
- •Using Your Sybex Electronic Book
- •Acknowledgments
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Types of Network Security Threats
- •Types of Security Weaknesses
- •Technology Weaknesses
- •Configuration Weaknesses
- •Policy Weaknesses
- •Types of Network Attacks
- •Eavesdropping
- •Denial-of-Service Attacks
- •Unauthorized Access
- •WareZ
- •Masquerade Attack (IP Spoofing)
- •Session Hijacking or Replaying
- •Rerouting
- •Repudiation
- •Smurfing
- •Password Attacks
- •Man-in-the-Middle Attacks
- •Application-Layer Attacks
- •Trojan Horse Programs, Viruses, and Worms
- •HTML Attacks
- •The Corporate Security Policy
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Authentication Methods
- •Windows Authentication
- •Security Server Authentication
- •PAP and CHAP Authentication
- •PPP Callback
- •Configuring the NAS for AAA
- •Securing Access to the Exec Mode
- •Enable AAA Locally on the NAS
- •Authentication Configuration on the NAS
- •Authorization Configuration on the NAS
- •Accounting Configuration on the NAS
- •Verifying the NAS Configuration
- •Troubleshooting AAA on the Cisco NAS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 2.1: Setting the Line Passwords
- •Lab 2.2: Setting the Enable Passwords
- •Lab 2.3: Encrypting your Passwords
- •Lab 2.4: Creating Usernames and Logging In
- •Lab 2.5: Configuring AAA Authentication on the NAS
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the CiscoSecure ACS
- •Using User Databases for Authentication
- •Populating the User Database Population
- •New ACS Features
- •Installing CiscoSecure ACS 3.0
- •Administering CiscoSecure ACS
- •TACACS+ Overview
- •Configuring TACACS+
- •Using RADIUS
- •CiscoSecure User Database NAS Configuration for RADIUS
- •Verifying TACACS+
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Solving Eavesdropping and Session Replay Problems
- •Fighting Rerouting Attacks
- •Fighting Denial-of-Service Attacks
- •Turning Off and Configuring Network Services
- •Blocking SNMP Packets
- •Disabling Echo
- •Turning Off BOOTP and Auto-Config
- •Disabling the HTTP Interface
- •Disabling IP Source Routing
- •Disabling Proxy ARP
- •Disabling Redirect Messages
- •Disabling the Generation of ICMP Unreachable Messages
- •Disabling Multicast Route Caching
- •Disabling the Maintenance Operation Protocol (MOP)
- •Turning Off the X.25 PAD Service
- •Enabling the Nagle TCP Congestion Algorithm
- •Logging Every Event
- •Disabling Cisco Discovery Protocol
- •Disabling the Default Forwarded UDP Protocols
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 4.1: Controlling TCP/IP Services
- •Answers to Written Lab
- •Answers to Review Questions
- •Understanding the Cisco IOS Firewall
- •Authentication Proxy and IDS
- •Context-Based Access Control
- •CBAC Compared to ACLs
- •CBAC-Supported Protocols
- •Introduction to CBAC Configuration
- •Using Audit Trails and Alerts
- •Configuring Global Timeouts and Thresholds
- •Configuring PAM
- •Defining Inspection Rules
- •Applying Inspection Rules and ACLs to Router Interfaces
- •Configuring IP ACLs at the Interface
- •Testing and Verifying CBAC
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 5.1: Configure Logging and Audit Trails
- •Lab 5.2: Define and Apply Inspection Rules and ACLs
- •Lab 5.3: Test and Verify CBAC
- •Answers to Written Lab
- •Answers to Review Questions
- •Introduction to the Cisco IOS Firewall Authentication Proxy
- •Configuring the AAA Server
- •Configuring AAA
- •Configuring the Authentication Proxy
- •Testing and Verifying Your Configuration
- •show Commands
- •Clearing the Cache
- •Introduction to the Cisco IOS Firewall IDS
- •Initializing Cisco IOS Firewall IDS
- •Configuring, Disabling, and Excluding Signatures
- •Creating and Applying Audit Rules
- •Setting Default Actions
- •Creating an Audit Rule
- •Applying the Audit Rule
- •Verifying the Configuration
- •Stopping the IOS Firewall IDS
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 6.1: Enabling the IOS Firewall Authentication Proxy
- •Lab 6.2: Enabling the IOS Firewall IDS
- •Answers to Written Lab
- •Answers to Review Questions
- •What is a Virtual Private Network?
- •Introduction to Cisco IOS IPSec
- •IPSec Transforms
- •IPSec Operation
- •The Components of IPSec
- •IPSec Encapsulation
- •Internet Key Exchange (IKE)
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Answers to Written Lab
- •Answers to Review Questions
- •Configuring Cisco IOS IPSec for Pre-Shared Keys Site-to-Site
- •Preparing for IKE and IPSec
- •Configuring IKE
- •Configuring IPSec
- •Testing and Verifying IPSec
- •Configuring IPSec Manually
- •Configuring IPSec for RSA-Encrypted Nonces
- •Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site
- •Configuring CA Support Tasks
- •Preparing for IKE and IPSec
- •Configuring CA Support
- •Configuring IKE Using CA
- •Configuring IPSec for CA
- •Testing and Verifying IPSec for CA
- •Summary
- •Exam Essentials
- •Key Terms
- •Commands Used in This Chapter
- •Written Lab
- •Review Questions
- •Hands-On Labs
- •Lab 8.1: Configure IKE on Lab_A and Lab_B
- •Lab 8.2: Configure IPSec on Lab_A and Lab_B
- •Answers to Written Lab
- •Answers to Review Questions
- •Answers to Hands-On Labs
- •Answer to Lab 8.1
- •Answer to Lab 8.2
- •Introduction to Cisco Easy VPN
- •The Easy VPN Server
- •Introduction to the Cisco VPN 3.5 Client
- •Easy VPN Server Configuration Tasks
- •Pre-Configuring the Cisco VPN 3.5 Client
- •Summary
- •Exam Essentials
- •Key Terms
- •Written Lab
- •Review Questions
- •Hands-On Lab
- •Lab 9.1: Installing the Cisco VPN 3.5 Client Software on Windows
- •Answers to Written Lab
- •Answers to Review Questions
- •Network Separation
- •Three Ways through a PIX Firewall
- •PIX Firewall Configuration Basics
- •Configuring Interfaces
- •Saving Your Configuration
- •Configuring Access through the PIX Firewall
- •Configuring Outbound Access
- •Configuring Inbound Access
- •Configuring Multiple Interfaces and AAA on the PIX Firewall
- •Configuring Multiple Interfaces
- •Implementing AAA on the PIX Firewall
- •Configuring Advanced PIX Firewall Features
- •Failover
- •Outbound Access Control
- •Logging
- •SNMP Support
- •Java Applet Blocking
- •URL Filtering
- •Password Recovery
- •Glossary

Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site |
273 |
%The subject name in the certificate will be: Lab_A.mycorp.com
%Include the router serial number in the subject name? [yes/no]: no
%Include an IP address in the subject name [yes/no]? yes
Interface: serial0/0
Request certificate from CA [yes/no]? yes
%Certificate request sent to Certificate Authority
%The certificate request fingerprint will be displayed.
%The 'show crypto ca certificate' command will also show the fingerprint. Lab_A(config)#
Verifying and Saving Your Configurations
Now once again, it’s verification time. Verifying CA interoperability introduces two new show commands to the group you met earlier in the “Entering the RSA Public Key on Remote Devices Manually” section earlier in this chapter. Your new friends are
The show crypto ca certificates command that can be entered in privileged-exec mode to display information about a device’s certificate, the CA server certificate, and any RA certificates
The show crypto ca roots command that can also be entered in privileged-exec mode to display information about the CA roots configured on the device
You should always save your configuration after you make changes. After all this work, it would be a shame to lose it all now!
Use the copy system:running-config nvram:startup-config command to save your configuration. This saves the RSA keys as well. Saving to a TFTP server or using the Remote Copy Protocol (RCP) to save your configuration will not save the RSA keys.
Configuring IKE Using CA
IKE is configured the same way it was for pre-shared keys and RSA-encrypted nonces with one exception: the authentication method used. You need to enter the command authentication rsa-sig in IKE policy configuration mode. You verify the IKE policy using the same commands I showed you earlier.
Configuring IPSec for CA
IPSec for CA is configured in the same exact way as IPSec utilizing pre-shared keys and IPSec for RSA-encrypted nonces with no exceptions. If you’re less than clear on this, refer back to the section titled “Configuring IPSec” earlier in this chapter.
Sweet—you’re almost there—stay with me! Before moving on to testing and verifying IPSec for CA, let’s look at how all these steps come together.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

274 Chapter 8 Cisco IOS IPSec Pre-Shared Keys and Certificate Authority Support
To help you see the whole picture, you’re going to configure IPSec for CA between devices Lab_A and Lab_B in Exercise 8.3. Recall once again the corporate network shown in the following graphic:
Lab_A |
HostA HostB
172.16.2.0/24
|
Perimeter |
WWW Server |
DNS Server |
|
10.1.1.0/24 |
Router |
172.16.1.2/24 |
172.16.1.3/24 |
|
Internet |
|
|
|
|
|
Lab_B |
|
|
|
|
|
|
172.16.1.0/24 |
|
|
F0/0 |
"Dirty DMZ" |
|
|
172.16.1.254/24 |
|
|||
|
|
|
||
Protected DMZ |
|
|
|
|
|
PIX |
|
Bastion Host |
|
|
|
|
F0/0 |
|
|
|
192.168.254.254/24 |
|
|
Bastion Host |
|
|
|
|
NAS |
|
|
|
|
|
F0/0 |
|
|
|
192.168.254.252/24 |
|
|
|
|
|
CiscoSecure ACS 3.0 |
Management Station |
||
|
192.168.254.253/24 |
192.168.254.251/24 |
Let’s get started by dividing the process of configuring IPSec for CA into four steps:
1.Generate RSA public/private keys.
2.Configure CA support.
3.Configure IKE.
4.Configure IPSec.
Both hostnames and domain names have already been configured on the devices.
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site |
275 |
E X E R C I S E 8 . 3
Configuring IPSec for the CA Network
This exercise will have you configure IPSec using CA on the corporate network example.
1.First, you need to generate the public/private keys on each device using the following commands:
Lab_A#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Lab_A(config)#crypto key generate rsa
The name for the keys will be: Lab_A.mycorp.com
Choose the size of the key modulus in the range of 360 to 2048 for your
Signature Keys.
Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus [512]: 512
Generating RSA keys… [OK]
% Key pair was generated at 10:22:30 UTC Dec 23 2002 Lab_A(config)#
Lab_B#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Lab_B(config)#crypto key generate rsa
The name for the keys will be: Lab_B.mycorp.com
Choose the size of the key modulus in the range of 360 to 2048 for your
Signature Keys.
Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus [512]: 512
Generating RSA keys… [OK]
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

276 Chapter 8 Cisco IOS IPSec Pre-Shared Keys and Certificate Authority Support
E X E R C I S E 8 . 3 ( c o n t i n u e d )
% Key pair was generated at 10:22:30 UTC Dec 23 2002 Lab_B(config)#
2. Next, you need to configure CA support on each device using the following parameters: CA name: test_ca.
Enrollment URL: http://ca_server.
The devices need to ignore the CRL if one cannot be found.
The CA server doesn’t support LDAP.
Use the following commands to configure CA support:
Lab_A(config)#crypto ca identity test_ca
Lab_A(ca-identity)#enrollment url http://ca_server
Lab_A(ca-identity)#crl optional
Lab_A(ca-identity)#exit
Lab_A(config)#crypto ca authenticate test_ca
Certificate has the following attributes: Fingerprint: 0123 4567 89AB CDEF 0123 Do you accept this certificate? [yes/no]#y
Lab_A(config)#crypto ca enroll test_ca
%
%Start certificate enrollment.
%Create a challenge password. You will need to verbally provide this password
to the CA Administrator in order to revoke your certificate. For security
reasons your password will not be saved in the configuration. Please make
a note of it.
Password: cisco
Re-enter password: cisco
%The subject name in the certificate will be: Lab_A.mycorp.com
%Include the router serial number in the subject name? [yes/no]: no
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site |
277 |
E X E R C I S E 8 . 3 ( c o n t i n u e d )
% Include an IP address in the subject name [yes/no]? yes
Interface: serial0/0
Request certificate from CA [yes/no]? yes
%Certificate request sent to Certificate Authority
%The certificate request fingerprint will be displayed.
