CCNA Security 640-554 (IINS v2.0) Exam Cram – The Final Push


After reading, understanding and reviewing the extended CCNA Security 640-554 Exam Cram these following brief notes are for the final push.
Note: These notes exist on this blog purely as a personal tool to help with revision since the information presents itself nicely within a smartphone browser, which is handy for learning when have a spare moment on a commute or similar!

Final Push

1 Networking Security Concepts

Two characteristics that represent a blended threat = Trojan horse attack and day zero attack.

Control plane = secures traffic destined to the router itself
Data planesecures transit traffic through the router
Management plane = secures router access

A VLAN is a logical broadcast domain that can span multiple physical LAN segments.

STP is a Layer 2 protocol that provides loop resolution by managing the physical paths to a given network segment.

Four method used by hackers: footprint analysis attack, privilege escalation attack, social engineering attack, Trojan Horse attack

3 Building a Security Strategy

A step to be taken when a security policy is developed = perform quantitative risk analysis.

Threat mitigation is defense in depth.

The VPN security policy is categorized under the remote access policy.

Two important considerations about secure network management = log tampering and accurate time stamping.

Build ACLs based upon your security policy.

4 Network Foundation Protection

Threats to the physical installation of an enterprise network include: electrical power and computer room access.

Separating management traffic from production traffic = out-of-band.

Syslog level 4 = LOG_WARNING.

6 Securing the Management Plane on Cisco IOS Devices

A secured Cisco IOS image file using the Cisco IOS image resilience feature; is not visible in the output from the show flash command.

#secure boot-image = enables Cisco IOS image resilience.

#show secure bootset = Cisco IOS command used to verify that either the Cisco IOS image, the configuration files, or both, have been properly backed up and secured

The #secure boot-config global configuration takes a snapshot of the router running configuration and securely archives it in persistent storage.

aaa new-model CLI configuration command must be enabled before any user views can be created.

aaa accounting exec start-stop tacacs+ = enables logging of the start and stop records for user terminal sessions on the router.

#sh run | include username (gives) username test secret 5 … => the user password is hashed using MD5.

#enable secret level 5 password => sets the enable secret command to privilege level 5.

Common examples of AAA implementation on Cisco routers includes: authenticating remote users over an IPsec VPN, authenticating administrator access to console/AUX/vty ports, and performing router commands authorization using TACACS+.

An important factor when implementing syslogging = synchronize clocks on the network with a protocol such as NTP.

Synchronizing clocks on hosts and devices is an important step to take when implementing secure networking management.

SSH secures router management session traffic.

Role-based CLI router management feature provides the ability to configure multiple administrative views.

When configuring role-based CLI on a Cisco router, the first step is to enable the root view on the router.

When the RSA key is generated for a Cisco router, to prepare for secure device management the SSH protocol is automatically enabled.

Example Syslog output:
The syslog message shown tells us that service timestamps have been globally enabled, and the message is a level 5 notification message
Feb 9 11:12:13 GMT: %SYS-5-CONFIG_I: Configured from console by vty0 (10.2.2.6)

Example router security:
Router in quiet mode for 93 more seconds and configured with “if more than 2 login failures occur in 100 seconds or less, logins will be disabled for 100 seconds” means three or more login requests have failed within the last 100 seconds.

Example AAA:
ROUTER(config)# username admin privilege level 15 secret hardt0ckRackPw
ROUTER(config)# aaa new-model
ROUTER(config)# aaa authentication login default tacacs+
ROUTER(config)# aaa authentication login test tacacs+ local
ROUTER(config)# line vty 0 4
ROUTER(config-line)# login authentication test
ROUTER(config-line)# line con 0
ROUTER(config-line)# end
Note: Here the authentication method list used by the vty port is named test.

The no service password-recovery command will disable the ROMMON (ROM Monitor.)

The MD5 algorithm takes a variable-length message and produces a 128-bit message digest.

7 Implementing AAA Using Cisco IOS and the ACS Server

RADIUS combines authentication and authorization in one process.

