
- •Using Your Sybex Electronic Book
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Types of Network Security Threats
- •Types of Security Weaknesses
- •Technology Weaknesses
- •Configuration Weaknesses
- •Policy Weaknesses
- •Types of Network Attacks
- •Eavesdropping
- •Denial-of-Service Attacks
- •Unauthorized Access
- •WareZ
- •Masquerade Attack (IP Spoofing)
- •Session Hijacking or Replaying
- •Rerouting
- •Repudiation
- •Smurfing
- •Password Attacks
- •Man-in-the-Middle Attacks
- •Application-Layer Attacks
- •Trojan Horse Programs, Viruses, and Worms
- •HTML Attacks
- •The Corporate Security Policy
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Authentication Methods
- •Windows Authentication
- •Security Server Authentication
- •PAP and CHAP Authentication
- •PPP Callback
- •Configuring the NAS for AAA
- •Securing Access to the Exec Mode
- •Enable AAA Locally on the NAS
- •Authentication Configuration on the NAS
- •Authorization Configuration on the NAS
- •Accounting Configuration on the NAS
- •Verifying the NAS Configuration
- •Troubleshooting AAA on the Cisco NAS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 2.1: Setting the Line Passwords
- •Lab 2.2: Setting the Enable Passwords
- •Lab 2.3: Encrypting your Passwords
- •Lab 2.4: Creating Usernames and Logging In
- •Lab 2.5: Configuring AAA Authentication on the NAS
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the CiscoSecure ACS
- •Using User Databases for Authentication
- •Populating the User Database Population
- •New ACS Features
- •Installing CiscoSecure ACS 3.0
- •Administering CiscoSecure ACS
- •TACACS+ Overview
- •Configuring TACACS+
- •Using RADIUS
- •CiscoSecure User Database NAS Configuration for RADIUS
- •Verifying TACACS+
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Solving Eavesdropping and Session Replay Problems
- •Fighting Rerouting Attacks
- •Fighting Denial-of-Service Attacks
- •Turning Off and Configuring Network Services
- •Blocking SNMP Packets
- •Disabling Echo
- •Turning Off BOOTP and Auto-Config
- •Disabling the HTTP Interface
- •Disabling IP Source Routing
- •Disabling Proxy ARP
- •Disabling Redirect Messages
- •Disabling the Generation of ICMP Unreachable Messages
- •Disabling Multicast Route Caching
- •Disabling the Maintenance Operation Protocol (MOP)
- •Turning Off the X.25 PAD Service
- •Enabling the Nagle TCP Congestion Algorithm
- •Logging Every Event
- •Disabling Cisco Discovery Protocol
- •Disabling the Default Forwarded UDP Protocols
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 4.1: Controlling TCP/IP Services
- •Answers to Written Lab
- •Answers to Review Questions
- •Understanding the Cisco IOS Firewall
- •Authentication Proxy and IDS
- •Context-Based Access Control
- •CBAC Compared to ACLs
- •CBAC-Supported Protocols
- •Introduction to CBAC Configuration
- •Using Audit Trails and Alerts
- •Configuring Global Timeouts and Thresholds
- •Configuring PAM
- •Defining Inspection Rules
- •Applying Inspection Rules and ACLs to Router Interfaces
- •Configuring IP ACLs at the Interface
- •Testing and Verifying CBAC
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 5.1: Configure Logging and Audit Trails
- •Lab 5.2: Define and Apply Inspection Rules and ACLs
- •Lab 5.3: Test and Verify CBAC
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the Cisco IOS Firewall Authentication Proxy
- •Configuring the AAA Server
- •Configuring AAA
- •Configuring the Authentication Proxy
- •Testing and Verifying Your Configuration
- •show Commands
- •Clearing the Cache
- •Introduction to the Cisco IOS Firewall IDS
- •Initializing Cisco IOS Firewall IDS
- •Configuring, Disabling, and Excluding Signatures
- •Creating and Applying Audit Rules
- •Setting Default Actions
- •Creating an Audit Rule
- •Applying the Audit Rule
- •Verifying the Configuration
- •Stopping the IOS Firewall IDS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 6.1: Enabling the IOS Firewall Authentication Proxy
- •Lab 6.2: Enabling the IOS Firewall IDS
- •Answers to Written Lab
- •Answers to Review Questions
- •What is a Virtual Private Network?
- •Introduction to Cisco IOS IPSec
- •IPSec Transforms
- •IPSec Operation
- •The Components of IPSec
- •IPSec Encapsulation
- •Internet Key Exchange (IKE)
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Configuring Cisco IOS IPSec for Pre-Shared Keys Site-to-Site
- •Preparing for IKE and IPSec
- •Configuring IKE
- •Configuring IPSec
- •Testing and Verifying IPSec
- •Configuring IPSec Manually
- •Configuring IPSec for RSA-Encrypted Nonces
- •Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site
- •Configuring CA Support Tasks
- •Preparing for IKE and IPSec
- •Configuring CA Support
- •Configuring IKE Using CA
- •Configuring IPSec for CA
- •Testing and Verifying IPSec for CA
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 8.1: Configure IKE on Lab_A and Lab_B
- •Lab 8.2: Configure IPSec on Lab_A and Lab_B
- •Answers to Written Lab
- •Answers to Review Questions
- •Answers to Hands-On Labs
- •Answer to Lab 8.1
- •Answer to Lab 8.2
- •Introduction to Cisco Easy VPN
- •The Easy VPN Server
- •Introduction to the Cisco VPN 3.5 Client
- •Easy VPN Server Configuration Tasks
- •Pre-Configuring the Cisco VPN 3.5 Client
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 9.1: Installing the Cisco VPN 3.5 Client Software on Windows
- •Answers to Written Lab
- •Answers to Review Questions
- •Network Separation
- •Three Ways through a PIX Firewall
- •PIX Firewall Configuration Basics
- •Configuring Interfaces
- •Saving Your Configuration
- •Configuring Access through the PIX Firewall
- •Configuring Outbound Access
- •Configuring Inbound Access
- •Configuring Multiple Interfaces and AAA on the PIX Firewall
- •Configuring Multiple Interfaces
- •Implementing AAA on the PIX Firewall
- •Configuring Advanced PIX Firewall Features
- •Failover
- •Outbound Access Control
- •Logging
- •SNMP Support
- •Java Applet Blocking
- •URL Filtering
- •Password Recovery
- •Glossary

Hands-On Labs |
65 |
Hands-On Labs
This section will have you configure a Cisco 2600 router with AAA. If you don’t have a Cisco router, please check www.routersim.com for a SECUR router simulator.
The labs in this chapter include the following:
Lab 2.1: Setting the Line Passwords
Lab 2.2: Setting the Enable Passwords
Lab 2.3: Encrypting Your Passwords
Lab 2.4: Creating Users and Logging In
Lab 2.5: Configuring AAA on the NAS
Lab 2.1: Setting the Line Passwords
This lab has you log in and set the character-mode passwords on your router.
1.Connect to your router and press Enter.
2.Type the command enable.
3.Type the command config t.
4.Set your hostname to “NAS” using the following command:
Router(config)#hostname NAS
5.Set the console, VTY, and AUX line passwords using the following commands:
NAS(config)#line con 0
NAS(config-line)#login
NAS(config-line)#password console
NAS(config-line)#line vty 0 4
NAS(config-line)#password telnet
NAS(config-line)#line aux 0
NAS(config-line)#password todd
6.Press Ctrl+Z and then type copy running-config startup-config.
Lab 2.2: Setting the Enable Passwords
This lab has you configure the enable passwords on your router.
1.Log in to the your router.
2.Type config t to enter global configuration mode. You should see the following output:
NAS#config t
Enter configuration commands, one per line. End with CNTL/Z. NAS(config)#
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

66 Chapter 2 Introduction to AAA Security
3.Set the enable password to “routersim” using the following command:
NAS(config)#enable password routersim
4.Set the enable secret password to “globalnet” using the following command:
NAS(config)#enable secret globalnet
5.Press Ctrl+Z and then type copy running-config startup-config.
6.Type show running-config and notice that the enable secret password is encrypted, but that the enable password and the line passwords are not.
Lab 2.3: Encrypting your Passwords
This lab has you configure password encryption on your router.
1.Log in to your router.
2.Go to the global configuration mode.
3.Type the following command:
NAS(config)#service password-encryption
NAS(config)#^Z (Ctrl+Z)
4.From the privilege mode prompt, type show running-config and verify that your passwords are indeed now encrypted.
5.Enter the global configuration mode and type the following commands:
NAS#config t
Enter configuration commands, one per line. End with CNTL/Z. NAS(config)#no service password-encryption
NAS(config)#^Z
NAS#
This turns off the encryption service from running in the background on your router.
Lab 2.4: Creating Usernames and Logging In
This lab has you create a user on your router and then log in using the username and password.
1.Log in to your router.
2.Enter the global configuration mode and create a user and password. Here’s an example:
NAS#config t
Enter configuration commands, one per line. End with CNTL/Z. NAS(config)#username todd password lammle
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Hands-On Labs |
67 |
3.Under each line, add the command login local so that the username and password are prompted when connecting to user-mode access.
NAS(config)#line con 0
NAS(config-line)#login local
NAS(config-line)#line aux 0
NAS(config-line)#login local
NAS(config-line)#line vty 0 4
NAS(config-line)#login local
4.Press Ctrl+Z and then exit.
5.Press Enter. You should be prompted for your username and password.
Lab 2.5: Configuring AAA Authentication on the NAS
This lab has you enable AAA on the NAS and use the local database on the NAS router for authentication.
1.Log in to your router.
2.Enter the global configuration mode and enable AAA globally on the NAS with the following command:
NAS#config t
Enter configuration commands, one per line. End with CNTL/Z. NAS(config)#aaa new-model
3.Set the AAA authentication to authenticate with the local username and password using the following command:
NAS(config)#aaa authentication login default local
4.Set the AAA authentication under the console, VTY, and AUX lines with the following commands:
NAS(config)#line console 0
NAS(config-line)#login authentication ?
WORD Use an authentication list with this name. default Use the default authentication list.
NAS(config-line)#login authentication default
NAS(config-line)#line aux 0
NAS(config-line)#login authentication default
NAS(config-line)#line vty 0 4
NAS(config-line)#login authentication default
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

68 Chapter 2 Introduction to AAA Security
5.Type the following command from the privileged mode:
NAS#debug aaa authentication
6.Log out of the router.
7.Notice that the authentication takes place from the debug output.
8.Turn off debugging with the undebug all command.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |