SlideShare una empresa de Scribd logo
1 de 114
Descargar para leer sin conexión
Implementing Cisco Edge Network
Security Solutions
- Preparing for the SENSS Exam
Jagdeep Kang CCNP Sec, Content Engineer
Mark Bernard CCIE 23864, Consulting Systems Engineer
BRKCRT-2214
Agenda
• Overview of CCNP Security
• SENSS Exam Information
• SENSS Topics: Technical Introduction
• What You Need to Know?
• Sample Questions
• Conclusion with Q & A
CCNP Security Requirements
• The CCNA Security exam is the pre-requisites for this certification.
• Candidates will benefit from having some basic routing & switching knowledge and have
passed the CCNA Security (Implementing Cisco IOS Network Security - IINS 640-554)
exam.
• CCNP Security Certification requires the passing of four exams:
• 300-206 SENSS – Implementing Cisco Edge Network Security Solutions
• 300-207 SITCS – Implementing Cisco Threat Control Solutions
• 300-208 SISAS – Implementing Cisco Secure Access Solutions
• 300-209 SIMOS – Implementing Cisco Secure Mobile Solutions
• Certification valid for 3 years
300-206 SENSS Exam
• 90-minute exam
• Register with PearsonVUE
• www.vue.com/.cisco
• Exam cost is $250.00 US
Preparing for the 300-206 SENSS Exam
• Recommended reading
• CCNP Security Firewall 642-618 Quick Reference
• CCNP Security FIREWALL 642-618 Official Cert Guide
• Recommended training via CLP
• Deploying Cisco ASA Firewall Solutions v2.0
• Cisco learning network
• www.cisco.com/go/learnnetspace
• Practical experience
Available for pre-order
Test Taking Tips
• It’s not possible to cover everything!
• We want you to get a feel for the technical level of the exam, not every topic
possible
• Give you suggestions, resources, some examples
• Will focus on key topics
• Expect approx. 50 - 60 hours of reading per exam to achieve a firm
understanding on concepts
– Reading study material and books (reading material suggestions to follow)
– Watching technical VoDs & Webinars
• Plan for min. 20 - 25 hours of hands on lab practice
– Initial Setup, Configuration, Troubleshooting specific devices
300-206 SENSS High-Level Topics and Weighting
SENSS (300-206) Exam—Topics and Weighting
• 25% 1.0 Threat Defense
• 25% 2.0 Cisco Security Devices GUIs and Secured CLI Management
• 12% 3.0 Management Services on Cisco Devices
• 10% 4.0 Troubleshooting, Monitoring and Reporting Tools
• 16% 5.0 Threat Defense Architectures
• 12% 6.0 Security Components and Considerations
Threat Defense
Threat Defense—Key Concepts
1.1 Implement Firewall (ASA or IOS depending on which supports the
implementation)
• Implement ACLs
• Implement Static/Dynamic NAT/PAT; redesign of Network Address Translation
on the Cisco ASA (8.3 or Higher)
• Implement Object Groups
• Describe Threat Detection features
• Implement Botnet Traffic Filtering
• Configure Application Filtering and Protocol Inspection
• Describe ASA security context
Firewall Filtering Technologies
• The following are the mainstream filtering technologies:
• Stateless packet filtering Layer 3-only filtering
• Stateful packet filtering Layers 3 and 4
• Stateful packet filtering with AIC (or AVC) Layers 3—7
• Reputation-based filtering Botnet Traffic Filter
• Application layer gateway Layer 7
• Identity Firewall AD + 5-tuple information
• Cisco ASA version 8.4(2) introduces the concept of Identity Firewall;
enables the firewall to allow or deny access to network resources based
on the username identity instead of a simple source IP address.
• The Identity Firewall integrates with Microsoft Active Directory in
conjunction with an external Active Directory (AD) Agent that provides the
actual identity mapping.
Identity Firewall Components
The three main components of the Cisco ASA Identity Firewall solution are:
• Cisco ASA
• Cisco Context Directory Agent
• Microsoft Active Directory Domain Controllers
NAT Post ASA Version 8.3
NAT is redesigned in 8.3 and above to simplify operations:
• A single rule to translate the source and destination IP address.
• You can also manually establish the order in which NAT rules are processed.
• Introduction of NAT to “any” interface
Two Nat modes available in 8.3 and above
• Network Object NAT: translation rule that defines a network object.
• Well suited for source-only NAT
• Sometimes referred to as "Auto-NAT“
• Manual NAT:
• Policy based NAT when the source and destination address or port need to be considered
• Sometimes referred to as Twice NAT
Deploying Cisco ASA Botnet Traffic Filter
• The Botnet Traffic Filter is a reputation-based mechanism used to prevent traffic from
and to known bot-infected hosts.
• The Botnet Traffic Filter compares the source and destination IP address of each
connection to the following:
• Dynamic Cisco SIO database, updated by Cisco
• Static database, which can be populated manually
• When traffic matches an entry in either database, a syslog message is logged and
traffic can be dropped.
Deploying Cisco ASA Botnet Traffic Filter
Dynamic Database
• A dynamic database of known bad hostnames is downloaded from the Cisco SIO to the Cisco ASA
and is constantly updated.
• DNS replies for bad hostnames are cached on the appliance in a DNS reverse-lookup cache.
• When a new connection is initiated, its source and destination IP addresses are compared with
entries in the DNS reverse-lookup cache.
Deploying Cisco ASA Botnet Traffic Filter
To configure Botnet Traffic Filter, complete these tasks:
1.Enable lookups to the dynamic database
2.Optionally, add entries to the static database
3.Enable DNS inspection (DNS snooping)
4.Enable the Botnet Traffic Filter to detect bot traffic
5.Optionally, enable the Botnet Traffic Filter to drop bot traffic
Deploying Cisco ASA Botnet Traffic Filter
• Downloaded database is stored in running memory
• The update server determines how often the ASA polls the server for update
Task 1: Enable Lookups to the Dynamic Database
Configuration > Firewall > Botnet Traffic Filter > Botnet Database
Deploying Cisco ASA Botnet Traffic Filter
Task 2: Optionally, Add Entries to the Static Database
Configuration > Firewall > Botnet Traffic Filter > Black and White Lists
• Add an entry to the blacklist to drop traffic from or to that host
• Add an entry to the whitelist to receive a syslog message when traffic goes
to or from that host
Deploying Cisco ASA Botnet Traffic Filter
Task 3: Enable DNS Snooping
Configuration > Firewall > Botnet Traffic Filter > DNS Snooping
• DNS snooping is required to intercept and cache DNS replies in the DNS
reverse lookup cache
• This window displays all polices that include DNS inspection
Deploying Cisco ASA Botnet Traffic Filter
Task 4: Enable the Botnet Traffic Filter to Detect Bot Traffic
Configuration > Firewall > Botnet Traffic Filter > Traffic Settings
• Monitoring of traffic triggers a syslog message when traffic goes to or from
blacklisted or whitelisted IP address
• Enable Botnet traffic filter on all interfaces facing the Internet
Deploying Cisco ASA Botnet Traffic Filter
Task 5: Optionally, Enable Botnet Traffic Filter to Drop Traffic
Configuration > Firewall > Botnet Traffic Filter > Traffic Settings
• Blacklisted action causes traffic matching a blacklisted host to be dropped
Threat Defense—Key Concepts
1.2 Describe Layer 2 and Layer 3 Security
• Configure DHCP Snooping
• Describe and configure Dynamic ARP Inspection (DAI)
• Describe and configure Storm Control
• Describe and configure Port Security
• Describe common layer 2 threats and attacks and mitigation
• Describe and configure MACSec
• Describe and configure IP Source Guard
Threat Defense - Layer 2 Security Concepts
• DHCP Snooping - Specifically prevents
DHCP server spoofing attacks and mitigates
DHCP starvation to a degree.
• ARP Inspection - Prevents ARP spoofing
attacks by intercepting and validating all ARP
requests and responses.
• Storm Control - Monitors incoming traffic
levels over a 1-second traffic storm control
interval. Prevents traffic from being disrupted
by a broadcast, multicast, or unicast flood
• Private VLANs - Provide Layer 2 isolation
between ports within the same VLAN.
• MACsec Encryption - Provides MAC-layer
encryption over wired networks using OOB
methods for encryption keying.
Threat Defense - Layer 3 Security Concepts
• uRPF – Ensures that traffic from known
invalid networks should not be accepted on
interfaces from which they have never
originated.
• Interface ACL - Filter traffic on an
interface based on match criteria in the
packet header-source and destination IP
address, source and destination port,
protocol, and flags.
• Flexible Packet Matching - An ACL
pattern-matching tool and provides more
thorough and customized packet filters.
Enables users to match on arbitrary bits of a
packet at an arbitrary depth in the packet
header and payload.
Threat Defense—Configure Device Hardening Per
Best Practice
• 1.3 Configure Device Hardening Per Best Practices
• Network Device Planes – Data, Control, Management (Configure device
hardening per best practices for Routers, Switches, Firewalls)
Threat Defense – Network Device Planes
Data Plane
Provides traffic forwarding
functions:
switched and routed data
Control Plane Builds control structures
required for
traffic forwarding
Management Plane Provides device
management
functions
Threat Defense – Control Plane Security Controls
• Control Plane Policing – Allows users
to configure a quality of service (QoS) filter
that can granularly permit, drop, or rate-limit
traffic to the CPU using a MQC interface.
• Control Plane Protection - Extends the
CPP feature by enabling classification of the
control plane traffic based on packet
destination and information provided by the
forwarding plane, allowing appropriate
throttling for each category of packet.
• Router Protocol Authentication &
Filtering - Prevents injection of malicious
routing information and adjacency from
unknown, unauthenticated peers.
Threat Defense – Control Plane Protection
Configure The
ACL
Configure The
Class Map
Configure The
Policy Map
Apply The Policy
Map
ip access-list extended CPPR-EIGRP
permit eigrp 10.0.0.0 0.255.255.255 any
!
class-map CPPR-EIGRP-CLASS
match access-group name CPPR-EIGRP
!
policy-map CPPR-POLICY
class CPPR-EIGRP-CLASS
police rate 200 pps conform-action transmit
exceed-action drop
class class-default
police rate 50 pps conform-action transmit exceed-
action drop
!
control-plane host
service-policy input CPPR-POLICY
Threat Defense - Additional Reading Topics
• NAT on the ASA (8.3 or Higher) –
• https://learningnetwork.cisco.com/blogs/vip-perspectives/2012/10/11/meet-the-new-nat-
on-the-asa-83-or-higher
• Introduction to the Cisco ASA 1000V –
• http://www.cisco.com/c/en/us/td/docs/security/asa/asa87/asdm67/configuration_guide/a
sa_67_asdm_config/intro_intro.pdf
• Configuring Modules (ASA CX Module, ASA IPS Module, ASA CSC Module) –
• http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_fi
rewall_config/modules_cx.html
Simulation Example
You are the network security engineer for the XYZ network. The XYZ network requires
network address translation in order to hide internal addressing and to enable
connectivity from the network to the Internet. The CSO tasked you with implementing
dynamic NAT with PAT on the Cisco ASA for the hosts that require only outbound
connectivity. The CSO also tasked you to configure static NAT for servers that require
also inbound connectivity. In this activity you will need to do the following:
• Create a new network object with name DMZ-SRV and IP address 192.168.10.10.
• Configure static NAT with the following parameters:
- Translated IP address: 209.165.201.1
- Object name for the translated IP address: TRANSLATED-DMZ-SRV
- Source interface: DMZ
- Destination interface: outside
• Access the HQ-ASA console. Check the configuration by displaying the NAT table.
Click the grey buttons at the bottom of this frame to view the different windows.
Windows can be minimized and repositioned. You can reposition a window by dragging it by the
title bar.
Configure static NAT using network object NAT on the Cisco ASA
Simulation Example (Cont.)
Configure static NAT using network object NAT on the Cisco ASA
Not all ASDM screens are fully functional.
Threat Defense—Type of Exam Questions/Answers
• What is required to configure an application-layer inspection of FTP traffic on port 21 as well as 1056 (a
non-standard port)? - create an access list that specifies the ports, and assign it to a new class map
• What network device plane is responsible for device administration, provision configuration and
monitoring the device operation? – Control Plane
• What are the two common AAA protocols that are used to configure external AAA for management
access on the Cisco ASA? – RADIUS & TACACS+
• Scenario: At an organization, they have salesmen coming in to demo products, and they just pull the
Ethernet jack off employee PC and connect it to their laptop, hoping to get Internet access. Which
action can the administrator take to prevent this from occurring? - Configure port-security
• Name some hardening techniques for Cisco IOS router? – SSH, ACLs, password encryption
• What command is used to disable Cisco Discovery Protocol (CDP)? And why? - Switch1(config-
if)#no cdp enable; for example, on the external interface of the Internet router connected to your
ISP because the ISP does not need the details about the internal network configuration.
Cisco Security Devices GUIs and
Secured CLI Management
Cisco Security Devices GUIs and Secured CLI
Management—Key Concepts
• 2.1 Implement SSHv2, HTTPS, SNMPv3 access on the network devices
• 2.2 Implement RBAC on the ASA/IOS CLI and ASDM
• 2.3 Describe Cisco Prime Infrastructure
• Functions and use cases of Cisco Prime
• Device Management
• 2.4 Describe Cisco Security Manager (CSM)
• Functions and use cases of Cisco Prime
• Device Management
• 2.5 Implement Device Manager
• Implement ASA firewall features using ASDM
Overview
Licensing Requirements
Prerequisites
Guidelines and Limitations
Configuring the Feature
Monitoring the Logs
2.1 Implement the following access on network
devices:
• SSH v2
• HTTPS
• SNMP v3
Implement SSHv2, HTTPS, SNMPv3 Access
• AAA – A central repository of authentication
credentials, authorization rules, and
accounting logs. Permits who can access
the device, what they are authorized to do,
and what they accomplished by logging.
• SSH- A strongly encrypted and strongly
authenticated protocol that allows CLI
access to the ASA. Requires generating an
RSA key of at least 768 bits to enable.
• HTTPs - AA strongly encrypted and
strongly authenticated protocol that allows
GUI and file copy access to the adaptive
security appliance.
• SNMPv3 - v3 uses authentication and
encryption for transmission protection, and
therefore can be deployed over untrusted
network paths.
Implement HTTPS on the ASA
interface Management0/0
nameif management
security-level 80
ip address 10.10.2.1 255.255.255.0
no shutdown
!
http server enable
http 172.16.200.0 255.255.255.0 management
HTTPS Configuration
Scenario
CLI Requirements
on the ASA
Implement SSH access on an IOS device
hostname RouterA
ip domain-name cisco.com
!
crypto key generate rsa modulus 2048
!
ip ssh version 2
username admin privilege 15 secret
Admin92DXBh
!
ip access-list standard 90
permit 10.10.10.0 0.0.0.255
deny any log
!
vty 0 15
transport input ssh
login local
access-class 90 in
Configure the transport
Input to only accept SSH
Specify hostname and
domain name
Create an RSA key pair
* for SSH v2 the
modulus size must be at
least 768 bits
Optionally configure an
ACL to apply to the vty
Implement RBAC on the ASA/IOS CLI and ASDM
• RBAC is an access control
approach that restricts user
access based on the role of the
user.
• Users are assigned to roles with
specific permissions
• RBAC is being depreciated in IOS
with the Role Based CLI access
“Parser View” command (shown
later)
• User accounts have the following
attributes: username, password,
expiry date, user roles
Implement RBAC on the ASA using ASDM
Setting
Privilege Level
Implement RBAC on the IOS device
aaa-new model
!
aaa authentication login MGMT_ACCESS group tacacs+ local
aaa authorization exec MGMT_ACCESS group tacacs+ local
aaa authorization commands 1 MGMT_ACCESS group tacacs+ local
aaa authorization commands 15 MGMT_ACCESS group tacacs+ local
aaa accounting exec MGMT_ACCESS start-stop group tacacs+
aaa accounting commands 1 MGMT_ACCESS start-stop group tacacs+
aaa accounting commands 15 MGMT_ACCESS start-stop group tacacs+
!
username admin_backup privilege 15 secret admin_backup123
username security_viewer_backup privilege 7 secret
security_viewer_backup123
!
privilege exec level 7 show crypto ipsec sa
privilege exec level 7 show crypto ikev2 sa
!
tacacs server TACACS+
address ipv4 10.10.2.20
key cisco123
Configure
commands
and exec
levels
Configure
usernames
and privilege
levels
Configure
AAA
requirements
Implement Role Based CLI access on IOS devices
enable view
parser view NOC
secret 5 $1$TDy.$kquP9EdEYGJ0.oQE3cJaN.
commands configure include all ip access-list
commands configure include all interface
commands configure include ip
commands exec include configure terminal
commands exec include configure
commands exec include show running-config
commands exec include show
parser view secop
secret 5 $1$BLsw$UjHivthLFLACo9ClKXi46/
commands configure include all interface
commands configure include all zone-pair
commands configure include all zone
commands configure include all policy-map
Configure SOC view
• Allows SOC configure
commands
Allows NOC the following:
• dynamic routing protocol
• static routes
• apply interface specific
commands
• execute any show
commands
Configure NOC view
Enables root view
Describe Cisco Prime Infrastructure
Cisco Prime Infrastructure
can be used to generate
the following:
• Hardware lifecycle (EoX)
• Compliance details
• Security Reports - Product
Security Incident
Response Team (PSIRT)
EoX / PSIRT Reports
Cisco Security Manger (CSM)
Features:
• AAA and Access Rules
• Zone Based Policy Firewall Rules (IOS)
• Inspection Rules
• Access Control
• IPS Device Management
• DMVPN
• GETVPN
• QoS
• Comprehensive Reporting
Describe Cisco Security Manager (CSM)
1. Create a Layer 7 class map to identify traffic by matching criteria specific
to applications:
2. Create a Layer 7 policy map to defend against Application Layer attacks
by referencing a Layer 7 class-map and applying an action
3. Create a Layer 3/4 policy map to associate traffic defined in a Layer 3/4
class map and reference the Layer 7 policy map:
4. Use a service policy to activate the Layer 3/4 policy on an interface
or globally
• IM
• RTSP
• SIP
• DNS
• FTP
• H.323
• HTTP
Configuring Layer 7 Inspection Using ASDM
Use Case:
Filtering FTP Commands: Layer 7 Policy Map
NAT Rules
Firewall
Filtering FTP Commands: Layer 7 Policy Map (Cont.)
Inspections
Filtering FTP Commands: Service Policy Rule
Filtering FTP Commands: Service Policy Rule (Cont.)
