, TAP, VACL
capture, etc
Client-Server on Same
Layer 2 VLAN
e.g. VLAN 10
Data Flow
Client
Server
Data Flow
Client
Data Flow
Same Layer 3 Segment
Server
Management
IPS Device Manager (IDM)
Web-based Java GUI, providing management of a
single device
Two L2 devices
((Trunk 802.1q)
q)
Two L3 devices
VLAN X
Trunk
Trunk
VLAN Y
VLAN 10
VLAN 20
Switchport
VLAN
R1 Ethernet0/0
Fa0/1
10
IPS Gig2/0
Fa0/10
10
R2 Ethernet0/0
Fa0/2
20
IPS Gig2/1
Fa0/20
20
VLAN 20
R2
Signature structure
Atomictrigger contained in a single packet
Compositetrigger contained in a series of
multiple packets
Signature Tuning
Sensors are shipped with default signature configuration
Signature specific:
Ports, protocols, services, analysis length, etc.
Filtering: what networks to alarm on
Custom Signatures
Virtualization
IPS 6.0 and 6.1 Allows the Creation of Multiple
Virtual Sensors
Each physical sensor can have a maximum of four
Vi t l Sensors
Virtual
S
configured,
fi
d with
ith the
th exception
ti off the
th
IPS-4215, which does not support virtualization at all.
Each virtual sensor can have its own:
Interfaces/Pairs
Signature Definition Policy
Event Action Rule Policy (filters and overrides)
Anomaly Detection Policy
Anomaly Detection Operational Mode
TCP Session Tracking Mode
Anomaly Detection
IPS 6.x learns normal network behavior, and alerts
when abnormal behavior appears to be caused by
a network worm
Anomaly Detection detects the following situations:
When the network starts on the path of becoming congested
by worm traffic
When a single worm-infected source enters the network and
starts scanning
g for other vulnerable hosts
Atomic IPv6
Flood Host
Flood Net
Meta
Normalizer*
Service DNS
Service FTP
Service Generic
Service H225
Service HTTP
Service Ident
* Inline Only
Service MSSQL
Service NTP
Service RPC
Service SMB
Service SMB
Advanced
Service SNMP
Service SSH
String ICMP
String TCP
String UDP
Sweep
Sweep other TCP
Traffic Anomaly
Reconnaissance Activities
Additional Reconnaissance Activities
Watches for Changes in Host Behavior
Trojan Bo2k
Trojan Tfn2k
Trojan UDP
Produce Alert
Provide an Alert
IPS D
Does N
Nott T
Transmit
it Thi
This P
Packet,
k t or A
Any Oth
Other
Packet From Attacker to Any Host
Request Rate-Limit
Stop attacks
before they fill
up the WAN
Internet
Small Branch
Corporate Office
http://www.cisco.com/go/iosips
IOS-Sxxx-CLI.pkg
realm-cisco.pub.key.txt
Wireless
Fa 0/0
Internet
VLAN 1
192.168.1.2
Transparent
IPS
IOS-Sxxx-CLI.pkg
realm-cisco.pub.key.txt
Configure Cisco IOS IPS Crypto Key
mkdir ips5 (Create directory on flash)
Paste the crypto key from
realm-cisco.pub.key.txt
Cisco IOS IPS Configuration
ip ips config location flash:ips5 retries 1
ip ips notify SDEE
ip ips name ips-policy
ip ips signature-category
category all
retired true
category ios_ips basic
retired false
Section 8
Implement Identity Management
Exam Objectives
Configure RADIUS and TACACS+ security protocols
Configure LDAP
Configure Cisco Secure ACS
Configure certificate-based authentication
Configure proxy authentication
Configure 802.1x
Configure advanced identity management features
Configure Cisco NAC Framework
AAA Overview
Authentication, Authorization, and Accounting (AAA)
network security services provide the primary
framework through which you set up access control
The CiscoSecure ACS uses authentication,
authorization, and accounting (AAA) to provide network
security. Each facet of AAA significantly contributes to
the overall security of your network:
Authentication determines the identityy of users and whether they
y
should be allowed access to the network
Authorization determines the level of network services available
to authenticated users after they are connected
Accounting keeps track of each users network activity
TACACS+
TACACS+
TACACS uses TCP
port 49
TACACS+ encrypts
entire packet
Multiple challenge response
Uses the AAA architecture and
separates each process
Cisco proprietary
Supports command
authorization
CiscoSecure ACS
CiscoSecure ACS Server supports both; RADIUS and
TACACS+ protocols
Full access will be provided for configuration,
verification and troubleshooting purpose
How to bring up ACS GUI remotely?
http://ip_address:2002
Device Management
Practice device management using AAA on router and
Cisco Catalyst switches equally
Device management via Telnet, SSH, HTTP/HTTPS
are the most commonly authenticated protocols
Console/Aux port should not be affected by any AAA
commands unless otherwise specified
Device management can be performed on all devices
such as routers, Cisco Catalyst switches, and ASA (IDS
does not support AAA)
TACACS+ gives you the best control for managing a
device by allowing you to restrict commands used while
on the device using various privilege levels
AAA Configuration
aaa new-model
aaa authentication login mymethod group tacacs+ enable
ip tacacs source-interface Ethernet 0
Optional Source
Interface
Command Authorization
A device can be configured to authorize commands
through a AAA server at all or specific levels
The following router configuration allows all users to
have per-command authorization set up on the server
Here we authorize all commands through CiscoSecure
ACS using TACACS+; but if the AAA server is down,
fallback authorization is set to local database
Example:
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
ASA Management
AAA support is available to authenticate Telnet, SSH
and Console access on ASA using TACACS+
and RADIUS
Make sure you can Telnet from the inside network
to the inside interface of the ASA without any
AAA authentication
Always have an active connection open to the ASA
while adding authentication statements in the event
that backing out the commands is necessary
The RADIUS authentication and accounting ports can
be changed to other than the default 1645/1646
Troubleshooting AAA
debug aaa authentication
debug aaa authorization
debug aaa accounting
debug radius
debug tacacs
test aaa group radius|tacacs+ username pwd legacy
Section 9
Implement Control Plane and Management Plane Security
Exam Objectives
Implement routing plane security features (protocol authentication, route
filtering)
Configure
C fi
C
Control
t l Pl
Plane P
Policing
li i
Configure CP protection and management protection
Configure broadcast control and switchport security
Configure additional CPU protection mechanisms (options drop, logging
interval)
Disable unnecessary services
Control device access (Telnet
(Telnet, HTTP
HTTP, SSH,
SSH Privilege levels)
Configure SNMP, Syslog, AAA, NTP
Configure service authentication (FTP, Telnet, HTTP, other)
Configure RADIUS and TACACS+ security protocols
Configure device management and security
Data Plane
Data Plane
Forwarding/Feature
ASIC Cluster
Forwarded Packets
Ingress Packets
All Packets
Forwarded Through
the Platform
Punted Packets
s
Data Plane
ToFab
T
F b to
t Other
Oth
Line Cards
ASICs
Supporting
CPU
Route
Processor
CPU
Control Plane
Forwarding/Feature
ASIC Cluster
Forwarded Packets
Ingress Packets
ToFab
T
F b to
t Other
Oth
Line Cards
Control Plane
Punted Packets
s
Control Plane
ARP, BGP, OSPF, and
Other Protocols that Glue
the Network Together
ASICs
Supporting
CPU
Most Control
Plane Packets
Go to the RP
Route
Processor
CPU
Management Plane
Forwarding/Feature
ASIC Cluster
Forwarded Packets
Ingress Packets
ToFab
T
F b to
t Other
Oth
Line Cards
Management Plane
Punted Packets
s
Management Plane
Telnet, SSH, TFTP, SNMP,
FTP, NTP, and Other
g
Protocols Used to Manage
the Device
ASICs
Supporting
CPU
All Management
Plane Traffic
Goes to the RP
Route
Processor
CPU
ICMP Techniques
ICMP is handled at the Cisco IOS process level, hence,
is often leveraged within DoS attacks
By default, Cisco IOS software enables certain ICMP
processing functions in accordance with IETF
standards
These default configurations may not conform to
security best practices or to security policies you
may have for your network
ICMP Techniques
To Reduce the Risk of ICMP-Related DoS
Attacks, Consider the Following Techniques:
no ip unreachables: disables the interface from generating ICMP
Destination Unreachable (Type 3) messages
messages, thereby reducing the impact
of certain ICMP-based DoS attacks on the router CPU
no ip redirects: disables the interface from generating ICMP Redirect
(ICMP Type 5) messages when it is forced to send an IP packet through
the same interface on which it was received
no ip information-reply: disables the router from generating ICMP
Information Reply (Type 16) messages when it receives unsolicited ICMP
Information Request (Type 15) messages (applied by default)
no ip mask-reply: disables the router from generating ICMP Address
Mask Reply (Type 18) messages when it receives unsolicited ICMP
Address Mask Request (Type 17) messages (applied by default)
Interface ACLs: infrastructure and transit ACLs may be used to filter
unnecessary ICMP messages destined to network infrastructure, including
but not limited to ICMP Source Quench (Type 4), ICMP Echo (Type 8; in
other words, ping), and ICMP Timestamp (Type 13) messages
ICMP
IPv6
Routing
Updates
Management
SSH, SSL
Input
Output
..
Silent Mode
(Reconnaissance
Prevention)
Processor
Switched Packets
CEF Input
Forwarding Path
Output Packet
B ff
Buffer
Locally
Switched Packets
NAT
ACL
Packet
B ff
Buffer
uRPF
Incoming
P k
Packets
CEF/FIB LOOKUP
Configuring CoPP
Four Required Steps:
1. Define ACLs
Classify traffic
2. Define class-maps
Setup class of traffic
3. Define policy-map
Assign QoS policy action to class of traffic (police, drop)
4 Apply
4.
A l C
CoPP
PP policy
li tto control
t l plane
l
i
interface
t f
Routerr CPU
Protec
ction
untrusted
untrusted
CoP
PP
Attacks, junk
MAC1 + Routing
Advertisement
2
Routing Advertisement +
Shared Key
Routing Advertisement +
Shared Key
MD5
Hash
MD5
Hash
MAC1
1
MAC1
3
AS2
RTR-A
RTR-C
badnet
AS1
RTR B
RTR-B
RTR-D
1
2
3
TTL Distance
(Diameter)
The GTSM feature, also known as BGP TTL Security Hack (BTSH),
provides a lightweight security mechanism to protect external eBGP
peering sessions from attacks using forged IP packets
GTSM enforces a minimum TTL-value on all BGP p
packets associated
with the eBGP session
Initial TTL values are set to 255. Per-hop decrements determine the final value upon
reaching the eBGP peer. The BGP TTL security mechanism requires configuring this
hop count value.
Spoofed IP packets may have correct IP source and destination addresses (and TCP source
and destination ports). However, unless these packets originate on a network segment that is
between the eBGP peers, the received TTL values will be less than the minimum
configured in the BGP TTL security check.
If the received TTL value is less than the configured value, the packet is silently discarded
Example
E ample protocol specific ACL filters
filters:
MPLS LDP
PIM
IGMP
SNMP
Telnet/SSH
Management Lines
In addition to CTY and AUX lines, IOS supports VTY
and TTY lines
Virtual terminal lines (VTY) have no associated physical
interface and are used exclusively for remote terminal
access (e.g., Telnet, SSH)
TTY lines represent standard asynchronous lines,
which are separate from the console and auxiliary
ports and the VTY lines
lines, and are used for inbound or
outbound modem and terminal connections
By default, no password is defined for either the
console or auxiliary parts
VTY lines require a password (by default) to gain access to user
EXEC mode
Password Security
password: sets a password for a line and user EXEC mode
password: sets a p
password for a local username
username p
enable password: sets a local password to restrict access
to the various EXEC mode privilege levels. By default,
password is stored in clear text.
enable secret: sets a local router password for EXEC
privilege levels and stores the password using a
nonreversible cryptographic hash function
service password-encryption: encrypts all local passwords
including line, username, enable, and authentication
key passwords
Useful if an unauthorized user obtains a copy of your configuration file
It should be noted that this command invokes the same Type 7
encryption algorithm used by the enable password CLI
SNMP Security
Community string: included within each SNMP protocol message and
functions much like a password. Two types of community strings:
Read Only (ro) community string
Read-Only
Read-Write (rw) community string
Note, that no technique is available to encrypt or hash the assigned community strings within
the router configuration file.
Service password-encryption does not apply to SNMP community strings
NTP
HTTP
PAD
MOP
Finger service
EXEC mode on unused lines
DHCP server and
relay functions
CDP: best practice to disable
on e
external
ternal ((untrusted)
ntr sted)
interfaces
DNS-based host
name-to-address translation
(i.e., no ip domain lookup);
alternatively configure name
servers explicitly
System Banners
A banner serves as a legal notice, such as
no trespassing or a warning statement. A proper
legal notice protects you such that it enables you to
pursue legal actions against unauthorized users.
EXEC banner: specifies a message (or EXEC banner)
to be displayed when an EXEC process is created
MOTD banner (message-of-the-day): specifies a MOTD
to be displayed immediately to all user sessions and
when new users first connect to the router
Incoming banner: specifies an incoming banner to be
displayed for incoming reverse Telnet sessions
Login banner: specifies a login banner to be displayed
before username and password prompts
AAA
Provides a highly flexible and scaleable framework
through which you can set up centralized access
control
t l for
f IP network
t
k access and/or
d/ remote
t terminal
t
i l
access to AAA clients such as Cisco IOS routers
AAA servers facilitate the configuration of three
independent security functions in a consistent and
modular manner, including:
Authentication: the process of validating the claimed identity
of a user
Authorization: the act of granting access rights to a user or group
of users, on a command basis.
Accounting: the methods of logging user connectivity
and activity
AutoSecure
Section 10
Configure Advanced Security
Exam Objectives
No Source Routing
Network
100.97.0.0
interface Serial 1
ip address 64.100.2.32 255.255.255.252
no ip source routing
!
Intranet
Im 100.97.5.23
and Heres the
Route Back to Me
SNMP
Change your community strings; do not use public,
private, secret
Use different community strings for the RO and
RW communities
Use mixed alphanumeric characters in the community
strings: SNMP community strings can be cracked, too
Turn off SNMP if it isnt needed:
Cisco IOS: no snmp-server
Echo Reply
Destination Unreachable
Source Quench
Redirect
Echo
11
12
13
14
15
16
Time Exceeded
Parameter Problem
Timestamp
Timestamp Reply
Information Request
Information Reply
64 100 1 12
64.100.1.12
64
4.100.1.0/28
IP Spoofing
64.100.1.14
Attacker
i/f 2
i/f 3
1
S D i/f
Data
i/f 1
i/f 3
1
S D i/f
Data
FIB:
...
S i/f 1
D i/f 3
...
FIB:
...
S i/f 2
D i/f 3
...
Same i/f:
Forward
Other i/f:
Drop
Strict Mode
(a.k.a. v1)
i/f 2
i/f 3
1
S D i/f
Data
i/f 1
i/f 3
1
S D i/f
Data
FIB:
...
S i/f x
D i/f 3
...
Any i/f:
Forward
Loose Mode
(a.k.a. v2)
FIB:
...
...
D i/f 3
...
0111111010101010000111000100111110010001000100100010001001
Match Pattern
AND
OR
Cisco.com/go/fpm
NOT
Allows a choice of
response actions
class slammer
drop
policy-map type access-control fpm-policy
class ip-udp
service-policy udp-policy
!
interface GigabitEthernet0/1
service-policy type access-control input fpm-policy
Traffic
Measurement
Instrumentation
Action Policy
Rate limiting
Several ways
to filter
Tokens
Token bucket
implementation
Burst
Limit
Next
Policy
Conforming
Traffic
Excess
Traffic
Configuring MQC
Three Required Steps:
1. Define Class-maps
Setup classes for traffic using ACL or Matching Ports
2. Define Policy-map
Assign action to class of traffic (bandwidth, police, drop, set)
3. Apply Service-Policy
Apply policy to desired interface
NBAR: Network-Based
Application Recognition
NBAR is used for classifying traffic
Classification of applications that dynamically assign
TCP/UDP port numbers
Classification of HTTP traffic by URL, HOST, or
Multipurpose Internet Mail Extension (MIME) type
Classification of application traffic using
sub-port information
NetFlow
Provides network administrators with
packet flow information
Allows for:
Traffic flow analysis
Security monitoring
Anomaly detection
Enabling NetFlow
Receive NetFlow information only on the specific
interface(s) of interest
Typical use case for NetFlow: Accounting, Security and
Capacity Planning
Router(config-if)# ip flow ingress
Starting
g Cisco IOS v12.2(15)T
( ) a simple ip flow
ingress interface command starts collecting
NetFlow data on that interface
This New Command Was Added in Cisco IOS v12.2(15)T
Older Command ip route-cache flow Also Enables Ingress
NetFlow on the Interface but Should No Longer Be Used
SrcIPaddress
132.122.25.60
139.57.220.28
165.172.153.65
DstIf
Se0/0
Se0/0
Se0/0
Traffic Classification
Flow Info Summary
Packets Active(Sec) Idle(Sec)
/Sec
/Flow
/Flow
0.0
0.0
9.5
Flow
11.2
0.0Details
12.0
11.2
0.0
12.0
DstIPaddress
192.168.1.1
192.168.1.1
192.168.1.1
Pr
06
06
06
SrcP
9AEE
708D
CB46
DstP
0017
0017
0017
Pkts
1
1
1
Hex
Section 11
Identify and Mitigate Network Attacks
Exam Objectives
Common Attacks
Network reconnaissance
MAC spoofing
ARP snooping
IP spoofing
Fragment attack
DHCP snooping
Smurf attack
DNS spoofing
Knowledge of Protocols
Traffic Characterization
Packet Classification
Marking Techniques
Identifying Attack Patterns
Understanding Attack Vectors
Example: SYN, TCP/UDP options, ICMP Type/Code
Section 12
Preparation Resources and Test-Taking
Tips
Preparation Resources
Planning Resources
There is an abundance of material available to prepare
for the CCIE certification. However, you have to be very
selective of the material you choose to use
Choose materials that offer configuration examples and
take a hands-on approach
Look for materials approved or provided by Cisco and
its Learning Partners
Customize your study plan to reflect your own personal
strengths and weaknesses
Assessing Strengths
Evaluate your experience and knowledge in the major
topic areas listed on blueprint
Using the content blueprint, determine your experience
and knowledge level in the major topic areas
For areas of strength: practice for speed
For weaker areas: boost knowledge with training or
book study first, then practice
Trainings
Although No Formal Training Is Required for the
CCIE Security Certification, Cisco Recommends
the Following Training Courses, Which Are
Described Further on the Cisco Website at:
http://www.cisco.com/web/learning/le3/ccie/security/training.html
Books
Many Cisco Press and other vendor books are
available to assist in preparing for CCIE exams
A current list can be found on the CCIE website at
http://www.cisco.com/web/learning/le3/ccie/security/book_
list.html
Learn
Experience
Prepare
Practice
Expert-Level
www.ciscopress.com
Forums
Forums Can Play an Essential Role for a Candidate
During Preparation; You Can Generally Find Qualified
CCIEs and Other Security Engineers Available 24x7 to
Answer Your Queries and Work Through Your Technical
Problems
Ciscos Networking Professional Connection
http://www.cisco.com/go/netpro
Networking Professionals can post questions for technical assistance, seek suggestions
or share experiences at NetPro
Practice Labs
Practice lab exercises with a high level of complexity
will assist you in making improvements in your exam
strategy and identifying areas requiring extra study.
Practice labs can be used to gauge your readiness and
help identify your strengths and weaknesses. This will
help you refocus and revise your study plan and
adjust it according to your findings
Technical skill is not the only thing you need to work
on; time management and your exam-taking strategy
is also important to succeed in the CCIE exam.
Practice labs also assist you in improving your time
management and test-taking approach
Test-Taking Tips
Online Support
www.cisco.com/go/certsupport
E-mail
[email protected]
Cheating
[email protected]
Recommended Reading
Network Security Technologies
and Solutions (CCIE Professional
Development Series)
ISBN: 1587052466
By Yusuf Bhaiji
Q and A
Recommended Reading
Network Security Technologies
and Solutions,
ISBN: 1
1-58705-246-6
58705 246 6
CCIE Security Practice Labs,
ISBN: 1-58705-134-6
CCIE Security Exam Quick
Reference Sheets (Digital Short
Cut), ISBN: 1-58705-334-9
Cisco Access Control Security:
AAA Administration Services,
ISBN: 1-58705-124-9