
- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?

Chapter 13 363
Chapter 13
"Do I Know This Already?" Quiz
1What is the relationship between the Cisco PIX Firewall and the AAA server?
Answer: The Cisco PIX Firewall acts as a client to the AAA server.
2What three methods are used to authenticate to the Cisco PIX Firewall?
Answer: HTTP, FTP, Telnet
3How does the Cisco PIX Firewall process cut-through proxy?
Answer: The user connects to the PIX using HTTP, FTP, or Telnet, and then the PIX either authenticates the user locally or forwards the authentication information to a AAA server. After authenticating the user, the PIX opens the requested connection (if allowed in the security policy).
4 What are the main differences between RADIUS and TACACS+?
Answer: RADIUS travels over UDP and combines authentication and authorization; TACACS+ travels over TCP and sends authentication and authorization separately.
5What patch level must you have Windows 2000 Professional configured to before you install CSACS?
Answer: Trick question. CSACS can be installed only on Windows NT/2000 Server.
6Why is it important to authenticate a user before completing authorization?
Answer: You cannot assign any permissions unless you know who the user is.
7What are the three layers of authentication?
Answer: Something you know, something you have, something you are
8 What is the purpose of the explain box during the CSACS installation?
Answer: The explain box brings up a window that provides explanations for each of the options in the configuration.
9 What do you need to verify before installing CSACS?
Answer: Your system should be up to date, including Internet Explorer, and you need connectivity with the NAS (PIX).
10Why is it important to have Internet Explorer up to date on your CSACS?
Answer: Because CSACS is controlled through the browser.

364 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Q&A
1What platforms does CSACS support?
A Windows XP Professional
BUNIX
CWindows NT Workstation
DWindows 2000 Professional
Answer: B
2 Why is it important to do accounting on your network?
Answer: To keep track of who is accessing the network and what they are doing
3What options are available to authenticate users on a PIX Firewall?
A Local user database
B Remote RADIUS server
C Remote TACACS+ server
D All of the above
Answer: D
4What two technologies does the CSACS support?
Answer: RADIUS and TACACS+
5True or false: Cut-through proxy authenticates users and then allows them to connect to anything.
Answer: False. Cut-through proxy authenticates users and connects them to resources they are authorized to use.
6True or false: The CSACS installation on Windows NT/2000 Server is a relatively simple Installation Wizard.
Answer: True
7Which of the following are not connection types for authenticating to a PIX Firewall? (Select all that apply.)
ATelnet
BSSH
CFTP
DHTTPS
Answer: B, D

Chapter 14 365
Chapter 14
"Do I Know This Already?" Quiz
1True or false: The show aaa command shows you everything that has to do with your AAA server in its configuration.
Answer: False. It does not show you the output of aaa-server.
2Both your Cisco PIX Firewall and your CSACS are configured for TACACS+, but you cannot configure the downloadable PIX ACLs. What is the problem?
Answer: Downloadable PIX ACLs are supported only by RADIUS server.
3 What is the command to get authorization to work with access lists?
Answer: aaa authorization match acl_name inbound/outbound if_name group_tag
4What is the one type of database you do not want to implement for a large enterprise network with many users?
Answer: A PIX local database, because it significantly increases the PIX Firewall's processor workload and can become very difficult to administer as the database's size increases.
5What tab on the CSACS is used to configure the PIX, and what is the firewall considered?
Answer: The PIX is configured as a AAA client on the Network Configuration tab.
6What three services are used to authenticate by default in the PIX?
Answer: FTP, HTTP, Telnet
7How do you put text messages into the logon prompt for a Telnet session?
Answer: auth-prompt command
8What three messages can you change with the auth-prompt command?
Answer: Prompt, accept, reject
9If your timeout uauth is set to 0:58:00, when is the user prompted to reauthenticate after the session times out?
Answer: By default, timeout uauth absolute does not prompt the user to reauthenticate until he or she starts a new connection after the uauth timer has expired.
10 What does the option inactivity in the timeout uauth command mean?
Answer: This is the period of inactivity that elapses before the timeout timer is started.

366 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
11What two formats can logs be written to using the CSACS?
Answer: .CSV and ODBC (flat file and database)
12If you create a user on the CSACS and do not assign that user to a group, what group is he or she automatically assigned to?
Answer: The default group
13You have added a new RSA SecurID Token Server to the network. In which two places do you configure the CSACS to use it?
Answer: It must be configured as an external user database, and you must select it for password authentication in the User Setup field.
14What command is most commonly used to check your AAA configuration on the PIX?
Answer: show aaa or show aaa-server
Q&A
1What is the best way to authenticate an H.323 connection?
A Authenticate to the H.323 server.
BTelnet to the H.323 server.
CVirtual Telnet to the PIX for authentication.
DVirtual HTTP to the CSACS for authentication.
Answer: C
2What is the total number of AAA servers that the PIX can connect to?
Answer: 196 (14 servers per group, 14 groups)
3How do you disable caching of user authentication?
Answer: timeout uauth 0
4 What happens to virtual HTTP if you disable timeout uauth absolute?
Answer: After authentication, the user is prevented from connecting to the destination web server.
5How can you tell you have configured your NAS to authenticate using RADIUS in the CSACS by looking at the Shared Profile Components tab?
Answer: Downloadable PIX ACLs are unavailable unless the AAA client is configured to authenticate using RADIUS.
6What are the two default password authentication databases configured on the CSACS?
Answer: CiscoSecure Database and Windows NT/2000

Chapter 14 367
7What PIX command establishes the authentication protocol to be used with the AAA server?
Answer: aaa-server
8Which options are mandatory in every aaa authentication command on the PIX Firewall? (Select all that apply.)
Ainclude/exclude
Binbound/outbound
Clocal_ip/mask
Dgroup_tag
Eacl_name
Answer: B and D
9True or false: You can restrict local access to the PIX Firewall using CSACS.
Answer: True. This is done using aaa authentication console.
10How do you configure client IP address assignment on the CSACS when using the PIX Firewall as the AAA client?
Answer: This function is not used on the PIX Firewall.
11By default, what is the maximum number of sessions allowed for a user who is configured on the CSACS?
Answer: The user account defaults to the group setting.
12 Why is it a good idea to rename your groups in CSACS?
Answer: So you can identify which group includes which users.
13Where do you see the logs on the CSACS?
Answer: Reports and Activity
14You are installing CSACS on your new Windows 2000 Professional, but you cannot get it to load correctly. What is most likely the problem?
ACSACS requires server software.
BYour patch level is not up to date.
CYou are running a personal firewall or host-based IDS that is blocking the installation.
DYou do not have administrative privileges on that system.
EAll of the above
Answer: A