• Match traffic based on protocols, ports, IP
addresses, and other layer 3 or 4 attributes:
• ACL
• Any packet
• Default inspection traffic
• IP differentiated services
code point
• TCP and UDP ports
• IP precedence
• RTP port numbers
• VPN tunnel group
• Typically contain only one match condition
• Are mandatory MPF components
Layer 7 Class MapsLayer 3/4 Class Maps
• Work with layer 7 policy maps to implement
advanced protocol inspection
• Match criteria is specific to one of the following
applications:
• DNS
• FTP
• H.323
• HTTP
• Enable you to specify a not operator for a match
condition
• Can contain one or more match conditions
• Can use regular expressions as match criteria
• Are optional MPF components (match criteria can
be specified in a layer 7 policy map instead)
• IM
• RTSP
• SIP
Implement Device Manager for Layer 7 Inspection
Cisco Security Devices GUIs and Secured CLI
Management—Prep Resources
25% 2.0 Cisco Security Devices GUIs and Secured CLI Management
• User Guide for Cisco Security Manager 4.3 -
http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_mana
ger/security_manager/4-3/user/guide/CSMUserGuide_wrapper.html
• Cisco Router and Security Device Manager_Technical References -
http://www.cisco.com/c/en/us/support/cloud-systems-management/router-security-device-
manager/products-technical-reference-list.html
• Cisco Prime Infrastructure 2.1 Release Notes -
http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-
1/release/notes/cpi_rn.html
• Administering Cisco ISE -
http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_admin.htML
Cisco Security Devices GUIs and Secured CLI
Management—Type of Exam Questions/Answer
• List few caveats for ASDM compatibility. - ASDM Launcher requires trusted
certificate, requires strong encryption license (3DES/AES) on ASA or workaround etc.
• List some features of the Cisco Prime Security Manager. - Cisco Prime Security
Manager provides a range of features for the Cisco ASA 5500-X NGFW platform:
preloaded on-box single-device management, central management application for multi-
device management, traffic-pattern reports, Object import, behavior-based policy
management, event analysis, monitoring, license management etc.
• What is the default service account in Cisco Security Manager 4.4? - casuser
Management Services on
Cisco Devices
Management Services on Cisco Devices
• 3.1 Configure NetFlow exporter on Cisco Routers,
Switches, and ASA
• 3.2 Implement SNMPv3
• 3.3 Implement logging on Cisco Routers,
Switches, and ASA using Cisco best practices
• 3.4 Implement NTP with authentication on Cisco
Routers, Switches, and ASA
• 3.5 Describe CDP, DNS, SCP, SFTP, and DHCP
Overview
Licensing Requirements
Prerequisites
Guidelines and Limitations
Configuring the Feature
Monitoring the Logs
Configure NetFlow exporter on Cisco IOS Device
Configuration Tasks:
1. Configure a Flexible NetFlow exporter.
2. Configure a Flexible NetFlow monitor.
3. Apply Flexible NetFlow monitors to routed interfaces.
.
Configure NetFlow exporter on Cisco IOS Device
flow exporter MYEXPORTER
destination 172.16.200.12
transport udp 9996
export-protocol netflow-v9
!
flow monitor MYMONITOR
record netflow ipv4 original-input
exporter MYEXPORTER
!
ip flow-export source Loopback0
!
interface GigabitEthernet 0/1
ip flow monitor MYMONITOR input
Configure the Flexible NetFlow
exporter.
Optionally set the source
address of the Netflow export
device
Configure a Flexible NetFlow
monitor
Apply the configured Flexible
NetFlow monitor to a network
interface
Optionally you can configure Sampled Netflow:
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/12-4t/nf-12-4t-
book/nflow-filt-samp-traff.html#GUID-A3BE26F6-B683-4E51-BEE2-FCAC8C229C5D
Implement SNMPv3 on the ASA
Create a
SNMPv3
group and
user for
use.
Implement SNMPv3 on the ASA (Cont.)
Allow the
SNMP clients
to poll or to
receive traps
from the ASA.
Implement SNMPv3 on the ASA (Cont.)
Select the
events to
notify on
through
SNMP traps
using ASDM.
Example link
up/down state.
Implement logging on Cisco Routers, Switches, and
ASA
Logging of device and network events can be used for:
• Device failure notifications
• Network telemetry and forensics
• Security audit
Support for the following logging destinations:
• Console
• Telnet or SSH administrative sessions (Terminal)
• The internal in-memory buffer
• Remote syslog servers
Implement logging on Cisco Routers, Switches, and
ASA
logging on
!
logging buffered informational
!
logging trap debugging logging host 192.168.20.51
Logging on Cisco IOS
Software
Router# show logging
Syslog logging: enabled (0 messages dropped, 2 messages rate-limited,
0
flushes, 0 overruns, xml disabled, filtering disabled)
<output omitted>
Console logging: level debugging, 3306 messages logged, xml
disabled, filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level informational, 3306 messages logged, xml
disabled, filtering disabled
<output omitted>
Trap logging: level debugging, 61 message lines logged
Logging to 192.168.21.51 (udp port 514, audit disabled, link up),
<output omiited>
Logging on Cisco IOS
Software
Logging buffered
enabled
Logging trap enabled
Logging to host
192.168.21.51
Implement logging on the ASA using the ASDM
0. Emergencies
1. Alert
2. Critical
3. Error
4. Warning
5. Notification
6. Informational
7. Debugging:
Possible message
severity levels are:
Globally enable
logging on the ASA
Configuration > Device Management > Logging > Logging Setup
Suppress message logging example:
MY_ASA(confIg)# no logging message 111009
level 7
NTP with authentication on Cisco Routers, Switches,
and ASA
Overview of NTP
• NTP is used for clock synchronization
between network devices
• Uses UDP on port 123
• NTP authentication and logging are
disabled by default
• NTP authentication can be enabled to
eliminate spoofing attacks (Best Practice)
• Accurate clock settings are required for:
• Logging with accurate timestamps
• Digital certificate validation
• SSO authentication mechanisms
Implement NTP on Cisco IOS Devices
NTP on Cisco IOS
Example
clock timezone CET 1
clock summer-time CEST recurring last Sun Mar 2:00 last
Sun Oct 3:00
!
ntp server 192.16.20.123
!
ntp authenticate
ntp authentication-key 1 md5 cisco
ntp server 192.168.20.123 key 1
ntp trusted-key 1
Commands Description
show ntp associations [Detail] Displays the status of NTP associations
show ntp status Displays the status of NTP
Show NTP
verification
Status on Cisco IOS
Management Services on Cisco Devices—Type of
Exam Questions/Answers
• Which command Enables random mode and specifies a sampling rate for the
NetFlow sampler? - mode random one-out-of sampling-rate
Example: Router(config-sampler)# mode random one-out-of 100
• Name three security features provided in SNMPv3? - Message integrity,
Authentication, and Encryption
• Which commands can disable logging to the console sessions and terminal
lines? - no logging console, no logging monitor
• What is the severity level of the following partial event message? Jan 5 2011
09:27:16 FIREWALL : %ASA-6-725002: Device completed ... -
Informational
Troubleshooting,
Monitoring and Reporting
Tools
Troubleshooting, Monitoring and Reporting Tools
• 4.1 Monitor firewall using analysis of packet tracer, packet capture,
and syslog
• Analyze packet tracer on the firewall using CLI/ASDM
• Configure and analyze packet capture using CLI/ASDM
• Analyze syslog events generated from ASA
Use ASDM Packet Tracer to analyze packets.
• Packet Tracer is a
tool that can verify
how rules will
affect traffic
passing through
the firewall.
• Optionally this can
also be done CLI.
ciscoasa# packet-tracer input inside tcp 10.2.25.3 www 209.165.202.158
aol detailed
Packet Tracer
Use ASDM Packet Capture Wizard to analyze
packets.
• A wizard can
be used to
capture traffic
to the ASDM
GUI.
• Optionally this
can also be
done CLI.
Packet Capture Wizard
Troubleshooting, Monitoring and Reporting Tools—
Prep Resources
• Embedded Packet Capture for Cisco IOS and IOS-XE Configuration
Example - http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-
embedded-packet-capture/116045-productconfig-epc-00.html
• Cisco Packet Tracer - https://www.netacad.com/web/about-us/cisco-packet-tracer
• Monitoring the Logs -
http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-
general-cli/monitor-syslog.html#pgfId-1806075
Troubleshooting, Monitoring and Reporting Tools —
Type of Exam Questions/Answers
• Which of the following represent ASA functions that can be tested
with Packet Tracer? - Routing table lookup, Network Address Translation
entries, Host connection limits, Access list results…..
