INTERNET SERVICE PROVIDER SECURITY BEST PRACTICES
|
|
|
- Arlene Washington
- 10 years ago
- Views:
Transcription
1 INTERNET SERVICE PROVIDER SECURITY BEST PRACTICES SESSION 1 Agenda A Brief Review Management Plane/Device Security Control Plane Data Plane Summary/Next Steps 2.scr
2 A BRIEF REVIEW 3 Denial of Service and ISPs DoS can Target an ISP Target an ISP s customer Target the core of the Internet Attacks are part of every day operations and can be of high severity with a profit motivation! Proper preparation can dramatically reduce affects of DoS attacks 4.scr
3 Goal: Secure the Internet ISPs compete In security, ISPs need to cooperate The security of the Internet is a concern for all Only a secure Internet will be sellable long term 5 What Do ISPs Need to Do? Protect themselves Help protect their customers from the Internet Protect the Internet from their customers 6.scr
4 How to Do It? Work with Operations Groups, Standards Organisations, and Vendors on new solutions Implement Best Common Practices (BCPs) ISP Infrastructure security ISP Network security ISP Services security 7 The Three Planes Data Plane Control Plane Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets ToFab to other Line Cards Management Plane RAW Queue(s) Also called CPU Queue(s) and Punt Queue(s) Punted Packets Packets bound for the LC CPU or RP ASIC s Supporting CPU Receive Path Packets To the GRP or PRP 8.scr
5 What Is a Punt? Packets that need to be sent to the RP: Packets sent to a network device (receive adjacencies) Broadcast and multicast packets Logged packets (ACLs or unicast RPF with logging enabled) Packets with IP Options set Packets which cannot be immediately forwarded to a destination and require ARP/ICMP generation: Packets blocked by ACLs Packets with unknown destination Packets with expired TTL Destinations lacking a next-hop adjacency 9 MANAGEMENT PLANE / DEVICE SECURITY 2003, 2004 Cisco Systems, Inc. All rights reserved. 10.scr
6 Disable Unneeded Services No service finger No service udp-small-servers No service tcp-small-servers No ip http server No ip redirects No ip directed-broadcast No ip proxy-arp 11 Cisco Discovery Protocol CDP can be used to learn information about neighboring devices that are running CDP IP address, software version CDP is configured per interface Disable CDP when it isn t needed Public facing interfaces 12.scr
7 Source Routing / IP Options IP has a provision to allow source IP host to specify route through Internet ISPs should turn this off, unless it is specifically required: no ip source-route Packets with IP Options can be dropped or the options can be ignored (12.0(23)S / 12.3(4)T): ip options drop ip options ignore 13 ICMP Unreachable Overload Packets that cannot be forwarded are punted for ICMP Unreachable generation. Risk high number of unreachables overloading CPU no ip unreachables All Routers with any static route to Null0 should put no ip unreachables If Unreachables are needed, use ICMP Unreachable Rate-Limiting Command: ip icmp rate-limit unreachable [DF] < millisecond> no ip icmp rate-limit unreachable [df] Default is 500 milliseconds 14.scr
8 What Ports Are Open on the Router? It may be useful to see what sockets/ports are open on the router Show ip sockets show some of the UDP ports opened IOSRouter#show ip sockets ProtoRemote Port Local Port In Out Stat TTY OutputIF listen What Ports Are Open on the Router? Two steps required for TCP ports: show tcp brief all show tcp tcb GSR-1#sh tcp bri all TCB Local Address Foreign Address (state) 52F6D ESTAB 52F7065C ESTAB 52F6CD8C *.* *.* LISTEN 537D0944 * * LISTEN 537CE2C4 * * LISTEN 16.scr
9 Network Time Protocol Synchronize time across all devices When security event occurs, data will have consistent timestamps From external time source: Upstream ISP, Internet, GPS, atomic clock From internal time source Router can act as stratum 1 time source ntp source loopback0 ntp server source loopback0 ntp authenticate ntp authentication-key number md5 value 17 Configuring Syslog on a Router Syslog data is invaluable Attack forensics Day to day events and debugging To log messages to a syslog server host, use the logging global configuration command logging host logging trap level To log to internal buffer use: logging buffered size Ensure timestamps and sequence numbers service timestamps log service sequence-numbers 18.scr
10 Config Change Notification and Logging Allows the tracking of configuration changes entered on a persession and per-user basis by implementing a configuration log. Tracks each configuration command that is applied, who applied the command, the parser return code for that command, and the time that the command was applied. Adds a notification mechanism that sends asynchronous notifications to registered applications whenever the configuration log changes Available 12.3(4)T on 1700, 2600, 3600, 3700, 7200, 7500, AS5xxx oducts_feature_guide09186a00801d1e81.html Also Contextual Configuration Diff utility oducts_feature_guide09186a00801d1dc2.html 19 SNMP Version 1 sends cleartext community strings and has no policy reference Version 2 addresses some of the known security weaknesses of SNMPv1 Version 3 provides authentication, encryption Not widely deployed Confirm NMS application support See NMS-2051 for additional detail. RFC-2570 Introduction to Version 3 of the Internet-standard Network Management Framework Recommended 20.scr
11 SNMP v1/2 Authentication and Authorization Line ACL can filter SNMP access SNMP Filtering RO read only RW read write View MIB restriction access-list 4 permit snmp-server community <string> RO 4 snmp-server community <string> view <MIB view> 21 New Features CPU and Memory Threshold Notification CPU Threshold Notification 12.0(26)S, 12.3(4)T Generates an SNMP trap message when a predefined threshold of CPU usage is crossed products_feature_guide09186a00801b3a4a.html Memory Threshold Notification 12.0(26)S and 12.2(18)S If available free processor or I/O memory falls below the specified thresholds, the router will log an event. Network operations staff can investigate, and if necessary take action, before router performance is impacted or free memory becomes so low that the router is in danger of crashing. products_feature_guide09186a00801b1bee.html 22.scr
12 NetFlow Initially designed as a switching path but now the primary network accounting technology in the industry. NetFlow is the emerging standard traffic engineering / capacity planning technology. NetFlow is the primary network anomaly-detection technology. See SEC-2008 and NMS-2032 for details. 23 Access to the Router Console Telnet SSH Encrypted Access Local passwords Username based on the router External AAA TACACS+, RADIUS, Kerberos One-Time Passwords (OTP) 24.scr
13 Use Enable Secret Service password-encryption is reversible service password-encryption! hostname Router! enable password C0E2A2B182A2824 The enable secret password hashed via MD5! Hostname Router! enable secret 5 $1$hM3l$.s/DgJ4TeKdDkTVCJpIBw1 25 VTY Security Access to VTYs should be controlled ACL used to filter incoming data Logging can be used to provide more information access-list 3 permit access-list 3 deny any line vty 0 4 access-class 3 in transport input ssh transport output none 26.scr
14 SSH Replaces telnet for a protected command and control communication channel Privacy and integrity provided through the use of strong cryptographic algorithms Supports TACACS+, RADIUS and Local Authentication Secure Copy (SCP) available in new SSH enabled code Restrict access to ssh via transport input ssh command SSHv2 now in IOS (12.3(4)T / 12.1(19)E) 27 Banners Login Banner This is a legal requirement in some jurisdictions; check with your legal group banner login ^ Authorised access only This system is the property of Galactic Internet Disconnect IMMEDIATELY if you are not an authorised user! Contact [email protected] for help. ^ 28.scr
15 Banners Exec Banner Used to remind staff of specific conditions: banner exec ^ PLEASE NOTE - THIS ROUTER SHOULD NOT HAVE A DEFAULT ROUTE! It is used to connect paying peers. These customers should not be able to default to us. The config for this router is NON-STANDARD Contact Network Engineering for more info. ^ 29 New Feature IOS Login Enhancements Login Enhancements Password Retry Delay Adds new flexibility to lock-out unwanted attempts to access the device Introduces a delay between successive failed Login attempts to alleviate dictionary attacks New global command login delay Generation of syslog messages for Login detection Available in 12.3(4)T ps5207/products_feature_guide09186a00801d1cb3.html 30.scr
16 Cisco IOS TACACS+ Login Authentication Encrypts Passwords with Encryption (7) Define List neteng to Use TACACS+ Define List tech to Use TACACS+ then the Local User and Password Enable Secret Overrides the (7) Encryption Define Local Users Secret Command md5! service password-encryption! hostname Router! aaa new-model aaa authentication login neteng group tacacs+ enable aaa authentication login tech group tacacs+ local aaa authentication enable default group tacacs+ enable enable secret 5 $1$hM3l$.s/DgJ4TeKdDk! username bill secret 5 $1$A4Um$1NkLTeSwxYynxIHD6zlfc1 31 Cisco IOS TACACS+ Login Authentication tacacs-server host tacacs-server key <key>! line con 0 login authentication neteng line aux 0 login authentication neteng line vty 0 4 login authentication tech! end Defines the IP Address of the TACACS+ Server Defines the Shared Key for Communicating with the TACACS+ Server Uses the Authentication Mechanisms Listed in neteng TACACS+ then Enable Password Uses the Authentication Mechanisms Listed in tech TACACS+ then a Local User/Password 32.scr
17 One-Time Passwords May be used with TACACS+ or RADIUS The same password will never be reused by an authorized administrator Key Cards CryptoCard token server included with Cisco Secure ACS Support for security dynamics and secure computing token servers in Cisco Secure ACS 33 Limit Authority Authorize Commands Differentiate staff authority on the router Help desk Operations Second level/third level support Use privilege levels (0 15) System Administrator Level 2: show, debug, ping Network Engineer Level 15: all commands Router 34.scr
18 Set Privileges Set level of privilege for each user class privilege configure level 5 interface privilege interface level 5 shutdown privilege exec level 5 show ip route privilege exec level 5 configure terminal privilege exec level 5 show running-config Initially difficult to deploy Long-term benefit outweighs short term pain Other options are TACACS+-based authorization or 35 New Feature Role Based CLI Access New Feature: Role-Based CLI, aka CLI Views Defines CLI access based on administrative roles Security Enhances the security of the device by defining the set of CLI commands that are accessible to a particular user Availability Avoids unintentional execution of CLI commands by unauthorized personnel Operational efficiency Prohibits users from viewing CLI commands that are inaccessible to them, greatly improving usability /products_feature_guide09186a00801ee18d.html 36.scr
19 Complete AAA Config aaa new-model aaa authentication login default tacacs+ local enable aaa authentication enable default tacacs+ local enable aaa authorization exec default tacacs+ local aaa authorization commands 1 default tacacs+ local aaa authorization commands 15 default tacacs+ local aaa accounting exec start-stop tacacs+ ip tacacs source-interface Loopback0 tacacs-server host Try first. tacacs-server host tacacs-server key CKr3t# If no reply use line vty 0 4 access-class 3 in username bill secret 5 $1$A4Um$1NkLTeSwxYynxIHD6zlfc1 37 New IOS Command: AutoSecure New CLI command that automates the configuration of security features and disables certain features enabled by default that could be exploited for security holes Router#auto secure [management forwarding] [no-interact] Implements a number of best practices to help secure the router Released in 12.3(1) Mainline and 12.3T Full details in 12.3 Mainline release documentation: s_feature_guide09186a008017d101.html 38.scr
20 Input Hold Queue Queue that stores packets destined for the router Input Hold Queue is important for initial BGP convergence (when you are sending the full table) DOS/DDOS attacks against the router can fill the input hold queue knocking out legitimate packets 39 Input Hold Queue Input Hold Queue is physically on the Route Processor (RP for 7500, GRP for 12000) Default is 75 Recommend 1500 (Check memory before applying looking for 20M free) improves BGP convergence with Internet routing table. Applied to all interfaces interface XXXXXX hold-queue 1500 in 40.scr
21 Input Hold Queue e10-2#sh inter pos 5/0 POS5/0 is up, line protocol is up. Output queue 0/40, 0 drops; input queue 97/1500, 54 drops 5 minute input rate bits/sec, packets/sec 5 minute output rate bits/sec, packets/sec.. 41 Selective Packet Discard (SPD) When a link goes to a saturated state, you will drop packets; the problem is that you will drop any type of packets including your routing protocols Selective Packet Discard (SPD) will attempt to drop non-routing packets instead of routing packets when the link is overloaded 42.scr
22 Selective Packet Discard (SPD) Input Hold Queue (default 75) SPD Headroom (default 100 in 12.0(22)S increased to 1000) SPD Extended Headroom (default 10) Interface Input Queue (Hold Queue) SPD Headroom SPD Extended Headroom Normal IP, BGP, ISIS, OSPF, HDLC BGP, ISIS, OSPF, HDLC ISIS, OSPF, HDLC 43 Monitoring SPD Queues You have a problem when you: See the number of priority packets drop (H) See the Fast Flushes increase (D) GSR-2#sh interface pos 0/0 switching POS0/0 Link to GSR#1 Throttle count A Drops RP B SP C SPD Flushes Fast D SSE E SPD Aggress Fast F SPD Priority Inputs G Drops H 44.scr
23 mbehring Monitoring SPD Modes SPD has three drop modes: NORMAL below threshold RANDOM min threshold has been reached MAX max threshold has been reached There is a problem when Current Mode is MAX GSR-2#sh ip spd Current mode: normal. Queue min/max thresholds: 73/100, Headroom: 1000, Extended Headroom: 100 IP normal queue: 0, priority queue: 0. SPD special drop mode: aggressively drop bad packets 45 Infrastructure Security telnet snmp outside core outside Why should outside devices be talking to your core? Infrastructure ACLs (iacl) Receive ACLs (racl) Control Plane Policing (CoPP) 46.scr
24 Infrastructure ACLs Basic premise: filter traffic destined TO your core routers Do your core routers really need to process all kinds of garbage? Develop list of required protocols that are sourced from outside your AS and access core routers Example: ebgp peering, GRE, IPSec, etc. Use classification ACL as required Identify core address block(s) This is the protected address space Summarization is critical simpler and shorter ACLs 47 Infrastructure ACLs Infrastructure ACL will permit only required protocols and deny ALL others to infrastructure space ACL should also provide anti-spoof filtering Deny your space from external sources Deny RFC1918 space Deny multicast sources addresses (224/4) RFC3330 defines special use IPv4 addressing 48.scr
25 Infrastructure ACLs Infrastructure ACL must permit transit traffic Traffic passing through routers must be allowed via permit ip any any ACL is applied inbound on ingress interfaces Fragments destined to the core can be filtered via fragments keyword Fragments pose a security risk: by default they are not filtered by ACLs Fragments are likely not needed access-list 101 deny/permit fragments 49 Infrastructure ACL in Action SRC: DST: any ACL in PR1 ACL in PR2 SRC: valid DST: Rx (any R) R1 R2 R3 SRC: ebgp peer DST: CR1 ebgp CR1 ACL in R4 R5 CR2 ACL in SRC: valid DST: external to AS (e.g. customer) 50.scr
26 Example: Infrastructure ACL! Deny our internal space as a source of external packets access-list 101 deny ip our_cidr_block any! Deny src addresses of and 127/8 access-list 101 deny ip host any access-list 101 deny ip any! Deny RFC1918 space from entering AS access-list 101 deny ip any access-list 101 deny ip any access-list 101 deny ip any 51 Example: Infrastructure ACL! The only protocol that require infrastructure access is ebgp. WE have defined both src and dst addresses access-list 101 permit tcp host peera host peerb eq 179 access-list 101 permit tcp host peera eq 179 host peerb! Deny all other access to infrastructure access-list 101 deny ip any core_cidr_block! Permit all data plane traffic access-list 101 permit ip any any 52.scr
27 Receive ACL s (7500/GSR) Excessive traffic destined to RP can lead to high CPU DoS Receive ACLs filter traffic destined to the RP via receive adjacencies racls explicitly permit or deny traffic destined to the GRP racls do NOT affect transit traffic Traffic is filtering on the ingress LC, prior to RP processing racls enforce security policy by filtering who/what can access the router 53 Receive Adjacencies CEF entries for traffic destined to router Real interfaces Loopbacks #sh ip cef Prefix Next Hop Interface / GigabitEthernet3/ / GigabitEthernet3/ /32 receive ( is an interface IP address) Packets with next hop receive are sent to the RP for processing 54.scr
28 Receive ACL Command Introduced in 12.0(21)S2/12.0(22)S ip receive access-list [number] Standard, extended or compiled ACL As with other ACL types, show access-list provide ACE hit counts Only affect IP protocols IS-IS permit statements not required Log keyword can be used for more detail 55 Receive ACL: Traffic Flow [no] ip receive access-list <num> GSR GRP i/f Line Card Line Card i/f IN OUT Receive-ACL Switch Packets to the Router Packets through the Router Receive-ACL IN OUT 56.scr
29 racl: Building Your ACL Develop list of required protocols OSPF, BGP, ssh, etc. e.g. access-list 110 permit tcp src_ip host loopback eq 22 Develop address requirements Determine interface on router Many interfaces? Loopback or real? Deployment is an iterative process Start with relatively open lists tighten as needed 57 racl: Summary Advantages Single point of protection for receive adjacencies Limitations Platform support - Only 7500 and GSR Binary Decision Can only permit or deny packets Some types of traffic can be either good or bad it would be nice to have rate-limiting capabilities 58.scr
30 Control Plane Policing (CoPP) CoPP leverages Modular QoS CLI (MQC) for QoS policy definition Consistent approach on all boxes Dedicated control-plane interface Single point of application Highly flexible: permit, deny, rate limit Extensible protection Changes to MQC (e.g. ACL keywords) are applicable to CoPP 59 Protecting the Control Plane CONTROL PLANE Management SNMP, Telnet ICMP IPv6 Routing Updates Management SSH, SSL.. INPUT to the Control Plane OUTPUT from the Control Plane CONTROL PLANE POLICING (Alleviating DoS Attack) SILENT MODE (Reconnaissance Prevention) Processor Switched Packets PACKET BUFFER OUTPUT PACKET BUFFER INCOMING PACKETS Locally Switched Packets CEF/FIB LOOKUP Infrastructure Security, 3/04 For Cisco Internal Use Only 60.scr
31 Configuring CoPP CoPP policy is applied to the control-plane itself Router(config)# control-plane Router(config-cp)# service-policy input control-plane-policy Three Step Process: Define classes of traffic Create class-map s Define actual QoS policy (application of rate-limiting to traffic classes) Create policy-map s Apply CoPP policy to control plane interface 61 Sample CoPP Configuration Router(config)# access-list 140 permit tcp host any eq ssh Router(config)# access-list 140 permit udp host any eq snmp Router(config)# class-map mgmt-class Router(config-cmap)# match access-group 140 Router(config-cmap)# exit Traffic to be ratelimited: SNMP and ssh from mgmt host Define class-map for Router(config)# policy-map control-plane-policy this traffic Router(config-pmap)# class mgmt-class Router(config-pmap-c)# police conform transmit exceed drop Router(config-pmap-c)# exit Router(config-pmap)# exit Define the policy for this class map: up to 80 kbps: transmit, else drop Router(config)# control-plane Router(config-cp)# service-policy input control-plane-policy Router(config-cp)# exit Apply policy: to control-plane 62.scr
32 Deploying CoPP What rate of TCP/179 traffic is normal or acceptable? racl are relatively simple to deploy Need BGP/OSPF/SNMP/etc Deny all else To get the most value from CoPP, detailed planning is required: Depends on how you plan to deploy it Bps vs. pps In vs. out 63 Deploying CoPP Easy answer: mimic racl behavior Same limitations as with racl Recommendations: Develop multiple classes of control plane traffic e.g critical, important, normal, undesirable, default Use ACLs to define traffic for each Depending on class defined, apply appropriate policy Critical: no rate limit Important: high rate limit Flexible class definition allows extension of model Fragments, TOS, ARP(!) 64.scr
33 Deploying CoPP: Challenges Every network is going to have different rate for all kinds of traffic Only time and experience will help Show commands can help with ACL hits and rate information Currently no log keyword Makes it hard to diagnose required traffic Real-world hardware vs. software performance implications GSR, Sup720 Deployment whitepaper: ucts_white_paper09186a f39.shtml 65 CoPP: Release Info / Availability Support being added in hardware in the Sup T 12.2S The control-plane policy is pushed down to the hardware forwarding engine(s), and the application of the CoPP policy (policing/dropping) performed in hardware. Supported in 12.3(4)T Supported in 12.2(18)S 12.0S (work in progress) 66.scr
34 CONTROL PLANE 2003, 2004 Cisco Systems, Inc. All rights reserved. 67 Routing Protocol Security Routing protocols can be attacked Denial of service Smoke screens False information Reroute packets Protect the routing protocol! Prefix Filtering Routing Protocol Authentication May Be Accidental or Intentional! 68.scr
35 What to Prefix Filter? Bogons IANA has reserved several blocks of IPv4 that have yet to be allocated to a RIR: Special-Use IPv4 Addresses Special Use Addresses (SUA) are reserved for special use :-) Defined in RFC3330: ftp://ftp.isi.edu/in-notes/rfc3330.txt Examples: , /24 These blocks of IPv4 addresses should never be advertised into the global Internet Route Table Filters should be applied on the AS border for all inbound and outbound advertisements 69 Where to Prefix Filter? Ingress Filter Customer s Prefixes AS 500 X W Egress Filter Prefixes to Internet. Ingress Filters Coming from Internet D AS 300 C E AS 400 Customer Filters In and Out N Customer A B AS 100 M AS scr
36 How to Prefix Filter? Ingress and Egress Route Filtering Two flavors of route filtering: Distribute list Widely used Prefix list Increasingly used Both work fine Engineering preference Two filtering techniques: Explicit Permit (permit then deny any) Explicit Deny (deny then permit any) 71 Ingress and Egress Route Filtering Extended ACL for a BGP Distribute List access-list 150 deny ip host any access-list 150 deny ip access-list 150 deny ip access-list 150 deny ip access-list 150 deny ip access-list 150 deny ip access-list 150 deny ip access-list 150 deny ip access-list 150 permit ip any any 72.scr
37 Ingress and Egress Route Filtering Prefix-List for a for a BGP Prefix List ip prefix-list rfc1918-dsua deny /8 le 32 ip prefix-list rfc1918-dsua deny /8 le 32 ip prefix-list rfc1918-dsua deny /8 le 32 ip prefix-list rfc1918-dsua deny /16 le 32 ip prefix-list rfc1918-dsua deny /12 le 32 ip prefix-list rfc1918-dsua deny /24 le 32 ip prefix-list rfc1918-dsua deny /16 le 32 ip prefix-list rfc1918-dsua deny /3 le 32 ip prefix-list rfc1918-dsua permit /0 le Ingress and Egress Route Filtering BGP Route Filtering router bgp 200 no synchronization bgp dampening neighbor remote-as 210 neighbor version 4 neighbor distribute-list 150 in neighbor distribute-list 150 out neighbor remote-as 220 neighbor version 4 neighbor prefix-list rfc1918-dsua in neighbor prefix-list rfc1918-dsua out no auto-summary 74.scr
38 Prefix Filter All Routes from Customers! ISPs should only accept prefixes which have been assigned or allocated to their downstream peer/customer Example: Customer has /20 block Customer should only announce this block upstream You should only accept this prefix from them Explicitly permit prefixes from other ISPs (i.e. multihomed customer) Prefix Filter Prefix Filter Prefix Filter Prefix Filter Customer ISP Peer 75 Prefix Filter All Routes to Peers! What do you send to the Internet? Your prefixes More specific customers prefixes (customers who are multihoming) What do you not send to the Internet? Special Use Addresses and Bogons assume garbage will leak into your ibgp Lower Prefix Boundary Unless absolutely necessary, do not allow anything in the /25 /32 range The egress filter list can grow to be very large More specifics for customers Specific blocks from other ISPs Prefix Filter Prefix Filter Prefix Filter Prefix Filter Customer ISP Peer 76.scr
39 Prefix Filter All Routes from Peers! Ingress Routes from Peers and/or the Upstream ISP are the nets of the Internet Ideally, the peering policy should be specific so that exact filters can be put in place Dynamic nature of the peering makes it hard to maintain specific route filters Don t accept RFC1918 etc prefixes Don t accept your own prefix Don t accept default (unless you need it) Don t accept prefixes longer than/24 Prefix Filter Prefix Filter Prefix Filter Prefix Filter Customer ISP Peer 77 Secure Routing Route Authentication Configure Routing Authentication Signs Route Updates Campus Verifies Signature Signature Route Updates Certifies Authenticity of Neighbor and Integrity of Route Updates 78.scr
40 Route Authentication Authenticates routing update packets Shared key included in routing updates Plain text Protects against accidental problems only Message Digest 5 (MD5) Protects against accidental and intentional problems Often non-implemented Never seen an attack My peer doesn t use it 79 Route Authentication Multiple keys supported Key lifetimes based on time of day Use first valid key Supported for BGP, IS-IS, OSPF, RIPv2, and EIGRP Syntax differs depending on routing protocol 80.scr
41 OSPF and ISIS Authentication Example OSPF ISIS interface ethernet1 ip address ip ospf message-digest-key 100 md5 qa*>hh3! router ospf 1 network area 0 area 0 authentication message-digest interface ethernet0 ip address ip router isis isis password pe#$rt@s level-2 81 BGP Route Authentication router bgp 200 no synchronization neighbor remote-as 300 neighbor description Link to Excalabur neighbor send-community neighbor version 4 neighbor soft-reconfiguration inbound neighbor route-map Community1 out neighbor password 7 iuhg9287dhsa7swk 82.scr
42 BGP Route Authentication Works per neighbor or for an entire peer-group Two routers with password mis-match: %TCP-6-BADAUTH: Invalid MD5 digest from [peer's IP address]:11004 to [local router's IP address]:179 One router has a password and the other does not: %TCP-6-BADAUTH: No MD5 digest from [peer's IP address]:11003 to [local router's IP address]: DATA PLANE 2003, 2004 Cisco Systems, Inc. All rights reserved. 84.scr
43 RFC 2827/BCP 38 Ingress Packet Filtering Your customers should not be sending any IP packets out to the Internet with a source address other then the address you have allocated to them! ftp://ftp.isi.edu/in-notes/rfc2827.txt 85 BCP 38 Packet Filtering Principles Filter as close to the edge as possible Filter as precisely as possible Filter both source and destination where possible 86.scr
44 Techniques for BCP 38 Filtering Static ACLs on the edge of the network Unicast RPF Strict Mode Cable source verify (DHCP) Dynamic ACLs with AAA profiles IP Source Guard 87 Static BCP 38 Ingress Packet Filtering ISP s Customer Allocation Block: /19 BCP 38 Filter = Allow Only Source Addresses from the Customer s 96.0.X.X/24 Access-list 101 permit any applied inbound /24 Internet ISP / /24 Access-list 101 permit any applied inbound /24 88.scr
45 Unicast Reverse Path Forwarding (urpf) CEF is required IP packet source address is checked to ensure that the route back to the source is valid Two Flavors of urpf: Strict Mode for: BCP 38/RFC 2827 Filters on Customer Ingress Edge Loose Mode for: ISP-to-ISP Edge Remotely Triggered Black Hole Filtering (See SEC-2008 for additional detail) Care required in multihomed situations 89 urpf Strict Mode A simple and scalable implementation of BCP 38: How do you manage BCP 38 ACLs for over 10,000 lease line customers? One command that automatically configures BCP 38 filtering? It would be really nice if the line engineer who first brings up the customer interface can configure this feature without needing to create ACLs or touch the routing protocols! It would be nice if the filter could be automatically updated! Use urpf!!! 90.scr
46 Strict urpf Check (Unicast Reverse Path Forwarding) router(config-if)# ip verify unicast reverse-path or: ip verify unicast source reachable-via rx i/f 1 S D data i/f 2 i/f 3 i/f 1 S D data i/f 2 i/f 3 FIB:... S -> i/f 1... Same i/f: Forward FIB:... S -> i/f 2... Other i/f: Drop 91 Loose urpf Check (Unicast Reverse Path Forwarding) router(config-if)# ip verify unicast source reachable-via any i/f 2 i/f 2 i/f 1 S D data i/f 3 i/f 1 S D data i/f 3 FIB:... S -> i/f x... Any i/f: Forward FIB:......?... Not in FIB or route -> null0: Drop 92.scr
47 Deploying urpf Single-homed Customers urpf provides simple, easy way to deploy BCP 38 filtering Simple config for many customers Dual-homed Customers Asymmetric Routing Must tweak routing Use BGP Weight, local_pref to ensure consistent best path urpf can be used with dual homed customers with proper engineering 93 Unicast RPF Verification Commands: show ip traffic include RPF show ip interface ethernet 0/1/1 include RPF debug ip cef drops rpf <ACL> Router# show ip traffic IP statistics: Rcvd: total, local destination Drop: 3 encapsulation failed, 0 unresolved, 0 no adjacency 0 no route, 0 unicast RPF, 0 forced drop 94.scr
48 SUMMARY / NEXT STEPS 2003, 2004 Cisco Systems, Inc. All rights reserved. 95 Summary/Next Steps Protecting your infrastructure is your #1 priority Proper router configuration is critical first step in increasing security Develop baseline configuration for your various platforms Audit to ensure compliance with standard Develop procedures for introducing new routers into the network Once a solid foundation has been deployed, advanced DoS mitigation techniques can be deployed 96.scr
49 THANK YOU! Q & A 2003, 2004 Cisco Systems, Inc. All rights reserved. 97 Tools: SNMP Open source SNMP command-line tools, library, trapgenerator, agent, etc. available from Open source SNMP visualization, storage, and graphing tools developed by Tobi Oetiker: MRTG the Multi Router Traffic Grapher RRDTool the Round Robin Database Tool Commercial systems such as HP OpenView, Micromuse NetCool, IBM Tivoli, CA Unicenter Several open source systems - Big Brother ( Big Sister ( Nagios ( and others 98.scr
50 Tools: NetFlow OSU FlowTools Open source NetFlow collection and retrieval tools developed and maintained by Mark Fullmer, available from: FlowScan Open source NetFlow graphing/visualization tools developed and maintained by Dave Plonka, available from: Arbor Networks Peakflow products NetFlow-Based Traffic Characterization and Anomaly Detection: 99 Tools: Syslog LogAnalysis.org has references to numerous logging and analysis tools in their Library: Syslog-ng from BalaBit adds a lot of useful functionality: scr
51 SP Security Reference Material ISP Essentials ftp://ftp-eng.cisco.com/cons/ SP Security Information (whitepapers and bootcamp): ftp://ftp-eng.cisco.com/cons/isp/security/ ftp://ftp-eng.cisco.com/cons/isp/security/cpn-summit- 2004/ NANOG Security Curriculum Cisco Security Reference Material Cisco Security Reference Information Improving Security on Cisco Routers Cisco Product Security Advisories and Notices scr
52 Cisco Feature Reference Material Infrastructure / Transit ACL Reference racl Command Reference products_feature_guide09186a00800a8531.html Control Plane Policing Deployment Whitepaper products_white_paper09186a f39.shtml Access Lists and IP Fragments Cisco Feature Reference Material Understanding Selective Packet Discard (SPD) s167/products_tech_note09186a008012fb87.shtml Cisco Netflow Page Cisco SNMP Page otocol_home.html SNMP Object Navigator scr
53 External Reference Material Secure Cisco IOS Template Secure BGP Template Bogon List Dave Dittrich s DDoS Page External Reference Material BCP-38 (RFC-2827) Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing ftp://ftp.isi.edu/in-notes/rfc2827.txt RFC-3330 Special-Use IPv4 Addresses ftp://ftp.isi.edu/in-notes/rfc3330.txt 106.scr
54 Associated Sessions SEC-2004 Responding to Security Incidents SEC-2008 Service Provider Responses to Denial of Service Attacks NMS-2032 NetFlow for Accounting, Analysis and Attack NMS-2051 Securely Managing Your Network and SNMPv3 107 Recommended Reading Cisco ISP Essentials ISBN Network Security Principles and Practices ISBN Inside Cisco IOS Software Architecture ISBN Available on-site at the Cisco Company Store 108.scr
55 Complete Your Online Session Evaluation! WHAT: WHY: Complete an online session evaluation and your name will be entered into a daily drawing Win fabulous prizes! Give us your feedback! WHERE: Go to the Internet stations located throughout the Convention Center HOW: Winners will be posted on the onsite Networkers Website; four winners per day scr
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
Internet Infrastructure Security Technology Details. Merike Kaeo [email protected]
Internet Infrastructure Security Technology Details Merike Kaeo [email protected] Securing The Device Agenda Item Think of ALL Devices The following problem was reported last year and affects
How To Protect Your Network From Attack From A Router (Ip) On A Network (Ip-Net) On An Ip-Net (Ipnet) (Ip Ip) (Net) And Ip-Lan (Ipip) (Lan) (
SERVICE PROVIDER INFRASTRUCTURE SECURITY BEST PRACTICES Yusuf Bhaiji Cisco Systems 1 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Security Audit CHAPTER21. Perform Security Audit
CHAPTER21 Perform is a feature that examines your existing router configurations and then updates your router in order to make your router and network more secure. is based on the Cisco IOS AutoSecure
Hardening Network Devices. PacNOG15 Network Security Workshop
Hardening Network Devices PacNOG15 Network Security Workshop Last updated 15 July 2014 1 Limiting Device Access 2 Think of ALL Devices p The following problem was reported last year and affects low-end
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Network Core Infrastructure Protection: Best Practices
Network Core Infrastructure Protection: Best Practices Roland Dobbins Solutions Architect +66-83-266-6344 BKK mobile +65-8396-3230 SIN mobile Arbor Public Agenda Infrastructure Protection
Configuring Control Plane Policing
CHAPTER 53 This chapter describes how to configure control plane policing (CoPP) with Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see
Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top
Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Network Security Knowledge is Everything! Network Operations
Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer [email protected] Agenda What is Network Security General Configuration Security Logging and
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
Network security includes the detection and prevention of unauthorized access to both the network elements and those devices attached to the network.
By: Ziad Zubidah CCNP Security IT Security Officer National Information Technology Center Network security includes the detection and prevention of unauthorized access to both the network elements and
Table of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1
CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA. Gaurab Raj Upadhaya [email protected] Packet Clearing House What are Best Practices Established or
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Center for Internet Security Gold Standard Benchmark for Cisco IOS
Center for Internet Security Gold Standard Benchmark for Cisco IOS Level 1 and 2 Benchmarks Version 2.1 http://www.cisecurity.org [email protected] September 2, 2003 Abstract This document defines
NetFlow Policy Routing
NetFlow Policy Routing Feature Summary NetFlow policy routing (NPR) integrates policy routing, which enables traffic engineering and traffic classification, with NetFlow services, which provide billing,
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
UNICAST REVERSE PATH FORWARDING ENHANCEMENTS FOR THE INTERNET SERVICE PROVIDER INTERNET SERVICE PROVIDER NETWORK EDGE
WHITE PAPER UNICAST REVERSE PATH FORWARDING ENHANCEMENTS FOR THE INTERNET SERVICE PROVIDER INTERNET SERVICE PROVIDER NETWORK EDGE HIGHLIGHTS New additions to Unicast Reverse Path Forwarding (urpf) that
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
- QoS and Queuing - Queuing Overview
1 Queuing Overview - QoS and Queuing - A queue is used to store traffic until it can be processed or serialized. Both switch and router interfaces have ingress (inbound) queues and egress (outbound) queues.
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
CISCO IOS FIREWALL DESIGN GUIDE
CISCO IOS FIREWALL DESIGN GUIDE http://www.cisco.com/en/us/prod/collateral/vpndevc/ps5708/ps5710/ps1018/product_implement ation_design_guide09186a00800fd670.html I'm going to go through this document now..i'll
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv
BGP Support for IP Prefix Import from Global Table into a VRF Table The BGP Support for IP Prefix Import from Global Table into a VRF Table feature introduces the capability to import IPv4 unicast prefixes
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
One-Step Lockdown with Cisco SDM
One-Step Lockdown with Cisco SDM Router Hardening Automagically The process of turning off unnecessary services is called hardening a router to prevent attacks or exploits. The basic steps of router hardening
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Sink Holes. A Swiss Army Knife ISP Security Tool. Version 1.5. Barry Raveendran Greene -- [email protected] Danny McPherson -- danny@arbor.
Sink Holes A Swiss Army Knife ISP Security Tool Version 1.5 Barry Raveendran Greene -- [email protected] Danny McPherson -- [email protected] Context ISP Security Real World Techniques endeavor to share
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01*
7450 ESS OS System Management Guide Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* This document is protected by copyright. Except as specifically
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Configuring RADIUS Server Support for Switch Services
7 Configuring RADIUS Server Support for Switch Services Contents Overview...................................................... 7-2 Configuring a RADIUS Server To Specify Per-Port CoS and Rate-Limiting
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Introduction to Cisco router configuration
Introduction to Cisco router configuration AFNOG 2001 Workshop 07 to 11 May 2001 Accra - GHANA By: Adiel AKPLOGAN CAFE Informatique S. A. - TOGO E-mail: [email protected] - Web: http://www.akplogan.net
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
SECOND EDITION. Cisco IOS Cookbook. Kevin Dooley and Ian]. Brown. O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo
SECOND EDITION Cisco IOS Cookbook Kevin Dooley and Ian]. Brown O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface xix 1. Router Configuration and File Management
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Cisco Performance Monitor Commands
1 action (policy react and policy inline react) Cisco Performance Monitor Commands action (policy react and policy inline react) To configure which applications which will receive an alarm or notification,
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Configuring the MNLB Forwarding Agent
CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Router Security and Infrastructure Protection
Router Security and Infrastructure Protection Yusuf Bhaiji Cisco Systems 2007 Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to Core Security Denial of Service (DoS) and Worm Review Six-Phase
Securing Networks with Juniper Networks
Securing Networks with Juniper Networks Juniper Security Features Jean-Marc Uzé Liaison Research, Education and Government Networks and Institutions, EMEA [email protected] TF-CSIRT Meeting, 26/09/02 Agenda
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Tech Note Cisco IOS SNMP Traps Supported and How to Conf
Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Enabling Management Protocols: NTP, SNMP, and Syslog
SECTION 7 Enabling Management Protocols: NTP, SNMP, and Syslog In this Section This section describes how to enable basic management protocols on a Cisco AS5800 and Cisco AS5300 as part of a dial access
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Configuring Denial of Service Protection
CHAPTER 52 This chapter contains information on how to protect your switch against Denial of Service (DoS) attacks. The information covered in this chapter is unique to Cisco IOS Release 12.2SX, and it
