
- •Using Your Sybex Electronic Book
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Types of Network Security Threats
- •Types of Security Weaknesses
- •Technology Weaknesses
- •Configuration Weaknesses
- •Policy Weaknesses
- •Types of Network Attacks
- •Eavesdropping
- •Denial-of-Service Attacks
- •Unauthorized Access
- •WareZ
- •Masquerade Attack (IP Spoofing)
- •Session Hijacking or Replaying
- •Rerouting
- •Repudiation
- •Smurfing
- •Password Attacks
- •Man-in-the-Middle Attacks
- •Application-Layer Attacks
- •Trojan Horse Programs, Viruses, and Worms
- •HTML Attacks
- •The Corporate Security Policy
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Authentication Methods
- •Windows Authentication
- •Security Server Authentication
- •PAP and CHAP Authentication
- •PPP Callback
- •Configuring the NAS for AAA
- •Securing Access to the Exec Mode
- •Enable AAA Locally on the NAS
- •Authentication Configuration on the NAS
- •Authorization Configuration on the NAS
- •Accounting Configuration on the NAS
- •Verifying the NAS Configuration
- •Troubleshooting AAA on the Cisco NAS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 2.1: Setting the Line Passwords
- •Lab 2.2: Setting the Enable Passwords
- •Lab 2.3: Encrypting your Passwords
- •Lab 2.4: Creating Usernames and Logging In
- •Lab 2.5: Configuring AAA Authentication on the NAS
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the CiscoSecure ACS
- •Using User Databases for Authentication
- •Populating the User Database Population
- •New ACS Features
- •Installing CiscoSecure ACS 3.0
- •Administering CiscoSecure ACS
- •TACACS+ Overview
- •Configuring TACACS+
- •Using RADIUS
- •CiscoSecure User Database NAS Configuration for RADIUS
- •Verifying TACACS+
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Solving Eavesdropping and Session Replay Problems
- •Fighting Rerouting Attacks
- •Fighting Denial-of-Service Attacks
- •Turning Off and Configuring Network Services
- •Blocking SNMP Packets
- •Disabling Echo
- •Turning Off BOOTP and Auto-Config
- •Disabling the HTTP Interface
- •Disabling IP Source Routing
- •Disabling Proxy ARP
- •Disabling Redirect Messages
- •Disabling the Generation of ICMP Unreachable Messages
- •Disabling Multicast Route Caching
- •Disabling the Maintenance Operation Protocol (MOP)
- •Turning Off the X.25 PAD Service
- •Enabling the Nagle TCP Congestion Algorithm
- •Logging Every Event
- •Disabling Cisco Discovery Protocol
- •Disabling the Default Forwarded UDP Protocols
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 4.1: Controlling TCP/IP Services
- •Answers to Written Lab
- •Answers to Review Questions
- •Understanding the Cisco IOS Firewall
- •Authentication Proxy and IDS
- •Context-Based Access Control
- •CBAC Compared to ACLs
- •CBAC-Supported Protocols
- •Introduction to CBAC Configuration
- •Using Audit Trails and Alerts
- •Configuring Global Timeouts and Thresholds
- •Configuring PAM
- •Defining Inspection Rules
- •Applying Inspection Rules and ACLs to Router Interfaces
- •Configuring IP ACLs at the Interface
- •Testing and Verifying CBAC
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 5.1: Configure Logging and Audit Trails
- •Lab 5.2: Define and Apply Inspection Rules and ACLs
- •Lab 5.3: Test and Verify CBAC
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the Cisco IOS Firewall Authentication Proxy
- •Configuring the AAA Server
- •Configuring AAA
- •Configuring the Authentication Proxy
- •Testing and Verifying Your Configuration
- •show Commands
- •Clearing the Cache
- •Introduction to the Cisco IOS Firewall IDS
- •Initializing Cisco IOS Firewall IDS
- •Configuring, Disabling, and Excluding Signatures
- •Creating and Applying Audit Rules
- •Setting Default Actions
- •Creating an Audit Rule
- •Applying the Audit Rule
- •Verifying the Configuration
- •Stopping the IOS Firewall IDS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 6.1: Enabling the IOS Firewall Authentication Proxy
- •Lab 6.2: Enabling the IOS Firewall IDS
- •Answers to Written Lab
- •Answers to Review Questions
- •What is a Virtual Private Network?
- •Introduction to Cisco IOS IPSec
- •IPSec Transforms
- •IPSec Operation
- •The Components of IPSec
- •IPSec Encapsulation
- •Internet Key Exchange (IKE)
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Configuring Cisco IOS IPSec for Pre-Shared Keys Site-to-Site
- •Preparing for IKE and IPSec
- •Configuring IKE
- •Configuring IPSec
- •Testing and Verifying IPSec
- •Configuring IPSec Manually
- •Configuring IPSec for RSA-Encrypted Nonces
- •Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site
- •Configuring CA Support Tasks
- •Preparing for IKE and IPSec
- •Configuring CA Support
- •Configuring IKE Using CA
- •Configuring IPSec for CA
- •Testing and Verifying IPSec for CA
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 8.1: Configure IKE on Lab_A and Lab_B
- •Lab 8.2: Configure IPSec on Lab_A and Lab_B
- •Answers to Written Lab
- •Answers to Review Questions
- •Answers to Hands-On Labs
- •Answer to Lab 8.1
- •Answer to Lab 8.2
- •Introduction to Cisco Easy VPN
- •The Easy VPN Server
- •Introduction to the Cisco VPN 3.5 Client
- •Easy VPN Server Configuration Tasks
- •Pre-Configuring the Cisco VPN 3.5 Client
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 9.1: Installing the Cisco VPN 3.5 Client Software on Windows
- •Answers to Written Lab
- •Answers to Review Questions
- •Network Separation
- •Three Ways through a PIX Firewall
- •PIX Firewall Configuration Basics
- •Configuring Interfaces
- •Saving Your Configuration
- •Configuring Access through the PIX Firewall
- •Configuring Outbound Access
- •Configuring Inbound Access
- •Configuring Multiple Interfaces and AAA on the PIX Firewall
- •Configuring Multiple Interfaces
- •Implementing AAA on the PIX Firewall
- •Configuring Advanced PIX Firewall Features
- •Failover
- •Outbound Access Control
- •Logging
- •SNMP Support
- •Java Applet Blocking
- •URL Filtering
- •Password Recovery
- •Glossary

56 Chapter 2 Introduction to AAA Security
Summary
As security needs become more complex in your networking environments, Cisco continues to extend its features to meet demands. Cisco’s AAA (Authentication, Authorization, and Accounting) services provide control over user access, what those users are permitted to do once they’re authorized to get into your network, and records the tasks they perform during their sessions. AAA provides great techniques for network authentication, granting permissions (authorization), and keeping records of activity (accounting).
In addition, RADIUS and TACACS+ security servers allow you to implement a centralized security plan.
The configuration of AAA on the Cisco NAS (Network Access Server) using a local database is important for smaller networks. In Chapter 3, you’ll learn how to move the local database to a Cisco NAS.
Exam Essentials
Remember which authentication method is the most secure. Token cards/soft tokens are the most secure method of authentication.
Know what the AAA command wait-start radius provides. The wait-start radius command means that a requested service cannot start until the acknowledgment has been received from the RADIUS server.
Be able to read the output of a debug aaa authentication command. In the debug aaa authentication output, you need to find the username and the method, and see if it was successful.
Be able to read the output of a debug ppp authentication command. In the debug ppp authentication output, you need to understand what interface the challenge is coming from.
Remember the command to enable AAA globally on the NAS. The aaa new-model command is used to start AAA on the NAS.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Commands Used in This Chapter |
57 |
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
accounting |
network access server (NAS) |
authentication |
packet-mode access |
Authentication, Authorization, and |
PAP (Password Authentication Protocol) |
Accounting (AAA) |
|
authorization |
PPP (Point-to-Point Protocol) |
bastion hosts |
RADIUS (Remote Authentication Dial-In User |
|
Service) |
CHAP (Challenge Handshake |
sacrificial hosts |
Authentication Protocol) |
|
character-mode access |
Syslog |
dirty DMZ |
TACACS+ (Terminal Access Controller Access |
|
Control System) |
Kerberos |
token cards/soft tokens |
line authentication |
|
Commands Used in This Chapter
Here is the list of commands used in this chapter:
Command |
Meaning |
(config)#line con 0 |
Chooses the line configuration of the |
|
console port. |
(config-line)#login |
Tells the router to look in the line |
|
configuration for the password. |
(config-line)#password password |
Sets the line password. |
(config-line)#line vty 0 4 |
Chooses the Telnet lines. |
(config-line)#line aux 0 |
Chooses the AUX line. |
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

58 Chapter 2 Introduction to AAA Security
Command |
Meaning |
(config)#enable secret password |
Sets the enable secret password. |
(config)#enable password password |
Sets the enable password. |
(config)#service password-encryption |
Encrypts the enable password and the line |
|
passwords. |
(config)#username username password |
Creates a username and password. |
password |
|
(config-line)#login local |
Designates that the username will use the |
|
local line password for authentication. |
(config)#aaa new-model |
Enables the AAA process on the NAS. |
(config)#aaa authentication login |
Tells the router to authenticate using the |
default local |
local username and password. |
(config-line)#login authentication |
Places the authentication login default |
default |
command under the lines. |
(config)#aaa authentication login |
Enables a command set on the BRI |
dial-in local |
interface so that the local lines will be |
|
used for authentication. |
(config)#int bri0/0 |
Chooses the BRI interface. |
(config-if)#ppp encapsulation |
Sets the interface encapsulation to PPP. |
(config-if)#ppp authentication chap |
Sets the interface to use CHAP |
dial-in |
authentication. |
(config)#aaa authorization commands 1 |
Sets a level 1 configuration to use the local |
begin local |
line passwords. |
(config)#aaa authorization commands 15 |
Sets a level 15 configuration to use the local |
end local |
line passwords. |
(config)#aaa #authorization network |
Performs authorization security on all |
admin local none |
network services. |
#debug aaa authentication |
Turns on debugging for AAA |
|
authentication. |
#no debug aaa authentication |
Turns off debugging for AAA |
|
authentication. |
#debug aaa authorization |
Turns on debugging for AAA |
|
authorization. |
#debug aaa accounting |
Turns on debugging for AAA accounting. |
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Written Lab |
59 |
Written Lab
This section asks you 10 write-in-the-answer questions to help you understand the technology that you need to know in order to pass the SECUR exam.
1.List three packet-mode access methods.
2.List three character-mode access methods.
3.List the least secure authentication method.
4.List the most secure authentication method.
5.What is the command that enables AAA globally on the NAS?
6.What are the three AAA components?
7.Which AAA component controls user privileges?
8.True/False: Authorization servers can be used to authenticate users remotely.
9.Which AAA component identifies users?
10.Which AAA component limits a user’s ability on a network?
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |