cisco press ccna security quick reference decrypted

90
CCNA Security Quick Reference Network Security Fundamentals......... 3 Securing Administrative Access to Routers ......................................... 20 Firewall Technologies ...................... 36 Cryptographic Services ................... 48 Understanding Intrusion Prevention and Detection................................. 65 Endpoint Security ........................... 78 Anthony Sequeira ciscopress.com

Upload: djan-lang

Post on 24-Apr-2015

96 views

Category:

Documents


13 download

DESCRIPTION

CCNA SECURITY

TRANSCRIPT

Page 1: Cisco Press CCNA Security Quick Reference Decrypted

CCNA Security QuickReference

Network Security Fundamentals. . . . . . . . . 3

Securing Administrative Access to

Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Firewall Technologies . . . . . . . . . . . . . . . . . . . . . . 36

Cryptographic Services . . . . . . . . . . . . . . . . . . . 48

Understanding Intrusion Prevention

and Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Anthony Sequeira

ciscopress.com

Page 2: Cisco Press CCNA Security Quick Reference Decrypted

About the AuthorAnthony Sequeira, CCIE No. 15626, completed the CCIE in Routing and Switching in January 2006. He is currentlypursuing the CCIE in Security. For the past 15 years, he has written and lectured to massive audiences about the latest innetworking technologies. He is currently a senior technical instructor and certified Cisco Systems instructor for SkillSoft.He lives with his wife and daughter in Florida. When he is not reading about the latest Cisco innovations, he is exploringthe Florida skies in a Cessna.

About the Technical EditorRyan Lindfield is an instructor and network administrator with Boson. He has more than 10 years of network adminis-tration experience. He has taught many courses designed for CCNA, CCNP, and CCSP preparation, among others. He haswritten many practice exams and study guides for various networking technologies. He also works as a consultant, whereamong his tasks are installing and configuring Cisco routers, switches, VPNs, intrusion detection systems, and firewalls.

[ 2 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 3: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

Network Security FundamentalsThis section covers the need for network security and the security objectives found with most organizations. This sectionalso examines the different types of attacks that modern networks can experience.

Why do we need network security?

Network threats include internal and external threats. Internal threats are the most serious. These threats often occurbecause best practices are not followed. For example, blank or default passwords are used, or in-house developers useinsecure programming practices.

External threats typically rely on technical methods to attack the network. The CCNA in Security focuses on combatingthese attacks using technical means. Firewalls, routers with access control lists (ACL), intrusion prevention systems (IPS),and other methods are the focus.

Network security objectives

Network security should provide the following:

n Data confidentiality

n Data integrity

n Data and system availability

Confidentiality ensures that only authorized individuals can view sensitive data. Powerful methods of ensuring confiden-tiality are encryption and access controls.

Integrity ensures that data has not been changed by an unauthorized individual.

[ 3 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 4: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

Availability ensures that access to the data is uninterrupted. Denial-of-service (DoS) attacks attempt to compromise dataavailability. These attacks typically try to fail a system using an unexpected condition or input, or fail an entire networkwith a large quantity of information.

Data classification

Public-sector classification levels include the following:

n Unclassified

n Sensitive but unclassified (SBU)

n Confidential

n Secret

n Top-secret

Private-sector classification levels include the following:

n Public

n Sensitive

n Private

n Confidential

Classification criteria include the following:

n Value: The most important factor.

n Age: With time, the sensitivity of data typically decreases.

[ 4 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 5: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

n Useful life: Information can be made obsolete with newer info.

n Personal association: The data is associated with sensitive issues or individuals.

Classification roles include the following:

n Owner

n Custodian (responsible for the day-to-day management of the data)

n User

Security controls

Administrative controls involve policies and procedures.

Technical controls involve electronics, hardware, and software.

Physical controls are mostly mechanical.

Controls are categorized as preventative, deterrent, or detective.

Responses

Investigators must prove motive, opportunity, and means.

The system should not be shut down or rebooted before the investigation begins.

[ 5 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 6: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

Laws and ethics

Security policy must attempt to follow criminal, civil, and administrative law.

Ethics refer to values that are even higher than the law.

Network Attack MethodologiesIt is very important to understand the command types of attacks that a network can experience. Studying these attacks isthe first step in defending against them

Motivations and classes of attack

A vulnerability is a weakness in a system that can be exploited by a threat.

A risk is the likelihood that a specific attack will exploit a particular vulnerability of a system.

An exploit happens when computer code is developed to take advantage of a vulnerability.

The main vulnerabilities of systems are categorized as follows:

n Design errors

n Protocol weaknesses

n Software vulnerabilities

n Misconfiguration

[ 6 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 7: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

n Hostile code

n Human factor

Potential adversaries can include the following:

n Nations or states

n Terrorists

n Criminals

n Hackers

n Corporate competitors

n Disgruntled employees

n Government agencies

Many different classifications are assigned to hackers, including the following:

n Hackers: Individuals who break into computer networks and systems to learn more about them.

n Crackers (criminal hackers): Hackers with a criminal intent to harm information systems.

n Phreakers (phone breakers): Individuals who compromise telephone systems.

n Script kiddies: Individuals with very low skill level. They do not write their own code. Instead, they run scriptswritten by other, more skilled attackers.

n Hacktivists: Individuals who have a political agenda in doing their work.

n Academic hackers: People who enjoy designing software and building programs with a sense for aesthetics andplayful cleverness.

[ 7 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 8: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

n Hobby hacker: Focuses mainly on computer and video games, software cracking, and the modification of computerhardware and other electronic devices.

How does a hacker usually think?

1. Perform footprint analysis (reconnaissance).

2. Enumerate applications and operating systems.

3. Manipulate users to gain access.

4. Escalate privileges.

5. Gather additional passwords and secrets.

6. Install back doors.

7. Leverage the compromised system.

Defense in depth

The defense-in-depth strategy recommends several principles:

n Defend in multiple places.

n Defend the enclave boundaries.

n Defend the computing environment.

n Build layered defenses.

n Use robust components.

[ 8 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 9: Cisco Press CCNA Security Quick Reference Decrypted

CHAPTER 1

Network Security Principles

n Use robust key management.

n Deploy IDS or IPS.

IP spoofing

IP spoofing refers to forging the source address information of a packet so that the packet appears to come from someother host in the network. IP spoofing is often the first step in the abuse of a network service, or a DoS type of attack.

In IP spoofing, the attacker sends messages to a computer with an IP address that indicates the message is coming from atrusted host.

The basis of IP spoofing lies in an inherent security weakness in TCP known as sequence prediction. Hackers can guessor predict the TCP sequence numbers that are used to construct a TCP packet without receiving any responses from theserver. Their prediction allows them to spoof a trusted host on a local network.

IP spoofing attacks are categorized in one of two ways:

n Nonblind spoofing: The attacker sniffs the sequence and acknowledgment numbers and does not need to “predict”them.

n Blind spoofing: The attacker sends several packets to the target machine to sample sequence numbers and thenpredicts them for the attack.

Spoof attacks are often combined with IP source-routing options set in packets. Source routing is the ability of the sourceto specify within the IP header a full routing path between endpoints. Cisco IOS routers drop all source-routed packets ifthe no ip source-route global command is configured. Security devices, such as Cisco PIX 500 Series SecurityAppliances and the Cisco ASA 5500 Series Adaptive Security Appliances, drop such packets by default.

[ 9 ]

© 2008 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 88 for more details.

CCNA Security Quick Reference by Anthony Sequeira

Page 10: Cisco Press CCNA Security Quick Reference Decrypted
Page 11: Cisco Press CCNA Security Quick Reference Decrypted
Page 12: Cisco Press CCNA Security Quick Reference Decrypted
Page 13: Cisco Press CCNA Security Quick Reference Decrypted
Page 14: Cisco Press CCNA Security Quick Reference Decrypted
Page 15: Cisco Press CCNA Security Quick Reference Decrypted
Page 16: Cisco Press CCNA Security Quick Reference Decrypted
Page 17: Cisco Press CCNA Security Quick Reference Decrypted
Page 18: Cisco Press CCNA Security Quick Reference Decrypted
Page 19: Cisco Press CCNA Security Quick Reference Decrypted
Page 20: Cisco Press CCNA Security Quick Reference Decrypted
Page 21: Cisco Press CCNA Security Quick Reference Decrypted
Page 22: Cisco Press CCNA Security Quick Reference Decrypted
Page 23: Cisco Press CCNA Security Quick Reference Decrypted
Page 24: Cisco Press CCNA Security Quick Reference Decrypted
Page 25: Cisco Press CCNA Security Quick Reference Decrypted
Page 26: Cisco Press CCNA Security Quick Reference Decrypted
Page 27: Cisco Press CCNA Security Quick Reference Decrypted
Page 28: Cisco Press CCNA Security Quick Reference Decrypted
Page 29: Cisco Press CCNA Security Quick Reference Decrypted
Page 30: Cisco Press CCNA Security Quick Reference Decrypted
Page 31: Cisco Press CCNA Security Quick Reference Decrypted
Page 32: Cisco Press CCNA Security Quick Reference Decrypted
Page 33: Cisco Press CCNA Security Quick Reference Decrypted
Page 34: Cisco Press CCNA Security Quick Reference Decrypted
Page 35: Cisco Press CCNA Security Quick Reference Decrypted
Page 36: Cisco Press CCNA Security Quick Reference Decrypted
Page 37: Cisco Press CCNA Security Quick Reference Decrypted
Page 38: Cisco Press CCNA Security Quick Reference Decrypted
Page 39: Cisco Press CCNA Security Quick Reference Decrypted
Page 40: Cisco Press CCNA Security Quick Reference Decrypted
Page 41: Cisco Press CCNA Security Quick Reference Decrypted
Page 42: Cisco Press CCNA Security Quick Reference Decrypted
Page 43: Cisco Press CCNA Security Quick Reference Decrypted
Page 44: Cisco Press CCNA Security Quick Reference Decrypted
Page 45: Cisco Press CCNA Security Quick Reference Decrypted
Page 46: Cisco Press CCNA Security Quick Reference Decrypted
Page 47: Cisco Press CCNA Security Quick Reference Decrypted
Page 48: Cisco Press CCNA Security Quick Reference Decrypted
Page 49: Cisco Press CCNA Security Quick Reference Decrypted
Page 50: Cisco Press CCNA Security Quick Reference Decrypted
Page 51: Cisco Press CCNA Security Quick Reference Decrypted
Page 52: Cisco Press CCNA Security Quick Reference Decrypted
Page 53: Cisco Press CCNA Security Quick Reference Decrypted
Page 54: Cisco Press CCNA Security Quick Reference Decrypted
Page 55: Cisco Press CCNA Security Quick Reference Decrypted
Page 56: Cisco Press CCNA Security Quick Reference Decrypted
Page 57: Cisco Press CCNA Security Quick Reference Decrypted
Page 58: Cisco Press CCNA Security Quick Reference Decrypted
Page 59: Cisco Press CCNA Security Quick Reference Decrypted
Page 60: Cisco Press CCNA Security Quick Reference Decrypted
Page 61: Cisco Press CCNA Security Quick Reference Decrypted
Page 62: Cisco Press CCNA Security Quick Reference Decrypted
Page 63: Cisco Press CCNA Security Quick Reference Decrypted
Page 64: Cisco Press CCNA Security Quick Reference Decrypted
Page 65: Cisco Press CCNA Security Quick Reference Decrypted
Page 66: Cisco Press CCNA Security Quick Reference Decrypted
Page 67: Cisco Press CCNA Security Quick Reference Decrypted
Page 68: Cisco Press CCNA Security Quick Reference Decrypted
Page 69: Cisco Press CCNA Security Quick Reference Decrypted
Page 70: Cisco Press CCNA Security Quick Reference Decrypted
Page 71: Cisco Press CCNA Security Quick Reference Decrypted
Page 72: Cisco Press CCNA Security Quick Reference Decrypted
Page 73: Cisco Press CCNA Security Quick Reference Decrypted
Page 74: Cisco Press CCNA Security Quick Reference Decrypted
Page 75: Cisco Press CCNA Security Quick Reference Decrypted
Page 76: Cisco Press CCNA Security Quick Reference Decrypted
Page 77: Cisco Press CCNA Security Quick Reference Decrypted
Page 78: Cisco Press CCNA Security Quick Reference Decrypted
Page 79: Cisco Press CCNA Security Quick Reference Decrypted
Page 80: Cisco Press CCNA Security Quick Reference Decrypted
Page 81: Cisco Press CCNA Security Quick Reference Decrypted
Page 82: Cisco Press CCNA Security Quick Reference Decrypted
Page 83: Cisco Press CCNA Security Quick Reference Decrypted
Page 84: Cisco Press CCNA Security Quick Reference Decrypted
Page 85: Cisco Press CCNA Security Quick Reference Decrypted
Page 86: Cisco Press CCNA Security Quick Reference Decrypted
Page 87: Cisco Press CCNA Security Quick Reference Decrypted