![](/user_photo/1438_p9ksI.png)
- •Using Your Sybex Electronic Book
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Types of Network Security Threats
- •Types of Security Weaknesses
- •Technology Weaknesses
- •Configuration Weaknesses
- •Policy Weaknesses
- •Types of Network Attacks
- •Eavesdropping
- •Denial-of-Service Attacks
- •Unauthorized Access
- •WareZ
- •Masquerade Attack (IP Spoofing)
- •Session Hijacking or Replaying
- •Rerouting
- •Repudiation
- •Smurfing
- •Password Attacks
- •Man-in-the-Middle Attacks
- •Application-Layer Attacks
- •Trojan Horse Programs, Viruses, and Worms
- •HTML Attacks
- •The Corporate Security Policy
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Authentication Methods
- •Windows Authentication
- •Security Server Authentication
- •PAP and CHAP Authentication
- •PPP Callback
- •Configuring the NAS for AAA
- •Securing Access to the Exec Mode
- •Enable AAA Locally on the NAS
- •Authentication Configuration on the NAS
- •Authorization Configuration on the NAS
- •Accounting Configuration on the NAS
- •Verifying the NAS Configuration
- •Troubleshooting AAA on the Cisco NAS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 2.1: Setting the Line Passwords
- •Lab 2.2: Setting the Enable Passwords
- •Lab 2.3: Encrypting your Passwords
- •Lab 2.4: Creating Usernames and Logging In
- •Lab 2.5: Configuring AAA Authentication on the NAS
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the CiscoSecure ACS
- •Using User Databases for Authentication
- •Populating the User Database Population
- •New ACS Features
- •Installing CiscoSecure ACS 3.0
- •Administering CiscoSecure ACS
- •TACACS+ Overview
- •Configuring TACACS+
- •Using RADIUS
- •CiscoSecure User Database NAS Configuration for RADIUS
- •Verifying TACACS+
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Solving Eavesdropping and Session Replay Problems
- •Fighting Rerouting Attacks
- •Fighting Denial-of-Service Attacks
- •Turning Off and Configuring Network Services
- •Blocking SNMP Packets
- •Disabling Echo
- •Turning Off BOOTP and Auto-Config
- •Disabling the HTTP Interface
- •Disabling IP Source Routing
- •Disabling Proxy ARP
- •Disabling Redirect Messages
- •Disabling the Generation of ICMP Unreachable Messages
- •Disabling Multicast Route Caching
- •Disabling the Maintenance Operation Protocol (MOP)
- •Turning Off the X.25 PAD Service
- •Enabling the Nagle TCP Congestion Algorithm
- •Logging Every Event
- •Disabling Cisco Discovery Protocol
- •Disabling the Default Forwarded UDP Protocols
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 4.1: Controlling TCP/IP Services
- •Answers to Written Lab
- •Answers to Review Questions
- •Understanding the Cisco IOS Firewall
- •Authentication Proxy and IDS
- •Context-Based Access Control
- •CBAC Compared to ACLs
- •CBAC-Supported Protocols
- •Introduction to CBAC Configuration
- •Using Audit Trails and Alerts
- •Configuring Global Timeouts and Thresholds
- •Configuring PAM
- •Defining Inspection Rules
- •Applying Inspection Rules and ACLs to Router Interfaces
- •Configuring IP ACLs at the Interface
- •Testing and Verifying CBAC
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 5.1: Configure Logging and Audit Trails
- •Lab 5.2: Define and Apply Inspection Rules and ACLs
- •Lab 5.3: Test and Verify CBAC
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the Cisco IOS Firewall Authentication Proxy
- •Configuring the AAA Server
- •Configuring AAA
- •Configuring the Authentication Proxy
- •Testing and Verifying Your Configuration
- •show Commands
- •Clearing the Cache
- •Introduction to the Cisco IOS Firewall IDS
- •Initializing Cisco IOS Firewall IDS
- •Configuring, Disabling, and Excluding Signatures
- •Creating and Applying Audit Rules
- •Setting Default Actions
- •Creating an Audit Rule
- •Applying the Audit Rule
- •Verifying the Configuration
- •Stopping the IOS Firewall IDS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 6.1: Enabling the IOS Firewall Authentication Proxy
- •Lab 6.2: Enabling the IOS Firewall IDS
- •Answers to Written Lab
- •Answers to Review Questions
- •What is a Virtual Private Network?
