Table of Contents

Introduction

Organization and Elements of This Book

Contacting the Author

Self Assessment

Who Is a CCNA Security?

The Ideal CCNA Security Candidate

Put Yourself to the Test

Exam Topics for 640-553 IINS (Implementing Cisco IOS Network Security)

Strategy for Using This Exam Cram

Part I: Network Security Architecture

Chapter 1: Network Insecurity

Exploring Network Security Basics and the Need for Network Security

The Threats

Other Reasons for Network Insecurity

The CIA Triad

Data Classification

Security Controls

Incident Response

Laws and Ethics

Exploring the Taxonomy of Network Attacks

Adversaries

How Do Hackers Think?

Concepts of Defense in Depth

IP Spoofing Attacks

Attacks Against Confidentiality

Attacks Against Integrity

Attacks Against Availability

Best Practices to Thwart Network Attacks

Administrative Controls

Technical Controls

Physical Controls

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 2: Building a Secure Network Using Security Controls

Defining Operations Security Needs

Cisco System Development Life Cycle for Secure Networks

Operations Security Principles

Network Security Testing

Disaster Recovery and Business Continuity Planning

Establishing a Comprehensive Network Security Policy

Defining Assets

The Need for a Security Policy

Policies

Standards, Guidelines, and Procedures

Who Is Responsible for the Security Policy?

Risk Management

Principles of Secure Network Design

Examining Cisco’s Model of the Self-Defending Network

Where Is the Network Perimeter?

Building a Cisco Self-Defending Network

Components of the Cisco Self-Defending Network

Cisco Integrated Security Portfolio

Exam Prep Questions

Answers to Exam Prep Questions

Part II: Perimeter Security

Chapter 3: Security at the Network Perimeter

Cisco IOS Security Features

Where Do You Deploy an IOS Router?

Cisco ISR Family and Features

Securing Administrative Access to Cisco Routers

Review Line Interfaces

Password Best Practices

Configuring Passwords

Setting Multiple Privilege Levels

Configuring Role-Based Access to the CLI

Configuring the Cisco IOS Resilient Configuration Feature

Protecting Virtual Logins from Attack

Configuring Banner Messages

Introducing Cisco SDM

Files Required to Run Cisco SDM from the Router

Using Cisco SDM Express

Launching Cisco SDM

Cisco SDM Smart Wizards

Advanced Configuration with SDM

Cisco SDM Monitor Mode

Configuring Local Database AAA on a Cisco Router

Authentication, Authorization, and Accounting (AAA)

Two Reasons for Implementing AAA on Cisco Routers

Cisco’s Implementation of AAA for Cisco Routers

Tasks to Configure Local Database AAA on a Cisco Router

Additional Local Database AAA CLI Commands

Configuring External AAA on a Cisco Router Using Cisco Secure ACS

Why Use Cisco Secure ACS?

Cisco Secure ACS Features

Cisco Secure ACS for Windows Installation Requirements

Cisco Secure ACS Solution Engine and Cisco Secure ACS Express 5.0 Comparison

TACACS+ or RADIUS?

Prerequisites for Cisco Secure ACS

Three Main Tasks for Setting Up External AAA

Troubleshooting/Debugging Local AAA, RADIUS, and TACACS+

AAA Configuration Snapshot

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 4: Implementing Secure Management and Hardening the Router

Planning for Secure Management and Reporting

What to Log

How to Log

Reference Architecture for Secure Management and Reporting

Secure Management and Reporting Guidelines

Logging with Syslog

Cisco Security MARS

Where to Send Log Messages

Log Message Levels

Log Message Format

Enabling Syslog Logging in SDM

Using SNMP

Configuring the SSH Daemon

Configuring Time Features

Using Cisco SDM and CLI Tools to Lock Down the Router

Router Services and Interface Vulnerabilities

Performing a Security Audit

Exam Prep Questions

Answers to Exam Prep Questions

Part III: Augmenting Depth of Defense

Chapter 5: Using Cisco IOS Firewalls to Implement a Network Security Policy

Examining and Defining Firewall Technologies

What Is a Firewall?

Characteristics of a Firewall

Firewall Advantages

Firewall Disadvantages

Role of Firewalls in a Layered Defense Strategy

Types of Firewalls

Cisco Family of Firewalls

Firewall Implementation Best Practices

Creating Static Packet Filters with ACLs

Threat Mitigation with ACLs

Inbound Versus Outbound

Identifying ACLs

ACL Examples Using the CLI

ACL Guidelines

Using the Cisco SDM to Configure ACLs

Using ACLs to Filter Network Services

Using ACLs to Mitigate IP Address Spoofing Attacks

Using ACLs to Filter Other Common Services

Cisco Zone-Based Policy Firewall Fundamentals

Advantages of ZPF

Features of ZPF

ZPF Actions

Zone Behavior

Using the Cisco SDM Basic Firewall Wizard to Configure ZPF

Manually Configuring ZPF with the Cisco SDM

Monitoring ZPF

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 6: Introducing Cryptographic Services

Cryptology Overview

Cryptanalysis

Encryption Algorithm (Cipher) Desirable Features

Symmetric Key Versus Asymmetric Key Encryption Algorithms

Block Versus Stream Ciphers

Which Encryption Algorithm Do I Choose?

Cryptographic Hashing Algorithms

Principles of Key Management

Other Key Considerations

SSL VPNs

Exploring Symmetric Key Encryption

DES

3DES

AES

SEAL

Rivest Ciphers (RC)

Exploring Cryptographic Hashing Algorithms and Digital Signatures

HMACs

Message Digest 5 (MD5)

Secure Hashing Algorithm 1 (SHA-1)

Digital Signatures

Exploring Asymmetric Key Encryption and Public Key Infrastructure

Encryption with Asymmetric Keys

Authentication with Asymmetric Keys

Public Key Infrastructure Overview

PKI Topologies

PKI and Usage Keys

PKI Server Offload and Registration Authorities (RAs)

PKI Standards

Certificate Enrollment Process

Certificate-Based Authentication

Certificate Applications

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 7: Virtual Private Networks with IPsec

Overview of VPN Technology

Cisco VPN Products

VPN Benefits

Site-to-Site VPNs

Remote-Access VPNs

Cisco IOS SSL VPN

Cisco VPN Product Positioning

VPN Clients

Hardware-Accelerated Encryption

IPsec Compared to SSL

Conceptualizing a Site-to-Site IPsec VPN

IPsec Components

IPsec Strengths

Constructing a VPN: Putting it Together

Implementing IPsec on a Site-to-Site VPN Using the CLI

Step 1: Ensure That Existing ACLs Are Compatible with the IPsec VPN

Step 2: Create ISAKMP (IKE Phase I) Policy Set(s)

Step 3: Configure IPsec Transform Set(s)

Step 4: Create Crypto ACL Defining Traffic in the IPsec VPN

Step 5: Create and Apply the Crypto Map (IPsec Tunnel Interface)

Verifying and Troubleshooting the IPsec VPN Using the CLI

Implementing IPsec on a Site-to-Site VPN Using Cisco SDM

Site-to-Site VPN Wizard Using Quick Setup

Site-to-Site VPN Wizard Using Step-by-Step Setup

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 8: Network Security Using Cisco IOS IPS

Exploring IPS Technologies

IDS Versus IPS

IDS and IPS Categories

IPS Attack Responses

Event Management and Monitoring

Host IPS

Network IPS

HIPS and Network IPS Comparison

Cisco IPS Appliances

IDS and IPS Signatures

Signature Alarms

Best Practices for IPS Configuration

Implementing Cisco IOS IPS

Cisco IOS IPS Feature Blend

Cisco IOS IPS Primary Benefits

Cisco IOS IPS Signature Integration

Configuring Cisco IOS IPS with the Cisco SDM

Cisco IOS IPS CLI Configuration

Configuring IPS Signatures

SDEE and Syslog Logging Protocol Support

Verifying IOS IPS Operation

Exam Prep Questions

Answers to Exam Prep Questions

Part IV: Security Inside the Perimeter

Chapter 9: Introduction to Endpoint, SAN, and Voice Security

Introducing Endpoint Security

Cisco’s Host Security Strategy

Securing Software

Endpoint Attacks

Cisco Solutions to Secure Systems and Thwart Endpoint Attacks

Endpoint Best Practices

Exploring SAN Security

SAN Advantages

SAN Technologies

SAN Address Vulnerabilities

Virtual SANs (VSANs)

SAN Security Strategies

Exploring Voice Security

VoIP Components

Threats to VoIP Endpoints

Fraud

SIP Vulnerabilities

Mitigating VoIP Hacking

Exam Prep Questions

Answers to Exam Prep Questions

Chapter 10: Protecting Switch Infrastructure

VLAN Hopping Attacks

VLAN Hopping by Rogue Trunk

VLAN Hopping by Double-Tagging

STP Manipulation Attack

STP Manipulation Attack Mitigation: Portfast

STP Manipulation Attack Mitigation: BPDU Guard

STP Manipulation Attack Mitigation: Root Guard

CAM Table Overflow Attack

CAM Table Overflow Attack Mitigation: Port Security

MAC Address Spoofing Attack

MAC Address Spoofing Attack Mitigation: Port Security

Configuring Port Security

Port Security Basic Settings

Port Security Optional Settings

Port Security Verification

Miscellaneous Switch Security Features

Intrusion Notification

Switched Port Analyzer (SPAN)

Storm Control

Switch Security Best Practices

Exam Prep Questions

Answers to Exam Prep Questions

Part V: Practice Exams and Answers

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2

Part VI: Appendixes

Appendix A: What’s on the CD-ROM

Multiple Test Modes

Study Mode

Certification Mode

Custom Mode

Attention to Exam Objectives

Installing the CD

Creating a Shortcut to the MeasureUp Practice Tests

Technical Support

Appendix B: Need to Know More?

Network Security Policies

Network Security Practices

Cryptography

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset