
- •Using Your Sybex Electronic Book
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Types of Network Security Threats
- •Types of Security Weaknesses
- •Technology Weaknesses
- •Configuration Weaknesses
- •Policy Weaknesses
- •Types of Network Attacks
- •Eavesdropping
- •Denial-of-Service Attacks
- •Unauthorized Access
- •WareZ
- •Masquerade Attack (IP Spoofing)
- •Session Hijacking or Replaying
- •Rerouting
- •Repudiation
- •Smurfing
- •Password Attacks
- •Man-in-the-Middle Attacks
- •Application-Layer Attacks
- •Trojan Horse Programs, Viruses, and Worms
- •HTML Attacks
- •The Corporate Security Policy
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Authentication Methods
- •Windows Authentication
- •Security Server Authentication
- •PAP and CHAP Authentication
- •PPP Callback
- •Configuring the NAS for AAA
- •Securing Access to the Exec Mode
- •Enable AAA Locally on the NAS
- •Authentication Configuration on the NAS
- •Authorization Configuration on the NAS
- •Accounting Configuration on the NAS
- •Verifying the NAS Configuration
- •Troubleshooting AAA on the Cisco NAS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 2.1: Setting the Line Passwords
- •Lab 2.2: Setting the Enable Passwords
- •Lab 2.3: Encrypting your Passwords
- •Lab 2.4: Creating Usernames and Logging In
- •Lab 2.5: Configuring AAA Authentication on the NAS
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the CiscoSecure ACS
- •Using User Databases for Authentication
- •Populating the User Database Population
- •New ACS Features
- •Installing CiscoSecure ACS 3.0
- •Administering CiscoSecure ACS
- •TACACS+ Overview
- •Configuring TACACS+
- •Using RADIUS
- •CiscoSecure User Database NAS Configuration for RADIUS
- •Verifying TACACS+
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Solving Eavesdropping and Session Replay Problems
- •Fighting Rerouting Attacks
- •Fighting Denial-of-Service Attacks
- •Turning Off and Configuring Network Services
- •Blocking SNMP Packets
- •Disabling Echo
- •Turning Off BOOTP and Auto-Config
- •Disabling the HTTP Interface
- •Disabling IP Source Routing
- •Disabling Proxy ARP
- •Disabling Redirect Messages
- •Disabling the Generation of ICMP Unreachable Messages
- •Disabling Multicast Route Caching
- •Disabling the Maintenance Operation Protocol (MOP)
- •Turning Off the X.25 PAD Service
- •Enabling the Nagle TCP Congestion Algorithm
- •Logging Every Event
- •Disabling Cisco Discovery Protocol
- •Disabling the Default Forwarded UDP Protocols
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 4.1: Controlling TCP/IP Services
- •Answers to Written Lab
- •Answers to Review Questions
- •Understanding the Cisco IOS Firewall
- •Authentication Proxy and IDS
- •Context-Based Access Control
- •CBAC Compared to ACLs
- •CBAC-Supported Protocols
- •Introduction to CBAC Configuration
- •Using Audit Trails and Alerts
- •Configuring Global Timeouts and Thresholds
- •Configuring PAM
- •Defining Inspection Rules
- •Applying Inspection Rules and ACLs to Router Interfaces
- •Configuring IP ACLs at the Interface
- •Testing and Verifying CBAC
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 5.1: Configure Logging and Audit Trails
- •Lab 5.2: Define and Apply Inspection Rules and ACLs
- •Lab 5.3: Test and Verify CBAC
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the Cisco IOS Firewall Authentication Proxy
- •Configuring the AAA Server
- •Configuring AAA
- •Configuring the Authentication Proxy
- •Testing and Verifying Your Configuration
- •show Commands
- •Clearing the Cache
- •Introduction to the Cisco IOS Firewall IDS
- •Initializing Cisco IOS Firewall IDS
- •Configuring, Disabling, and Excluding Signatures
- •Creating and Applying Audit Rules
- •Setting Default Actions
- •Creating an Audit Rule
- •Applying the Audit Rule
- •Verifying the Configuration
- •Stopping the IOS Firewall IDS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 6.1: Enabling the IOS Firewall Authentication Proxy
- •Lab 6.2: Enabling the IOS Firewall IDS
- •Answers to Written Lab
- •Answers to Review Questions
- •What is a Virtual Private Network?
- •Introduction to Cisco IOS IPSec
- •IPSec Transforms
- •IPSec Operation
- •The Components of IPSec
- •IPSec Encapsulation
- •Internet Key Exchange (IKE)
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Configuring Cisco IOS IPSec for Pre-Shared Keys Site-to-Site
- •Preparing for IKE and IPSec
- •Configuring IKE
- •Configuring IPSec
- •Testing and Verifying IPSec
- •Configuring IPSec Manually
- •Configuring IPSec for RSA-Encrypted Nonces
- •Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site
- •Configuring CA Support Tasks
- •Preparing for IKE and IPSec
- •Configuring CA Support
- •Configuring IKE Using CA
- •Configuring IPSec for CA
- •Testing and Verifying IPSec for CA
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 8.1: Configure IKE on Lab_A and Lab_B
- •Lab 8.2: Configure IPSec on Lab_A and Lab_B
- •Answers to Written Lab
- •Answers to Review Questions
- •Answers to Hands-On Labs
- •Answer to Lab 8.1
- •Answer to Lab 8.2
- •Introduction to Cisco Easy VPN
- •The Easy VPN Server
- •Introduction to the Cisco VPN 3.5 Client
- •Easy VPN Server Configuration Tasks
- •Pre-Configuring the Cisco VPN 3.5 Client
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 9.1: Installing the Cisco VPN 3.5 Client Software on Windows
- •Answers to Written Lab
- •Answers to Review Questions
- •Network Separation
- •Three Ways through a PIX Firewall
- •PIX Firewall Configuration Basics
- •Configuring Interfaces
- •Saving Your Configuration
- •Configuring Access through the PIX Firewall
- •Configuring Outbound Access
- •Configuring Inbound Access
- •Configuring Multiple Interfaces and AAA on the PIX Firewall
- •Configuring Multiple Interfaces
- •Implementing AAA on the PIX Firewall
- •Configuring Advanced PIX Firewall Features
- •Failover
- •Outbound Access Control
- •Logging
- •SNMP Support
- •Java Applet Blocking
- •URL Filtering
- •Password Recovery
- •Glossary

Exam Essentials 231
DSS verifies peers by exchanging public keys.
Diffie-Hellman establishes private and public keys that encrypt the keys used by DES and MD5.
When all of these items work together as a team, they create a very secure environment for transmitting data.
Summary
Congratulations—you made it! This chapter introduced you to many new concepts. VPNs are growing in demand, and if you want to remain relevant in today’s competitive marketplace, you positively must understand their terms and processes.
Cisco utilizes IPSec VPNs to provide a secure connection over a public network—connections that can be designed based on the business needs of your company. You can use remote-access solutions for telecommuters, site-to-site solutions for remote offices that need access to the corporate network, and extranet solutions to provide your customers and partners with the limited information they need.
Cisco provides a number of products to meet your IPSec needs. Cisco routers, CiscoSecure VPN Concentrators, and PIX Firewalls can all be used to create VPN solutions for your specific situation.
You really must have a thorough understanding of the concepts discussed in this chapter before proceeding to Chapter 8, so if you feel at all shaky on anything covered here, take the time you need to go back and review.
Exam Essentials
Explain virtual private networks. You must be able to explain how VPNs are used in the creation of secure networks. You need to understand the three different types of VPNs: site-to-site, extranet, and remote access.
List and explain the different tunneling technologies. The tunneling protocols currently available are GRE, L2F, L2TP, and PPTP. You must be able to explain how each of these protocols is used.
Explain IPSec operation. You need a solid understanding of the five steps of IPSec operation: how an IPSec process initiates, IKE phase 1, IKE phase 2, data transfer, and IPSec tunnel termination.
Explain the different key exchange methods. You must be able to list the different key exchange methods: pre-shared keys, RSA-encrypted nonces, and RSA signatures. You need to explain how each one operates and when each should be used.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

232 Chapter 7 Understanding Cisco IOS IPSec Support
Explain the Cisco IOS Cryptosystem. You must be able to explain that a cryptosystem is a combination of encryption technologies, working in harmony, that are used to encrypt data so that only the intended receiver can decrypt it. The Cisco IOS Cryptosystem uses DES, MD5, DSS, and DH.
List the Cisco equipment available for IPSec. Cisco uses their routers, VPN Concentrators, and the PIX Firewalls for IPSec VPN solutions.
Key Terms
Before you take the exam, be certain you are familiar with the following terms:
aggressive mode |
IPSec transform |
Authentication Header (AH) |
Layer 2 Forwarding (L2F) |
certificate authority (CA) |
Layer 2 Tunneling Protocol (L2TP) |
cryptosystem |
main mode |
Data Encryption Standard (DES) |
nonce |
Diffie-Hellman (DH) Agreement |
OAKLEY |
Digital Signature Standard (DSS) |
Point-to-Point Tunneling Protocol (PPTP) |
Encapsulating Security Payload (ESP) |
pre-shared keys |
encryption algorithms |
remote access VPNs |
extranet VPNs |
RSA signatures |
generic routing encapsulation (GRE) |
RSA-encrypted nonces |
hash |
security association (SA) |
Hash-Based Message Authentication |
Security Parameter Index (SPI) |
Code-Message Digest 5 (HMAC-MD5) |
|
hashing algorithm |
site-to-site VPNs |
IKE phase 1 |
transport mode |
IKE phase 2 |
Triple DES (3DES) |
Internet Security Association and Key |
tunnel mode |
Management Protocol (ISAKMP) |
|
IP Security (IPSec) |
virtual private network (VPN) |
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Written Lab |
233 |
Written Lab
This section asks you 10 write-in-the-answer questions to help you understand the technology that you need to know in order to pass the SECUR exam.
1.List the two phases of IKE.
2.List the Cisco devices available for IPSec.
3.What are the two symmetric encryption algorithms that provide confidentiality for ESP?
4.How many IPSec SAs are required for a peering session?
5.List the three categories of VPNs.
6.What makes up the Cisco IOS Cryptosystem?
7.What is XAuth’s function?
8.What tunneling protocols did L2TP replace?
9.What is an IPSec transform?
10.What is a nonce?
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

234 Chapter 7 Understanding Cisco IOS IPSec Support
Review Questions
1.Which of the following participate in the Cisco IOS Cryptosystem? (Choose all that apply.)
A.DH
B.MD5
C.ESP
D.DES
2.When does DH calculate the Xa?
A.IKE phase 1
B.IKE phase 2
C.IKE phase 3
D.None of the above
3.Which of the following types of authentication requires a user to manually generate keys and then manually exchange the public keys?
A.Pre-shared keys
B.RSA-encrypted nonces
C.RSA signatures
D.None of the above
4.Which of the following is an encryption algorithm that uses one key to encrypt data, another key to decrypt, and yet another key to encrypt it again before the data is ever sent to the peer?
A.DES
B.MD5
C.3DES
D.SHA-1
5.Which IPSec mode generates a new IP header?
A.Aggressive
B.Transport
C.Main
D.Tunnel
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Review Questions |
235 |
6.What is used by Cisco IOS Cryptosystem to exchange public keys for IPSec?
A.DES
B.ESP
C.MD5
D.DSS
7.Which of the following authentication methods utilizes a CA server?
A.Pre-shared keys
B.RSA-encrypted nonces
C.RSA signatures
D.None of the above
8.Which of the following Cisco devices is best used for remote access VPN solutions?
A.CiscoSecure VPN Concentrator
B.Cisco Router
C.PIX Firewall
D.None of the above
9.Which of the following algorithms produces a 128-bit authentication value that is truncated using the first 96 bits?
A.HMAC-MD5
B.HMAC-SHA-1
C.ESP
D.3DES
10.At which of the following OSI layers does IPSec operate?
A.Network
B.Data Link
C.Physical
D.Transport
11.Which of the following are forms of VPN? (Choose all that apply.)
A.Site-to-site
B.Externet
C.Intranet
D.Remote access
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

236 Chapter 7 Understanding Cisco IOS IPSec Support
12.Which VPN solution allows a site in another city to be securely connected to the corporate network over the Internet?
A.Site-to-site
B.Extranet
C.Internet
D.None of the above
13.Which of the following assigns an “inner” IP address to a remote user that is wrapped inside of the IPSec packet?
A.IKE aggressive mode
B.IKE main mode
C.IKE quick mode
D.IKE mode configuration
14.When is an IPSec SA negotiated?
A.IKE phase 1
B.Tunnel setup
C.IKE phase 2
D.IPSec initialization
15.Which of the following tunneling protocols is L2TP backward compatible with?
A.GRE
B.L2F
C.IPSec
D.PPP
16.Which of the following are used together to uniquely identify an IPSec SA? (Choose all that apply.)
A.SAD
B.SPI
C.IP source address
D.Security protocol identifier
17.Which type of VPN is best suited for telecommuters?
A.Extranet
B.Intranet
C.Remote access
D.None of the above
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Review Questions |
237 |
18.Which of the following protocols is used by the Cisco IOS Cryptosystem to encrypt data?
A.ESP
B.DES
C.DSS
D.DH
19.Which of the following tunneling protocols did Cisco and Microsoft jointly develop?
A.L2F
B.L2TP
C.GRE
D.PPTP
20.Which of the following statements are true about AH? (Choose all that apply.)
A.AH encrypts data.
B.AH provides data integrity.
C.AH provides anti-replay.
D.AH performs an integrity check of the whole packet.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |