
- •CCIE Security Written Exam Blueprint
- •General Networking Topics
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Networking Basics—The OSI Reference Model
- •Ethernet Overview
- •Internet Protocol
- •Variable-Length Subnet Masks
- •Classless Interdomain Routing
- •Transmission Control Protocol
- •TCP Services
- •Routing Protocols
- •ISDN
- •IP Multicast
- •Asynchronous Communications and Access Devices
- •Foundation Summary
- •Requirements for FastEther Channel
- •Scenario
- •Scenario 2-1: Routing IP on Cisco Routers
- •Scenario Answers
- •Scenario 2-1 Answers: Routing IP on Cisco Routers
- •Application Protocols
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Domain Name System
- •Trivial File Transfer Protocol
- •File Transfer Protocol
- •Hypertext Transfer Protocol
- •Secure Socket Layer
- •Simple Network Management Protocol
- •Simple Mail Transfer Protocol
- •Network Time Protocol
- •Secure Shell
- •Foundation Summary
- •Scenario
- •Scenario Answers
- •Scenario 3-1 Solutions
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Cisco Hardware
- •show and debug Commands
- •Password Recovery
- •Basic Security on Cisco Routers
- •IP Access Lists
- •Foundation Summary
- •Scenario
- •Scenario Answers
- •Security Protocols
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Authentication, Authorization, and Accounting (AAA)
- •Remote Authentication Dial-In User Service (RADIUS)
- •Kerberos
- •Virtual Private Dial-Up Networks (VPDN)
- •Encryption Technology Overview
- •Internet Key Exchange (IKE)
- •Foundation Summary
- •Scenario
- •Scenario 5-1: Configuring Cisco Routers for IPSec
- •Scenario Answers
- •Scenario 5-1 Solutions
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •UNIX
- •Microsoft NT Systems
- •Common Windows DOS Commands
- •Cisco Secure for Windows and UNIX
- •Cisco Secure Policy Manager
- •Cisco Secure Intrusion Detection System and Cisco Secure Scanner
- •Cisco Security Wheel
- •Foundation Summary
- •Scenarios
- •Scenario 6-1: NT File Permissions
- •Scenario 6-2: UNIX File Permissions
- •Scenario Answers
- •Scenario 6-1 Solution
- •Scenario 6-2 Solution
- •Security Technologies
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Advanced Security Concepts
- •Cisco Private Internet Exchange (PIX)
- •Cisco IOS Firewall Security Feature Set
- •Public Key Infrastructure
- •Virtual Private Networks
- •Foundation Summary
- •Scenario
- •Scenario Answer
- •Scenario 7-1 Solution
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Network Security Policies
- •Standards Bodies and Incident Response Teams
- •Vulnerabilities, Attacks, and Common Exploits
- •Intrusion Detection System
- •Protecting Cisco IOS from Intrusion
- •Foundation Summary
- •Scenario
- •Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time
- •Scenario Answer
- •Scenario 8-1 Solution

C H A P T E R 7
Security Technologies
This chapter covers some of today’s most widely used technologies that enable Network administrators to ensure that sensitive data is secured from unauthorized sources.
Cisco’s support for security is also covered, as are all the fundamental foundation topics you will need to master the security CCIE written exam.
This chapter covers the following topics:
•Advanced security concepts—This section covers some the of the advanced security policies in demilitarized zones (DMZs).
•Packet filtering, proxies, NAT, and PAT—This section covers some packet filtering, proxies, and how to hide addresses using Network Address Translation (NAT) and Port Address Translation (PAT).
•Cisco Firewall routers and IOS feature set—This section covers the Cisco PIX Firewall and the IOS Firewall feature set available on Cisco routers.
•Public Key infrastructure (PKI)—This section covers the Public Key infrastructure (PKI), followed by a description of VPN networks and a typical design example.
“Do I Know This Already?” Quiz
The purpose of this assessment quiz is to help you determine how to spend your limited study time. If you can answer most or all these questions, you might want to skim the “Foundation Topics” section and return to it later, as necessary. Review the “Foundation Summary” section and answer the questions at the end of the chapter to ensure that you have a strong grasp of the material covered. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now. If you find these assessment questions difficult, read through the entire “Foundation Topics” section and review it until you feel comfortable with your ability to answer all these and the Q & A questions at the end of the chapter.

316 Chapter 7: Security Technologies
Answers to these questions can be found in Appendix A, “Answers to Quiz Questions.”
1DMZ stands for what?
a.Demilitarized zone
b.Demitted zone
c.Domain main zone
d.Domain name
2When defining an extended access list, what TCP port numbers can you use?
a.Only predefined Cisco keywords
b.0 to –65,000
c.0 to –65,535
d.1 to 65,534
e.None of the above
3When defining an extended access list, what UDP port numbers can you use?
a.Only predefined Cisco keywords
b.0 to 65000
c.0 to 65535
d.1 to 65534
e.None of the above
4Which of the following is not a TCP service?
a.who
b.whois
c.finger
d.ftp
e.pop3
5Which of the following is not a UDP service?
a.BGP
b.echo
c.domain
d.discard
e.rip
f.snmp

“Do I Know This Already?” Quiz 317
6For how many translations does PAT allow you to use one IP address?
a.32,000
b.64,000
c.96,000
d.128,000
e.256,000
7PAT translates all private addresses based on what?
a.Source port
b.Destination port
c.Both source and destination
d.None
8NAT is which of the following?
a.Network Architectural Language
b.National anthem of Latvia
c.Network translation
d.Network Address Translation
9NAT is defined in which RFC?
a.1700
b.1701
c.2002
d.1631
e.1613
10The following defines which NAT terminology: “A legitimate registered IP address as assigned by the InterNIC?”
a.Inside local address
b.Outside global address
c.Inside global address
d.Outside local address

318 Chapter 7: Security Technologies
11What IOS command defines a pool of addresses that will be translated to a registered IP address?
a.ip nat inside
b.ip nat outside
c.ip nat pool
d.ip nat inside pool
e.ip nat outside pool
12PIX stands for what?
a.Protocol interchange
b.Cisco Private Internet
c.Private Internet Exchange
d.Public Internet Exchange
13To define how a PIX will route IP data, what is the correct syntax for a PIX 520?
a.ip route
b.route
c.ip route enable
d.default-network
14What is the alias command’s function on a PIX Firewall?
a.To define a local host name
b.To define the DNS server
c.Used in NAT environments where one IP address is translated into another
d.Only applicable to Cisco IOS
15CBAC stands for what?
a.CBAC is not a valid term
b.Cisco Business architectural centre
c.Context-based Access Control
d.Context-based Accelerated controller
e.Content-based arch. Centre

“Do I Know This Already?” Quiz 319
16What is IKE used to accomplish?
a.NAT translations
b.Ensures that data is not sourced by the right sources
c.Ensures that data is not sourced by the wrong sources
d.No use
e.Both a and c
17To create a simple VPN tunnel (unencrypted) between two sites, what must you do on a Cisco router?
a.Create a GRE tunnel
b.Create a routing map
c.Nothing, use a PIX
d.Create an IPSec tunnel