TACACS+ protocol characteristics:
> Uses TCP (port 49)
> Separates the authentication, authorization, and accounting functions
> Encrypts the entire body of the packet
> Supports authorization of router commands on a per-user or per-group basis

RADIUS protocol characteristics:
> Uses UDP
> Combines the authentication and authorization functions
> Encrypts the password only
(and ‘Has no option to authorise router commands’)

AAA: Local and enable authentication methods should be used as the final method to ensure login, in case external AAA server fails.

Two characteristics of TACACS+ protocol: separates AAA functions and encrypts the body of every packet.

8 Securing Layer 2 Technologies

CAM overflow attack is a Layer 2 attack that causes a switch to flood all incoming traffic to all ports.

STP attack = a layer 2 attack where an attacker broadcasts BDPUs with a lower switch priority.

Native VLANs for trunk ports should never be used anywhere else on the switch.

Best practice when configuring trunking on a switch port is to configure an unused VLAN as the native VLAN.

The best way to prevent a VLAN hopping attack is to disable DTP negotiations.

When implementing VLAN trunking, an additional configuration parameter which should be added to the trunking configuration is: # switchport nonnegotiate

Two methods to mitigate rogue layer 2 device interception of traffic from multiple VLANs – set the native VLAN on the trunk ports to an unused VLAN and disable DTP on ports that require trunking.

Port security enabled on a Cisco Catalyst switch: default action when configured maximum number of allowed MAC addresses value is exceeded = the port is shut down.

The root guard feature should be deployed toward ports that connect to switches that should not be the root bridge.

Two switches with same default priority, the switch with the lower MAC address becomes the root bridge.

CLI Example: to configure an interface on a switch to limit the maximum number of MAC addresses that are allowed to accesss the port to two and to shutdown the interface when there is a violation:
SW1> enable
SW1# config t
SW1(config)# int fa0/12
SW1(config-if)# switchport mode access
SW1(config-if)# switchport port-security maximum 2
SW1(config-if)# switchport port-security violation shutdown
SW1(config-if)# no shut
SW1(config-if)# exit
SW1(config)# do copy run start
SW1(config)# end
SW1# sh port-security interface fa0/12

9 Securing the Data Plane in IPv6

Two built-in features of IPv6 = native IPsec and mobile IP

IPv6 unicast address types: Global, Link-local, 6to4, Site-local

11 Using Access Control List for Threat Mitigation

Cisco IOS extended ACL defined by 100 to 199 and 2000 to 2699.

Extended ACLs are recommended as close to the source traffic as possible.

Cisco IOS access control lists are configured with wildcard masking.

Cisco IOS access control lists are processed from top down.

True statements regarding applying access control lists to a Cisco router:
> Place more specific ACL entries at the top of the ACL
> Router-generated packets cannot be filtered by ACLs on the router
> If an access list is applied but it is not configured, all traffic passes

Characteristics of a static packet filter firewall rule:
> Can permit or deny traffic based on IP address
> Can permit or deny traffic based on protocol
> Can permit or deny traffic based on source and destination ports

When configuring ACLs to control say Telnet traffic destined to the router for example – the ACL should be applied to all vty lines in the direction in to prevent an unwanted user from connection to an unsecured port.

A standard ACL applied to interface Serial 0, if traffic being filtered by the ACL does not match the configured ACL statements for Serial 0 then the traffic is dropped.

12 Understanding Firewall Fundamentals

A stateful packet filter firewall is considered the versatile and most commonly used firewall technology.

A stateful firewall allows modification of security rule sets in real time to allow return traffic.

A state table is used to keep track of the connections through the firewall.

An access control list applied to a router interface only filters traffic that passes through the router.

Information stored in the stateful session flow table: the source and destination IP address, port numbers, TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular session.

That it cannot detect application-layer attacks is a potential security weakness of a traditional stateful firewall.

13 Implementing Cisco IOS Zone-Based Firewalls

Cisco IOS zone-based policy firewall: 3 actions that can be applied to a traffic classpass, inspect, and drop.

Cisco IOS zone-based policy firewall default > 3 types of traffic permitted by the router when some of the router interfaces are assigned to a zone:
> traffic flowing to and from the router interfaces (the self-zone)
> traffic flowing among interfaces that are members of the same zone
> traffic flowing among the interfaces that are not assigned to any zone

On Cisco ISR routers, the realm-cisco.pub public encryption key is used to verify the digital signature of the IPS signature file.

Two characteristics of the CCP Security Audit Wizard: displays a screen with fix-it check boxes to let you choose which potential security-related configuration changes to implement; and; requires users to first identify which router interfaces connect to the inside network and which connect to the outside network.

A source and destination zone with a zone pair but no policy exists, result = drop.

Two protocols that enable the CCP to pull IPS alerts from a Cisco ISR router = syslog and SDEE (Security Device Event Exchange)

Example:
Class-map: TEST-Class (match-all)
Match: access-group 110
Match: protocol http
Inspect ……………
Class-map: class-default (match-any)
Match: any
Drio (default action)
Result: Stateful packet inspection will be applied only to HTTP packets that also match ACL 110.

Example:
interface E0
ip address 10.20.20.20 255.255.255.0
ip access-group 101 in
Access-list 101 permit tcp 10.20.20.0 0.0.0.255 any
Access-list 101 permit tcp 10.20.20.0 0.0.0.255 any
Access-list 101 permit tcp 10.20.20.0 0.0.0.255 any
Note: Access-list 101 will prevent address spoofing from interface E0 (because only let 10.20.20.0 traffic out!)

14 Configuring Basic Firewall Policies on Cisco ASA

True statements about Cisco ASA appliance:
> The DMZ interface(s) on the Cisco ASA appliance most typically use a security level between 1 and 99
> The Cisco ASA appliance supports Active/Active or Active/Standby failover
> The Cisco ASA appliance uses security contexts to virtually partition the ASA into multiple virtual firewalls

The Cisco ASA appliance interface ACL configurations use netmasks instead of wildcard masks (unlike Cisco IOS routers.)

Two options that are advantages of an application layer firewall: makes DoS attacks difficult and authenticates individuals.

Dynamic PAT = a type of NAT where you translate multiple internal IP addresses to a single global, routable IP address.

Configure static NAT if a host on the external network requires access to an internal host.

Cisco ASA access lists: object groups can be configured to match multiple entries in a single statement.

15 Cisco IPS/IDS Fundamentals

IPS
> Can stop the attack trigger packet
> Can use stream normalization techniques
> Has some impact on network latency and jitter
> Deployed in inline mode

IDS
> No network impact if there is a sensor overload
> Allows malicious traffic to pass before it can respond
> Deployed in promiscuous mode
> More vulnerable to network evasion techniques.

Risk rating is an IPS technique commonly used to improve accuracy and context awareness, aiming to detect and respond to relevant incidents only and therefore, reduce noise.

False positive = an alarm that is triggered by normal traffic or a benign action
False negative = a signature that is not fired when offending traffic is detected
True positive = generates an alarm when offending traffic is detected
True negative = a signature is not fired when non-offending traffic is captured and analysed

Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.

16 Implementing IOS-Based IPS

A large enterprise with many remote locationsbest place to deploy Cisco IOS IPS solution is at the remote branch offices.

The Cisco IOS IPS product – an integrated services router which offers an inline, deep-packet inspection feature

The benefit of using Cisco IOS IPS is that it uses the underlying routing infrastructure to provide an additional layer of security.

4 tasks when configuring the Cisco IOS IPS using CCP IPS wizard:
> select the interface(s) to apply the IPS rule
> select the traffic flow direction that should be applied by the IPS rule
> specify the signature file and the Cisco public key
> specify the configuration location and select the category of signatures to be applied to the selected interface(s)

Using CCP to enable Cisco IOS IPS, the signature must be enabled, unretired, and successfully compiled before any actions can be taken when an attack matches that signature.

IPS Detection Approaches:
Policy based = only allows HTTPS traffic to the web servers (for example)
Anomaly based = detects unexpected traffic spikes
Signature based = detects attacks based on known attack fingerprints
Reputation based = detects events based on correlations with a blacklist downloaded from a dynamically updated database

Disabled signatures (when using Cisco IOS IPS) still consume router resources.

Signature-based type of intrusion prevention technology is the primary type used by the Cisco IPS security appliances.