- •Introduction to Cisco IOS IPSec
- •IPSec Transforms
- •IPSec Operation
- •The Components of IPSec
- •IPSec Encapsulation
- •Internet Key Exchange (IKE)
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Configuring Cisco IOS IPSec for Pre-Shared Keys Site-to-Site
- •Preparing for IKE and IPSec
- •Configuring IKE
- •Configuring IPSec
- •Testing and Verifying IPSec
- •Configuring IPSec Manually
- •Configuring IPSec for RSA-Encrypted Nonces
- •Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site
- •Configuring CA Support Tasks
- •Preparing for IKE and IPSec
- •Configuring CA Support
- •Configuring IKE Using CA
- •Configuring IPSec for CA
- •Testing and Verifying IPSec for CA
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 8.1: Configure IKE on Lab_A and Lab_B
- •Lab 8.2: Configure IPSec on Lab_A and Lab_B
- •Answers to Written Lab
- •Answers to Review Questions
- •Answers to Hands-On Labs
- •Answer to Lab 8.1
- •Answer to Lab 8.2
- •Introduction to Cisco Easy VPN
- •The Easy VPN Server
- •Introduction to the Cisco VPN 3.5 Client
- •Easy VPN Server Configuration Tasks
- •Pre-Configuring the Cisco VPN 3.5 Client
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 9.1: Installing the Cisco VPN 3.5 Client Software on Windows
- •Answers to Written Lab
- •Answers to Review Questions
- •Network Separation
- •Three Ways through a PIX Firewall
- •PIX Firewall Configuration Basics
- •Configuring Interfaces
- •Saving Your Configuration
- •Configuring Access through the PIX Firewall
- •Configuring Outbound Access
- •Configuring Inbound Access
- •Configuring Multiple Interfaces and AAA on the PIX Firewall
- •Configuring Multiple Interfaces
- •Implementing AAA on the PIX Firewall
- •Configuring Advanced PIX Firewall Features
- •Failover
- •Outbound Access Control
- •Logging
- •SNMP Support
- •Java Applet Blocking
- •URL Filtering
- •Password Recovery
- •Glossary
![](/html/1438/356/html_23OY49ciqg.iQJr/htmlconvd-veJkuU91x1.jpg)
60 Chapter 2 Introduction to AAA Security
Review Questions
1.Which of the following is the most secure authentication method?
A.One-time passwords
B.Token cards/soft tokens
C.Username and password
D.S/KEY
2.If you have a default configuration on your interface and then use the following global configuration command, which statement is true?
aaa authorization network gns tacacs local
A.If the TACACS+ server is not reachable, the NAS access will be enabled by default.
B.If the TACACS+ server is not reachable, the local database will be used.
C.The NAS will use the enable password by default.
D.If the TACACS+ server is not reachable, the user will be denied access.
3.Which command enables AAA globally on the NAS?
A.aaa enable
B.aaa new-model
C.aaa default enable
D.aaa authentication login default enable
4.Which component of AAA provides for the identification of users?
A.Accounting
B.Authorization
C.Authentication
D.Administration
5.Which of the following can AAA use for authenticating a user? (Choose all that apply.)
A.NDS
B.TACACS+
C.SQL
D.RADIUS
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |
![](/html/1438/356/html_23OY49ciqg.iQJr/htmlconvd-veJkuU92x1.jpg)
Review Questions |
61 |
6.Which component of AAA controls the privileges a user is granted?
A.Accounting
B.Authorization
C.Authentication
D.Administration
7.Which of these statements are true regarding the output of the following debug screen? (Choose all that apply.)
1d16h: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
Oct 5 12:32:12.294: BRI0/0 PPP: Treating connection as a dedicated line Oct 5 12:32:12.294: BRI0/0 PPP: Phase is AUTHENTICATING, by this end Oct 5 12:32:12.294: BRI0/0 CHAP: O CHALLENGE id 7 len 29 from *NASx
A.The user ID is NASx.
B.This connection is established on interface bri0/0.
C.The user is authenticating using CHAP (Challenge Handshake Authentication Protocol).
D.The client is attempting to set up a SLIP (Serial Line Internet Protocol) connection.
8.What does the wait-start radius command do when used with the aaa accounting network command? (Choose all that apply.)
A.The NAS looks for the account information on a RADIUS server.
B.Stop accounting records for network service requests are sent to the RADIUS server.
C.Start accounting records for network service requests are sent to the local database.
D.The requested service cannot start until the acknowledgment has been received from the RADIUS server.
9.Which of these statements are true regarding the following debug output? (Choose all that apply.)
Dec 23 11:59:40.663: AAA/AUTHEN/CONT (1351411051): continue_login (user=’Todd’)
Dec 23 11:59:40.663: AAA/AUTHEN (1351411051): status = GETPASS
Dec 23 11:59:40.663: AAA/AUTHEN/CONT (1351411051): Method=LOCAL
Dec 23 11:59:40.715: AAA/AUTHEN (1351411051): status = PASS
A.The authentication was successful.
B.The user belonged to the Todd group.
C.The method used was local authentication.
D.The output was generated from the debug aaa authentication command.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |
![](/html/1438/356/html_23OY49ciqg.iQJr/htmlconvd-veJkuU93x1.jpg)
62 Chapter 2 Introduction to AAA Security
10.Which of the following are packet-mode access methods? (Choose all that apply.)
A.BRI
B.Async
C.Sync
D.Group-sync
E.Telnet
F.Serial
11.Which of the following are considered character-mode access methods? (Choose all that apply.)
A.VTY
B.Async
C.Sync
D.Group-async
E.TTY
F.Serial
G.AUX
12.Which of the following protects against playback hacking?
A.PPP
B.PAP
C.CHAP
D.SLIP
13.Which of the following uses a three-way handshake?
A.PPP
B.PAP
C.CHAP
D.SLIP
14.Which of the following features was developed by Cisco?
A.RADIUS
B.TACACS+
C.Kerberos
D.CHAP
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |
![](/html/1438/356/html_23OY49ciqg.iQJr/htmlconvd-veJkuU94x1.jpg)
Review Questions |
63 |
15.Which of the following uses the Data Encryption Standard (DES)?
A.RADIUS
B.TACACS+
C.Kerberos
D.CHAP
16.Which of the following is the most secure username/password authentication method?
A.Static username/password
B.Aging username/password
C.One-time passwords (OTP)
D.Token cards/soft tokens
17.Which of these statements are true regarding the following debug output? (Choose all that apply.)
1:09:41: AAA/ACCT: EXEC acct start, line 10 1:09:52: AAA/ACCT: Connect start, line 10, glare 1:09:07: AAA/ACCT: Connection acct stop: task_id=60 service=exec port=10 protocol=telnet
A.This debug output shows that the user is using the local database on the NAS.
B.This is a debug output from the authorization component of AAA.
C.This is a debug output from the accounting component of AAA.
D.The user used Telnet to gain access to the NAS.
18.Which of these statements are true regarding the following debug output? (Choose all that apply.)
01:41:50: AAA/AUTHEN: free_user (0x81420624) user='todd' ruser='' port='tty0' rem_addr='async/' authen_type=ASCII service=LOGIN priv=101:42:12:
AAA/AUTHEN/CONT (864264997): Method=LOCAL
A.This debug output shows that the user is using a remote database for authenticating the user todd.
B.This is a debug output from the authorization component of AAA.
C.This is a debug output from the authentication component of AAA.
D.The password will be checked against the local line password.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |
![](/html/1438/356/html_23OY49ciqg.iQJr/htmlconvd-veJkuU95x1.jpg)
64 Chapter 2 Introduction to AAA Security
19.Which of these statements are true regarding the following debug output? (Choose all that apply.)
1:21:23: AAA/AUTHOR (0): user='Todd'
1:21:23: AAA/AUTHOR (0): send AV service=shell 1:21:23: AAA/AUTHOR (0): send AV cmd* 1:21:23: AAA/AUTHOR (342885561): Method=Local
A.The username is Todd.
B.This is a debug output from the authorization component of AAA.
C.This is a debug output from the authentication component of AAA.
D.This is using a remote database for authenticating the user Todd.
20.Which of the following commands trace AAA packets and monitor their activities? (Choose all that apply.)
A.debug aaa authentication
B.debug aaa authorization
C.debug aaa all
D.debug aaa accounting
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |