- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?
A P P E N D I X A
Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Chapter 1
Q&A
1True or false: Network security means locking your computer in a filing cabinet.
Answer: False
2What is the goal of a reconnaissance attack?
Answer: To determine what vulnerabilities can be exploited
3 True or false: A horizontal scan affects more hosts on a network than a vertical scan.
Answer: True. A horizontal scan scans all hosts across a specific network segment for a specific service (port). A vertical scan scans a specific host for a number of services.
4 True or false: To secure your network, you only need to install a firewall.
Answer: False. A firewall provides perimeter security, which is a piece of the puzzle. To secure the network, you need to implement security in depth.
5 What is the difference between a security policy and a security process?
Answer: The security policy is a written policy that spells out how security is implemented within a company. The security process is a four-step process that ensures that the security policy is constantly being improved.
Chapter 2
"Do I Know This Already?" Quiz
1What are the three basic firewall technologies?
Answer: Packet filtering, proxy, stateful inspection
332 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
2Of the three firewall technologies, which one generates a separate connection on behalf of the requestor and usually operates at the upper layers of the OSI model?
Answer: Proxy firewalls generate a new connection on behalf of the requestor and operate at the upper layers of the OSI model.
3 Which firewall technology is commonly implemented on a router?
Answer: The technology commonly applied to routers is packet filtering.
4What items does a packet filter look at to determine whether to allow the traffic?
Answer: Source address/port, destination address/port, protocol
5What firewall technology does the Cisco PIX Firewall use?
AProxy filtering
BPacket filtering
CStateful inspection
DProxy inspection
Answer: C
6 What are the advantages of the Cisco PIX Firewall over competing firewall products?
Answer: A single embedded operating environment, the Adaptive Security Algorithm, cut-through proxy, redundancy
7 How many PIX firewalls can you operate in a high-availability cluster?
Answer: The Cisco PIX Firewall can operate as a high-availability pair (two systems).
8 What is the ASA, and how does the Cisco PIX Firewall use it?
Answer: The Adaptive Security Algorithm is what the PIX uses to perform stateful inspection. It not only tracks the session information in the state table, but also randomly generates TCP sequence numbers to ensure that a session cannot be hijacked.
9 Why is cut-through proxy more efficient than traditional proxy?
Answer: Cut-through proxy is a feature that the Cisco PIX Firewall uses to authenticate and authorize a user before opening his or her connection. Cutthrough proxy uses the ASA to track session information but does not perform any proxy services. This greatly increases the firewall's performance as compared to traditional proxy firewalls.
Chapter 2 333
Q&A
1True or false: Packet filtering can be configured on Cisco routers.
Answer: True
2What design feature allows the Cisco Secure PIX Firewall to outperform conventional application firewalls?
AThe Packet Selectivity Algorithm
BSuper-packet filtering
CA single embedded operating environment
DHot standby proxy processing
Answer: C
3True or false: Cut-through proxy technology allows users to do anything they want after authenticating at the firewall.
Answer: False
4What steps are required to add an ARP entry to a Cisco PIX Firewall?
A Edit the /etc/interfaces/outside/arp.conf file.
B You don't need to add an ARP entry on a PIX Firewall.
C Add the ARP entry using the GUI interface.
D Use the set arp command in interface config mode.
Answer: B
5True or false: There is no limit on the number of connections an application proxy firewall can handle.
Answer: False
6True or false: The Adaptive Security Algorithm requires a tremendous amount of processing by the firewall. Even though it is not very efficient, the PIX can handle it.
Answer: False
7True or false: Redundancy allows you to configure two or more PIX firewalls in a cluster to protect critical systems.
Answer: False
334 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Chapter 3
"Do I Know This Already?" Quiz
1 What is the ASA, and how does the Cisco PIX Firewall use it?
Answer: The Adaptive Security Algorithm is what the PIX uses to perform stateful inspection. It not only tracks the session information in the state table, but also randomly generates TCP sequence numbers to ensure that a session cannot be hijacked.
2What three authentication methods can the PIX Firewall use when performing cutthrough proxy?
Answer: Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access Control System (TACACS+), or a local user database on the PIX itself. Note that the local user database is a feature that became available with OS version 6.2.
3 Why does the ASA generate random TCP sequence numbers?
Answer: Because it makes it extremely difficult for a potential attacker to predict the initial sequence number when attempting to hijack a TCP session.
4If a user has successfully authenticated but cannot establish a connection to the server, what is most likely the problem?
Answer: The user is not authorized to access that server.
5 What is the best way to remove the ASA from a PIX Firewall?
Answer: The ASA is part of the embedded operating environment. It cannot be removed from the PIX.
6 What components of a TCP session does the ASA write to the state table?
Answer: Source and destination addresses, source and destination port numbers, TCP sequencing information, additional TCP/UDP flags
7 What can cause a session object to be deleted from the state table?
Answer: The connection is not authorized by the security policy, the connection is completed (the session has ended), or the session has timed out
8What are the three ways to initiate a cut-through proxy session?
Answer: HTTP, FTP, Telnet
9What happens to a reply that does not have the correct TCP sequence number?
Answer: The firewall drops it.
Chapter 3 335
10How many interfaces does a PIX 501 have, and how many network segments does it support?
Answer: The PIX 501 has five Ethernet interfaces but supports only two segments (inside and outside).
11What X509 certificates do all PIX firewalls support?
Answer:
Entrust Technologies, Inc.—Entrust/PKI 4.0
Microsoft Corporation—Windows 2000 Certificate Server 5.0 VeriSign—Onsite 4.5
Baltimore Technologies—UniCERT 3.05
12What is the maximum throughput of the PIX 535?
Answer: 1 Gbps
13How many interfaces can you install in a PIX 515?
Answer: Six
14What is the lowest model number of the PIX Firewall family to support failover?
Answer: PIX 515
15What are three methods of managing a Cisco PIX Firewall?
Answer: Command-line interface (CLI), PIX Device Manager (PDM), Cisco Secure Policy Manager
Q&A
1List four advantages of ASA.
Answer:
It is more secure than packet filtering.
It is more efficient than proxy services.
It can guard against session hijacking.
It is part of the embedded PIX operating environment.
2 What are the three firewall technologies?
APacket filtering, proxy, connection dropping
BStateful inspection, packet filtering, proxy