Cisco IOS IPS on Cisco IOS Release 12.4(11)T and later uses Cisco IPS 5.x signature format.

17 Fundamentals of VPN Technology

Diffie-Hellman provides a way for two peers to establish a shared-secret key, which only they will know, even though they are communicating over an unsecured channel.

Two functions required for IPsec operations: using IKE to negotiate the SA and using Diffie-Hellman to establish a shared-secret key.

Diffie-Hellman is used to establish a symmetric shared key via a public key exchange process.

Asymmetric encryption algorithms use different keys for encryption and decryption of data.

Pre-shared key can be used to authenticate the IPsec peers during IKE Phase 1.

3 modes of access that can be delivered by SSL VPN = full tunnel client, thin client and clientless.

Asymmetric encryption: The sender encrypts the data using the receiver’s public key, and the receiver decrypts the message using the receiver’s private key.

Symmetric encryption: The sender encrypts the message with a particular cryptosystem using the secret key and the receiver decrypts the message with the same key.

True statements about SSL-based VPNs: asymmetric algorithms are used for authentication and key exchange; and the authentication process uses hashing technologies.

Symmetric algorithms include: DES, 3DES, AES, IDEA, CAST5, BLOWFISH, TWOFISH
Asymmetric algorithms include: RSA, Diffie-Hellman, Elliptical Curve, DSA, ELGAMAL

19 Fundamentals of IP Security

IKE Phase 1:
1.1 Negotiate IKE policy sets and authenticate peers
1.2 Perform a Diffie-Hellman Exchange
IKE Phase 2:
2.1 Negotiate IPsec security policies
2.2 Establish IPsec SAs
2.3 Perform an optional Diffie-Hellman exchange

20 Implementing IPsec Site-to-Site VPNs

Confidentiality and Data Integrity are two services provided by IPsec.

crypto ipsec transform-set 3 esp-aes 256 esp-sha-hmac will provide strong protection

Using the CCP site-to-site VPN wizard to implement a site-to-site IPsec VPN using pre-shared key, requires:
> the interface of the VPN connection
> the VPN peer IP address
> the interesting traffic (the traffic to be protected)
> the pre-shared key

True statements about the IPsec ESP (Encapsulating security payload) modes of operation: Tunnel mode is used between a host and a security gateway + tunnel mode is used between two security gateways + transport mode leaves the original IP header in the clear.

21 Implementing SSL VPNs Using Cisco ASA

IP address pool is required only for Cisco AnyConnect full tunnel SSL VPN access and not required for clientless SSL VPN.

Purpose of the Cisco ASA appliance web launch SSL VPN feature is to enable users to login to a web portal to download and launch the AnyConnect client.

4 types of VPN supported using Cisco ISRs and Cisco ASA appliances:
> SSL clientless remote-access VPNs
> SSL full-tunnel client remote-access VPNs
> IPsec site-to-site VPNs
> IPsec client remote-access VPNs

A Miscellaneous/Uncategorized

Cisco Security Manager tool can centrally provision all aspects of device configuration across the Cisco family of security products.

PVLAN Edge (Private VLAN Edge – protected ports): The switch does not forward any traffic from one protected port to any other protected port.

Two features of Cisco IronPort Security Gateway: spam protection and email encryption.

Consistent cloud-based policy is a feature of Cisco ScanSafe technology.

The Secure Network Platform characteristic is the foundation of Cisco Self-Defending Network technology.

Lab Training Example with the Cisco Configuartion Professional

CCP Example: how to find properties included in the inspection Cisco Map OUT_SERVICE
Example result: FTP, HTTP, P2P, ICMP

CCP Example: how to find the NAT address assigned by ACL 1
Example result: 192.168.1.0/25

CCP Example: how to find which Class Map is used by INBOUND Rule
Example results: Class-map-ccp-cls-2

CCP Example: how to find which policy is assigned to Zone Pair sdm-zip-OUT-IN?
Example result: ccp-policy-ccp-cls-2

CCP Example: how to find what is included in the Network Object Group INSIDE?
Example result: network 175.25.133.0/24 and network 10.0.10.0/24

Comments