%The 'show crypto ca certificate' command will also show the fingerprint. Lab_A(config)#
Lab_B(config)#crypto ca identity test_ca
Lab_B(ca-identity)#enrollment url http://ca_server
Lab_B(ca-identity)#crl optional
Lab_B(ca-identity)#exit
Lab_B(config)#crypto ca authenticate test_ca
Certificate has the following attributes: Fingerprint: 0123 4567 89AB CDEF 0123 Do you accept this certificate? [yes/no]#y
Lab_B(config)#crypto ca enroll test_ca
%
%Start certificate enrollment.
%Create a challenge password. You will need to verbally provide this password
to the CA Administrator in order to revoke your certificate. For security
reasons your password will not be saved in the configuration. Please make
a note of it.
Password: cisco
Re-enter password: cisco
%The subject name in the certificate will be: Lab_A.mycorp.com
%Include the router serial number in the subject name? [yes/no]: no
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

278 Chapter 8 Cisco IOS IPSec Pre-Shared Keys and Certificate Authority Support
E X E R C I S E 8 . 3 ( c o n t i n u e d )
% Include an IP address in the subject name [yes/no]? yes
Interface: serial1/0
Request certificate from CA [yes/no]? yes
%Certificate request sent to Certificate Authority
%The certificate request fingerprint will be displayed.
%The 'show crypto ca certificate' command will also show the fingerprint. Lab_B(config)#
3.Configure IKE between the Lab_A device and the Lab_B device with the following parameters: Lab_A interface Serial 0/0 with IP address 10.1.1.1 /24
Lab_B interface Serial 1/0 with IP address 10.1.1.2 /24 Lab_A IKE policy priority equals 2
Lab_B IKE policy priority equals 2 3DES message encryption
MD5 message hash Authentication method: rsa-sig
Default Diffie-Hellman group for both devices Default IKE SA lifetime for both devices
IKE identity as the address for both devices
Use the following commands to configure IKE:
Lab_A(config)#crypto isakmp enable
Lab_A(config)#crypto isakmp policy 2
Lab_A(config-isakmp)#encryption 3des
Lab_A(config-isakmp)#hash md5
Lab_A(config-isakmp)#authentication rsa-sig
Lab_A(config-isakmp)#exit
Lab_A(config)#
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |

Configuring Cisco IOS IPSec Certificate Authority Support Site-to-Site |
279 |
E X E R C I S E 8 . 3 ( c o n t i n u e d )
Lab_B(config)#crypto isakmp enable
Lab_B(config)#crypto isakmp policy 2
Lab_B(config-isakmp)#encryption 3des
Lab_B(config-isakmp)#hash md5
Lab_B(config-isakmp)#authentication rsa-sig
Lab_B(config-isakmp)#exit
Lab_B(config)#
4.Finally, it’s time to configure IPSec, moving through the following list from beginning to end:
Create a transform set on each device named test using esp-des and tunnel mode.
Leave the global IPSec SA lifetimes set to their defaults.
Create a symmetrical extended access list on each device that will permit traffic from networks 172.16.2.0 /24 and 172.16.1.0 /24.
Create a crypto map on each device using the name test1 and sequence number 100.
Each sequence should use the transform set test and the extended access list just created, and set the peer to the IP address of the outgoing interface of the remote device.
Apply the crypto map to each device’s outgoing interface.
Use the following commands to configure IPSec:
Lab_A(config)#crypto ipsec tramsform-set test esp-des
Lab_A(cfg-crypto-trans)#exit
Lab_A(config)#access-list 100 permit ip 172.16.2.0 0.0.0.255 172.16.1.0 0.0.0.255
Lab_A(config)#access-list 100 permit ip 172.16.1.0 0.0.0.255 172.16.2.0 0.0.0.255
Lab_A(config)#cryto map test1 100 ipsec-isakmp
Lab_A(config-crypto-map)#match address 100
Lab_A(config-crypto-map)#set transform-set test
Lab_A(config-crypto-map)#set peer 10.1.1.2
Lab_A(config-crypto-map)#exit
Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. |
www.sybex.com |