CCIE Security Bootcamp v6
CCIE Security Bootcamp v6
CCIE Security Bootcamp v6
Introduction
ine.com
Piotr Kaluzny
CCIE #25665
[email protected]
linkedin.com/in/piotrkaluzny
CCIE Security
Bootcamp Introduction
+ General Information
+ The class starts at 9 am EST every day
+ Sessions will be recorded in the HD format
+ Please report any video/voice issues immediately via chat
+ Class Format
+ Lectures & instructor demos
+ Student hands-on tasks
+ Rack Access
+ http://labs.ine.com/workbook/view/sc-rack-rental/task/sc-rack-overview-NjU4
Class Agenda
ine.com
+ ASA overview
Module Overview
+ Interface types
+ Management
Cisco Adaptive Security Appliance (ASA) Overview
+ Interfaces Types
+ Physical (interface physifname)
+ Single port
+ Redundant (interface redundant nr)
+ Two ports (active/standby)
+ EtherChannel (interface port-channel nr)
+ Two or more ports (active/active)
+ Virtual (also known as Subinterfaces)
+ Traffic is logically separated at L2 by using VLAN tags
+ Configure with interface name.nr & vlan
+ Corresponding switchport(s) must be configured as 802.1q trunk
ASA Basics
+ Interface Settings
+ IP address (ip/ipv6 address [standby])
+ Security level (security-level)
+ Specifies how „trusted” a given interface is
+ Controls the default filtering ASA’s behavior
+ Interface name (nameif)
+ Default security level for „inside” is 100 and 0 for any other name
+ (Optional) VLAN tag (vlan)
+ Watch for Native VLAN and DTP
+ Activation (no shut)
Redundant Interfaces
+ Configuration
+ Switch: configuration of member–connected switchports must match
+ ASA
interface Redundant nr
member-interface int1
member-interface int2
EtherChannel
+ Configuration
+ Switch: corresponding switchports must be configured for EtherChannel
+ ASA
interface member_interface_name
channel-group nr [active | passive | on]
ASA Management
+ Remote Management
+ In-band (any data interface)
+ Out-of-band (the management port)
+ Does not allow traffic to go in/out the management network
+ By default interface management acts as a mangement port
+ Other interface can be selected with management-only
+ Supported methods include Telnet, SSH and HTTPS
ASA Management
+ Traffic Zones
+ Groups interfaces into one logical to loosen the ASA’s security check
+ Useful with Asymmetric Routing and ECMP
+ Configuration
+ Create a zone with zone name
+ Assign it under interface with zone-member name
CCIE Security v6 Bootcamp
Perimeter Security & Intrusion Prevention - ASA
ine.com
Module Overview
+ Modes of operation
ASA Modes Overview
+ Single (default)
+ No virtualization : one firewall & one policy
+ Supports all regular features
+ Multiple
+ Enables virtualization
+ Multiple logical firewall instances can co-exist on a single physical unit
+ Each of the virtual firewalls is configured with an interface set & policy
+ Limited feature support
+ VPN, QoS, multicast routing & some routing protocols
+ Configure with mode multiple and then context
CCIE Security v6 Bootcamp
Perimeter Security & Intrusion Prevention - ASA
ine.com
+ Traffic control
Module Overview + Objects/object groups
+ MPF
+ NAT
Traffic Control
+ Interface ACL
+ Affects traffic going through a single interface
+ access-group interface [in | out]
+ Global ACL
+ Affects all incoming transit packets (any interface)
+ Changes the Default Filtering Policy
+ May be deployed in addition to Interface ACL(s)
+ Interface ACL explicit permit/deny always takes precedence
Traffic Control
+ Objects
+ Reusable components for storing certain data
+ IP addresses, subnets or ranges (object network)
+ Protocols and TCP/UDP port numbers (object service)
+ Contain a single element
+ Object Groups
+ Like Objects, but capable of storing multiple elements and/or other Objects
+ Allow to group data of other type (e.g. icmp-types, users)
+ object-group [protocol | network | icmp-type | service | user |
security]
Modular Policy Framework (MPF)
+ NAT Types
+ Static (one-to-one, fixed pre-configured mapping)
+ Dynamic (one-to-one, new IP address is allocated dynamically from a pool)
+ PAT (many-to-one, source IP address & source port is changed dynamically)
+ Static PAT (many-to-one, address & port mapping is pre-configured)
+ Policy NAT (any condition-based translation)
ASA NAT Modes
ine.com
Module Overview
+ High Availability (HA)
ASA HA Options
+ Failover
+ Activate-Standby
+ Active-Active
+ Allows both units to forward traffic
+ Multiple context mode
+ Clustering
+ Combines multiple ASAs into one logical unit
+ Results in increased throughput and redundancy
+ Cluster traffic delivery methods
+ Spanned EtherChannel (L2 mode)
+ Individual Interfaces (L3 mode)
+ ECMP or PBR
+ L2 mode is generally recommended for faster convergence
+ Documentation
+ https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/general/asa-98-general-
config/ha-cluster.html
Failover Configuration
+ Failover Unit
+ failover lan unit [primary | secondary]
+ Failover Interface
+ failover lan interface + failover interface [ip | ipv6]
+ failover link (optional) + failover interface [ip | ipv6] state
+ Enable Failover
+ failover
+ Physical ports are monitored by default
+ For other ports issue monitor-interface
Active-Active Mode Configuration
+ Failover Groups
+ failover group [1 | 2]
+ Unit to be active for the group [primary | secondary]
+ preempt (optional)
+ Context Activation
+ context
+ join-failover-group [1 | 2]
CCIE Security v6 Bootcamp
Perimeter Security & Intrusion Prevention - IOS
ine.com
Module Overview
+ Zone-Based Firewall
Zone-Based Firewall (ZFW) Overview
+ Configuration Steps
+ Traffic classification
+ Policy configuration
+ Policy activation
+ Parameter Maps
+ Control common inspection options, such as timeouts or session parameters
+ The „default” map is used every time inspect is configured with no options
+ A custom map can be configured with parameter-map type inspect
+ Activated in a policy with inspect map_name
+ All undefined settings are inherited from the „default” map
+ The „global” map allows to enable logging of packets dropped by the
firewall due to reasons other than your policy drop action
+ Policy Activation
+ Create zones (zone security)
+ Define required zone-pairs (zone-pair security)
+ Attach your policy (service-policy type inspect)
+ Associate interfaces with zones (zone-member security)
ine.com
+ Platform overview
+ Management
Module Overview
+ FTD Modes
+ Registration
+ Basic setup
Firepower Threat Defense (FTD) Overview
+ FTD Features
+ ASA : L2-L4 Stateful Firewall, L7 Inspection, NAT, ACL, Routing, HA
+ Firepower : IPS, AVC, URL Filtering, AMP
+ Other : Security Intelligence, Prefiltering & more
FTD Management
+ Operational/Firewall
+ Routed vs Transparent
+ Affects available Interface Modes
+ Functional
+ NGIPS vs NGFW
+ Determined by selected Interface Modes
+ Interface
+ Routed, Switched/BVI/Transparent
+ Inline Pair, Inline Pair with Tap, Passive, Passive (ERSPAN)
Operational/Firewall Modes
+ Passive (IDS)
+ Works on a copy of real traffic (SPAN, RSPAN, ERSPAN)
+ Inline (IPS)
+ Packets coming in on one interface always leave through the other
+ The device can drop or normalize packets
+ Interface pair(s) must be associated with an Inline Set
+ Devices -> Device Management -> Inline Sets
+ The “Tap” mode (also called Inline Tap) may be enabled to test the policies
+ Inline cabling is used but only a copy of the traffic is processed
The Registration
+ The Procedure
+ Console/SSH to FTD and add FMC (configure manager add)
+ Verify TCP socket with netstat
+ Configure FMC (Devices -> Device Management -> Add Device)
+ Check the session details on FTD (show managers or sftunnel-status)
Basic Setup
+ Configuration
+ Devices -> Device Management -> Interfaces
+ Enable the physical port
+ Choose the interface type with Add Interfaces
Basic Setup
+ Configuration
+ Devices -> Device Management -> Routing
CCIE Security v6 Bootcamp
Perimeter Security & Intrusion Prevention - FTD
ine.com
+ Policies overview
Module Overview
+ Access control policy
+ Other policies
Policies Overview
+ Monitor
+ Tracks & logs traffic
+ The Policy processing does not stop - other rules are still evaluated
+ Allow
+ Inspects traffic with all configured Policies
+ E.g. Snort, File/AMP, Network Discovery, etc.
+ The traffic is allowed to pass unless blocked by one of these engines
+ Trust
+ Bypasses Snort, File/AMP & Network Discovery inspections
+ FTD does not perform DPI on Trusted, Blocked or Encrypted traffic
+ Traffic is inspected by SI, Identity & QoS Policies
+ The traffic is allowed to pass unless blocked by one of these engines
+ Don’t use it for protocols negotiation secondary channels
ACP Default Action
+ Traffic not matching any ACP rule is subject to the Default Action
+ Network Discovery Only
+ Trust All Traffic
+ Block All Traffic
+ Recommended for NGFW deployments
+ Intrusion Prevention
+ Snort + Network Discovery
+ File/AMP is not supported
+ Recommended for NGIPS deployments
Prefilter Policy
+ Supported Actions
+ Block - blocks traffic without any further inspections
+ Analyze - passes traffic to ACP for further analysis
+ Does not drop/allow packets on its own
+ Fastpath - enables prefiltering
+ Exempts traffic from ALL further inspections
+ ACP Rules, SI, Identity, SSL, IPS, File/AMP, Network Discovery & QoS
+ Similar to ACP "Trust" but not the same
+ ACP bypasses DPI & Network Discovery, but e.g. not SI or rate-limiting
+ ACP supports conditions other than L3/L4
+ User, application, etc.
+ ACP inspects the innermost header
Prefilter Policy Configuration
+ SI Information Sources
+ Feeds
+ Manual Lists
+ Blacklist/Whitelist IP Now
DNS Policy
+ Dynamic Blacklisting
+ Update the Feed (Object -> Object Management -> Update Feeds)
+ Select the categories to use
+ Policies -> Access Control -> Security Intelligence
+ Manual Lists
+ Add your entries into a .txt file
+ One record per line
+ Upload the file under Object -> Object Management -> Security
Intelligence
+ Update ACP (Security Intelligence) with the new Object
SI Configuration - Domains
+ Custom Policy
+ Define a custom Policy
+ Policies -> Access Control -> DNS
+ Edit rules
+ Add objects to use
+ Object -> Object Management -> Security Intelligence -> DNS Lists &
Feeds
+ Enable the Policy
+ Policies -> Access Control -> Security Intelligence -> DNS Policy
File Policy
+ Pre-requisites
+ Adaptive Profiling must be enabled
+ Policies -> Access Control -> Advanced
ine.com
+ NGIPS overview
Module Overview + Default Policies
+ Snort variables & rules
+ Configuration
NGIPS Overview
+ Deployment Modes
+ Passive (IDS)
+ Requires Passive, Passive ERSPAN or Inline Pair with Tap interface
+ Inline (IPS)
+ Requires Inline Pair interface
Normalization
+ Variable Types
+ $*_NET
+ Network/subnet addresses, such as $HOME_NET
+ $*_SERVERS
+ Individual server IPs, e.g. $DNS_SERVERS
+ $*_PORTS
+ TCP/UDP ports, like $HTTP_PORTS
Snort Variables
+ Rule Header
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS
+ Rule Body
(msg:“Test rule fires”; flow:to_server,established; \
uricontent: “cgi/main/malware.exe”; reference:cve-1991-1345; \
classtype:web-application-activity; sid:9991; rev:1;)
NGIPS Configuration
+ Intrusion Policy
+ Pre-requisites
+ Configure Snort Variables
+ Accurate $HOME_NET is critical to proper NGIPS operations
+ Policies -> Access Control -> Intrusion
+ “Balanced Security and Connectivity” is recommended as a base
+ Enable/disable/tune Snort rules
+ Objects -> Intrusion Rules
+ Consider using Firepower Recommendations
NGIPS Configuration
+ Verification
+ Analysis -> Intrusions -> Events
Firepower Recommendations
+ Configuration
+ Define networks to examine
+ Should match Network Discovery settings
+ Set Recommendation Threshold
+ Considers rule’s CPU overhead
+ As a best practice schedule Recommendations to re-run periodically
Network Discovery Policy
ine.com
Module Overview + VPNs
+ IKE & IPsec
Virtual Private Network (VPN)
+ VPN Types
+ Remote Access
+ Site-to-Site (LAN-to-LAN or L2L)
IP security (IPsec) overview
+ Encapsulation Modes
+ Tunnel
+ Creates a virtual tunnel (new IP header)
+ Allows to protect traffic between different sites and/or non-IPsec
capable devices
+ Transport
+ Tunnel-less protection
+ Communicating devices are IPsec endpoints in the same time
+ They must run IPsec software
+ Proxy ACL must include addresses of VPN endpoints themselves
IPsec Components
+ Security Protocols
+ Authentication Header (AH)
+ Offers Data Integrity, Authentication and Replay Protection
+ No encryption
+ Protects the entire packet, including the header
+ Tunnel Group
+ A virtual interface for terminating & controlling VPN connections
+ Controls the VPN connection by choosing a Group Policy
+ Few settings can be set directly, such as AAA database or DHCP/DNS
+ Group Policy
+ A container for VPN connection settings & attributes
+ Makes application of the VPN policy easier & more scalable
+ Group Policy settings & attributes
+ Allowed VPN protocol
+ Split Tunneling List & Policy
+ IP address pool, session timeout, ACL filters & more
FTD Considerations
+ Tunnel Configuration
+ Similar to the ASA
+ Devices -> VPN -> Site To Site
+ Phase I Settings
+ crypto isakmp policy
+ crypto isakmp key or crypto pki trustpoint
+ Phase II Settings
+ crypto ipsec transform-set
+ access-list
+ crypto map ipsec-isakmp
+ interface
+ crypto map
ASA Configuration (IKEv1)
+ ASA-specific
+ group-policy [internal | external]
+ group-policy attributes
+ tunnel-group type ipsec-l2l
+ tunnel-group [general-attributes | ipsec-attributes]
CCIE Security v6 Bootcamp
Secure Connectivity
ine.com
Module Overview + PKI
+ FlexVPN
Public Key Infrastructure (PKI)
+ Enrollment
+ A process of joining a PKI
+ Time synchronization
+ Asymmetric Key Pair
+ Authentication Process
+ Certificate Validation
+ Signature Check
+ Expiration Dates
+ Revocation Check (optional)
+ Assymetric Encryption / Decryption
+ Only if a Certificate was successfully validated
PKI Configuration
+ Prerequisites
crypto key generate [rsa | ecdsa] [label] [exportable]
ntp [master | server]
+ IOS CA
ip http server
crypto pki server CA_name
[options]
no shutdown
PKI Configuration
+ Client
crypto pki trustpoint
enrollment url http://ip_address
rsakeypair/eckeypair
+ FlexVPN Components
+ IKEv2 Proposal, Policy & Profile
+ Credential Store
+ IPsec Profile
+ Tunnel interface
+ Static vs Dynamic
+ Routing
FlexVPN Configuration
+ Cisco Documentation
+ FlexVPN and Internet Key Exchange Version 2 Configuration Guide
CCIE Security v6 Bootcamp
Secure Connectivity
ine.com
Module Overview + SSL/TLS
+ Remote Access VPNs
SSL/TLS Overview
+ SSL/TLS VPNs
+ Clientless
+ Thin Client
+ Extends browser capabilities
+ Full Client
+ AnyConnect
Remote Access VPNs
+ ASA
+ Using ASDM may help
+ asdm image
+ http server enable
+ http
+ aaa authentication http console
+ Start with Wizards -> VPN Wizards
+ Documentation
+ ASA Series VPN CLI Configuration Guide
+ AnyConnect VPN Client Connections
Remote Access VPNs
+ FTD
+ Requires RADIUS (user) & certificate (server) authentication
+ Configuration is similar to the ASA
+ Devices > VPN > Remote Access
+ Documentation
+ TechNotes "AnyConnect Remote Access VPN configuration on FTD"
+ https://www.cisco.com/c/en/us/support/docs/network-management/remote-
access/212424-anyconnect-remote-access-vpn-configurati.html
+ FMC Documentation
+ Firepower Threat Defense VPN
CCIE Security v6 Bootcamp
Secure Connectivity
ine.com
Module Overview
+ DMVPN
DMVPN Overview
+ Documentation
+ Dynamic Multipoint VPN Configuration Guide
CCIE Security v6 Bootcamp
Identity Management & Access Control
ine.com
+ ISE overview
Module Overview + Deployment models
+ The Policies
+ AD Integration
Identity Services Engine (ISE) Overview
+ Node
+ Single ISE instance
+ Persona
+ A role describing the main function of a Node
+ Service refers to individual features Persona provides
ISE Terminology
+ ISE Personas
+ Policy Administration Node (PAN)
+ Handles all system & policy related configuration (“mothership”)
+ Synchronizes databases of all other nodes
+ Policy Service Node (PSN)
+ Delivers all configured services (“workhorse”)
+ Monitoring & Troubleshooting (MnT)
+ Enables ISE to function as a Log Collector
+ Stores logs from all other nodes – PAN & PSNs
+ pxGrid
+ Shares context-sensitive data with other systems
+ NGFW, Stealthwatch, non-Cisco ISE partner systems (“ecosystems”)
ISE Design
+ Deployment Models
+ Standalone
+ Distributed
+ Redundancy & improved performance
+ Policies and/or Policy Rules are made of two types of Policy Elements:
+ Conditions
+ Matching criteria
+ Results
+ Action(s)
Policy Sets
+ Establishes an Identity
+ Failover Options
+ Reject
+ Drop
+ Continue
Authorization (AuthZ) Policy
+ Prerequisites
+ ISE Super/System User account
+ Time synchronization (NTP)
+ Port openings
+ DNS
+ MS-RPC
+ Kerberos
+ LDAP & LDAP (GC)
+ NTP
+ IPC
CCIE Security v6 Bootcamp
Identity Management & Access Control
ine.com
Module Overview + AAA
+ Administrative Access
AAA Overview
+ Database configuration
+ ACS
+ ISE
+ LOCAL
Authentication (AuthC)
+ Fallback Authentication
+ More than one method can be defined (backup)
+ aaa authentication login default group tacacs+ local
Authorization (AuthZ)
ine.com
Module Overview + Profiling
+ Probes overview
Profiling Overview
+ Policy selection
+ Based on the highest total Certainty Factor (CF)
+ Rules with “Increase CF”
+ For the Child Policy to be selected its Parent must match as well
+ Ties are handled alphabetically
Profiling Policies
+ Configuration (switch)
+ Turn on RADIUS Accounting, Accounting VSAs, CDP/LLDP & DHCP
Snooping
+ Enable with device-sensor accounting & device-sensor notify all-changes
+ Verify with show device-sensor cache
SNMP Probe
+ DNS
+ Acquires FQDN based on a reverse DNS lookup
+ Active Directory
+ Extracts AD-related information (Windows systems)
+ NetFlow
+ Profiles endpoints based on flow characteristics rather than attributes
+ NetFlow data may quickly oversubscribe a PSN
+ Only use Flexible NetFlow v9 along with a filtering solution (e.g.
Stealthwatch)
Other Probes
+ NMAP
+ “Active” mechanism communicating directly with an endpoint
+ TCP/UDP Port Scans including SNMP walk
+ Activation
+ Manual
+ IP host, subnet
+ Dynamic
+ Profiling Policy “Take Network Scan”
+ Like HTTP & DNS requires ISE to already know the IP-MAC address
binding
Profiling Configuration
+ Activate Probes
+ Administration -> System -> Deployment -> Profiling Configuration
ine.com
Module Overview + 802.1x standard
+ Wired 802.1x example
802.1x Overview
+ 802.1x components
+ Supplicant
+ Client software
+ Authenticator
+ Policy enforcement (Switch/AP/WLC)
+ Authentication Server (RADIUS)
802.1x Authentication
+ The Process
+ Authentication process starts on reception of a EAP Request Identity frame
+ Sent on link up/w-less connection or upon reception of EAPOL START
+ Authenticator acts as a proxy between Supplicant & RADIUS server
+ EAP data is extracted & encapsulated using two RADIUS EAP-specific
attributes
+ Authentication method is negotiated followed by authentication
802.1x Authentication
+ MAB Details
+ If enabled (mab), triggers after 802.1x times out (dot1x timeout tx-period)
+ In wireless for WLANs configured with MAC Filtering
802.1x Documentation
+ Wired
+ Switches -> Catalyst 3750X Series Switch -> Configuring IEEE 802.1x
Port-Based Authentication
+ Old ISE Administrator Guide -> Reference -> Switch and Wireless LAN
Controller Configuration Required to Support Cisco ISE Functions
+ Wireless
+ Wireless -> Wireless LAN Controller Software -> Client Network -> WLAN
Security
CCIE Security v6 Bootcamp
Identity Management & Access Control
ine.com
Module Overview + Wireless 802.1x
example
802.1x Configuration (Wireless)
+ WLC
+ Add an interface & WLAN
+ Define RADIUS Server(s)
+ Secure WLAN
+ Authentication method
+ Advanced options
+ Create ACL(s) and additional interface(s) if needed
802.1x Configuration (Wireless)
+ RADIUS Server
+ Add Network Devices
+ Configure Identity Stores & AuthC policy
+ Create authorization elements/profiles
+ Configure AuthZ policy
CCIE Security v6 Bootcamp
Advanced Threat Protection & Content Security
ine.com
+ WSA overview
Module Overview
+ Basic setup
+ Policies
Web Security Appliance (WSA) Overview
+ Key Features
+ URL Filtering
+ Application Visibility & Control
+ File Control & AMP
+ HTTPS Decryption & more
WSA Interfaces
+ Data
+ Web Proxy (P1, P2)
+ Only P1 can be used (inbound & outbound communication)
+ L4TM (T1, T2)
+ Only T1 can be used (inbound & outbound communication)
+ Administration
+ Management (M1)
+ HTTP, HTTPS & SSH
+ Might be used for Data as well
WSA CLI
+ Important Considerations
+ DNS resolution is performed by the WSA
+ Clients send all web traffic with a destination IP of the WSA
+ A Client does not need a default route to download any web content
Transparent Mode
+ Important Considerations
+ DNS lookups are performed by the Client
+ A Clients does require a default route
+ Web packets are sent to the server and not WSA
WCCP Configuration
+ IOS
ip wccp version 2
ip wccp (service_nr | web-cache) [redirect-list acl] [group-list acl]
interface ifname
ip wccp (service_nr | web-cache) redirect [in | out]
+ ASA
+ wccp (service_nr | web-cache) [redirect-list acl] [group-list acl]
+ wccp interface ifname (service_nr | web-cache) redirect in
Identification Profiles
ine.com
+ ESA overview
Module Overview
+ Basic setup
+ Policies
What is Email Security Appliance (ESA)?
+ Key Features
+ Email traffic & content control
+ Malware protection
+ Data Loss Prevention
+ Authentication & Encryption
Design Considerations
+ Sender Group
+ SBRS
+ IP address, IP range
+ FQDN, domain
+ Only if the Sender is verified (double DNS lookup match)
+ Unverified Senders
+ Configuration Steps
+ Policy Engine activation
+ Mail Policy definition
+ Incoming
+ HAT “ACCEPT”
+ Outgoing
+ HAT “RELAY”
+ Policy settings configuration
ESA Policies
CCIE Security v6 Bootcamp
Advanced Threat Protection & Content Security
ine.com
Module Overview
+ Cisco Umbrella
Umbrella Overview
+ Umbrella Dashboard
+ https://login.umbrella.com
+ Umbrella Documentation
+ Cisco Umbrella
+ https://docs.umbrella.com/deployment-umbrella/docs
+ Cisco Umbrella SIG
+ https://docs.umbrella.com/deployment-umbrella/v1.0.6/docs/welcome-
to-cisco-umbrella
Basic Configuration
+ Policy Engines
+ DNS Layer Security
+ Content Inspection
+ Application Inspection
+ File Analysis
+ Destination Lists
CCIE Security v6 Bootcamp
Infrastructure Security & Automation
ine.com
+ uRPF
Module Overview + CoPP
+ CPPr
+ MPP
Unicast Reverse Path Forwarding (uRPF)
+ Loose
+ A source-matching FIB entry is all what’s needed to allow the packet
+ Strict
+ Only allows packets received on the interface used to reach the source
+ Does not work in environments where routing is assymetrical
+ Packets are received on one interface, sent through another
Control Plane Policing (CoPP)
+ Classification Options
+ Access-list
+ Network-Based Application Recognition (NBAR)
+ Only for PPP and ARP
+ ToS (DSCP and IP Precedence)
Control Plane Protection (CPPr)
+ Limitations
+ No control over router-generated packets
+ No IPv6 support
+ Requires CEF (ip cef)
CPPr Subinterfaces
+ Host
+ Router-destined traffic that is not CEF Exception
+ Management packets, EIGRP, IP fragments, other receive-adjacency
packets
+ Transit
+ Transit IP traffic that is software-switched
+ Packets logged by an ACL
+ CEF Exception
+ CEF-redirected packets to the CPU
+ TTL-1 such as OSPF, CDP, ARP, L2 Keepalives & other non-IP traffic
CPPr Mechanisms
+ Port Filtering
+ Provides early dropping of packets destined to closed UDP/TCP ports
+ Once enabled a dynamic table of open ports is created and maintained
+ Queue Thresholding
+ Limits a number of packets a protocol may have in the CP input queue
+ For BGP, DNS, FTP, HTTP, IGMP, SNMP, SSH, TFTP, Syslog & Telnet
+ Other TCP/UDP based protocols can be classified as an aggregate
+ host-protocols
+ Similar to CoPP
+ Class Maps (class-map) are used for traffic classification
+ Policy Map (policy-map) specifies actions for individual classes
+ Then use service-policy under control-plane [host|transit|cef-exception]
+ Verification
+ show management-interface
CCIE Security v6 Bootcamp
Infrastructure Security & Automation
ine.com
Module Overview + Layer 2 attacks
+ Layer 2 mitigation tools
MAC Spoofing & Flooding
+ MAC Spoofing
+ Sending frames with someone else’s MAC address in the source
+ Causes a switch to update its CAM and forward traffic to the attacker
+ Mitigation
+ Port Security
Port Security
+ DHCP Starvation
+ An attempt to starve server’s pools by sending spoofed requests
+ Source MAC and/or DHCP header’s Client HW Identifier
+ Mitigation
+ Filtering (deny udp any eq 67 any eq 68)
+ For DHCPv6 use deny udp any eq 547 any eq 546
+ DHCP Snooping or IPv6 First Hop Security (DHCP Guard)
DHCP Snooping
+ Configuration
+ Enable it globally (ip dhcp snooping) & for VLAN(s) (ip dhcp snooping vlan)
+ Configure at least one trusted port (ip dhcp snooping trusted)
+ Optionally disable Option 82 insertion (no ip dhcp snooping information
option)
ARP Spoofing
ine.com
+ Python overview
Module Overview + Data Types
+ API overview
+ FMC REST API
Python Overview
+ Syntax
if condition:
statement
+ Important: a colon ':' follows condition & indentation precedes statement(s)
Conditional Statements
if condition:
statement(s)
elif altcondition1:
statement(s)
elif altcondition2:
statement(s)
…
else:
statement(s)
Supported Operators
+ The if/elif conditions are often built using multiple elements tied together
with Operators
+ Comparison
+ Equal (==), not equal (!=)
+ Less than (<), greater than (>)
+ Less than or equal (<=), greater than or equal (>=)
+ Boolean
+ and, or, not
+ Membership
+ in, not in
Loops Overview
+ Loop Types
+ while
+ for
The while Loop
+ Syntax
while condition:
statement(s)
+ Syntax
for variable(s) in iterable:
statement(s)
+ General Syntax
+ requests.method(params)
+ Returns the Response Object that may be acted upon
+ E.g. response = requests.get('https://ASA_IP')
+ Useful Parameters
+ Authentication
+ Basic HTTP, OAuth, None, Custom
+ Importing the HTTPBasicAuth function is optional
+ Headers may be added to specify the formatting
+ headers = { 'Accept': 'application/json', 'Content-Type':
'application/json' }
Python Requests Library
+ Response Attributes
+ status_code
+ text
+ JSON Methods
+ dumps()
+ Dictionary -> String
+ loads()
+ String -> Dictionary
FMC REST API
+ API Explorer
+ https://FMC_IP_FQDN/api/api-explorer
+ Authentication
+ First API call must be authenticated with username & password
+ "Empty" POST request to /api/fmc_platform/v1/auth/generatetoken
+ Subsequent calls must be authorized
+ Access Token
Thank You!
ine.com