• What are optional parameters of the packet-tracer command? - packet-
tracer input [src_int] protocol src_addr src_port dest_addr
dest_port [detailed] [xml]
• Which command shows the current logging rate-limit setting? - show
running-config logging rate-limit
Threat Defense Architectures
Threat Defense Architectures
5.1 Design a Firewall Solution
• High-availability
• Basic concepts of security zoning
• Transparent & Routed Modes
• Security Contexts
5.2 Layer 2 Security Solutions
• Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
• Describe best practices for implementation
• Describe how PVLANs can be used to segregate network traffic at Layer 2
Know the Cisco ASA Product Portfolio
PerformanceandScalability
Data CenterCampusBranch Office Internet Edge
ASA 5585-X SSP-20
(10 Gbps, 125K cps)
ASA 5585-X SSP-60
(40 Gbps, 350K cps)
ASA 5585-X SSP-40
(20 Gbps, 200K cps)
ASA 5585-X SSP-10
(4 Gbps, 50K cps)
ASA 5555-X
(4 Gbps,50K cps)
ASA 5545-X
(3 Gbps,30K cps)
ASA 5525-X
(2 Gbps, 20K cps)
ASA 5512-X
(1 Gbps, 10K cps)
ASA 5515-X
(1.2 Gbps,15K cps)
SMB/SOHO
ASA 5505
(150 Mbps, 4K cps)
ASAv10
(1 Gbps, 20K cps)
ASAv30
(2 Gbps, 60K cps)
ASAv5
(100 Mbps, 8K cps)
ASA 5506-X
ASA 5506W-X
ASA 5506H-X
ASA 5508-X
Layer 2 Security Solutions Private VLANs (PVLAN)
• A VLAN can be divided
into multiple logical
segments (secondary
VLANs) that have specific
connectivity needs.
• Secondary VLANs can
create host groups or
isolate individual hosts
and still provide Layer 3
routing out of the VLAN.
• Private VLANS run over
VLAN Trunking Protocol in
transparent mode.
PVLANs allow you to provide coarse access control within a VLAN to
limit connectivity:
Layer 2 Security Solutions Private VLANs (Cont.)
A port in a PVLAN can be one of
three types:
• Isolated: Communicate only with
promiscuous ports
• Promiscuous: Communicate with all other
ports
• Community: Communicate with other
members of the community and all
promiscuous ports
Note: For PVLANs, the VTP mode must
be transparent, not client or server.
Layer 2 Security Solutions Private VLANs (Cont.)
vtp mode transparent
!
vlan 600
private-vlan community
vlan 400
private-vlan isolated
vlan 200
private-vlan primary
private-vlan association 400,600
!
interface FastEthernet 5/1
switchport mode private-vlan host
switchport private-vlan host-association 200,400
interface range FastEthernet 5/2 - 3
switchport mode private-vlan host
switchport private-vlan host-association 200,600
interface FastEthernet 5/4
switchport mode private-vlan promiscuous
switchport private-vlan mapping 200,400,600
interface GigabitEthernet0/1
switchport mode trunk
switchport trunk encapsulation dot1q
Threat Defense Architectures—Prep Resources
• Firewall and IPS_Technology Design Guide:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD-
FirewallAndIPSDesignGuide-AUG13.pdf
• Design Zone for Security
http://www.cisco.com/c/en/us/solutions/enterprise/design-zone-
security/index.html
Threat Defense Architectures—Type of Exam
Questions/Answers
• What is a Zone-Based Policy Firewall zone? - collection of networks
reachable over one or a specific set of router interfaces
• Which two options are the default behavior when interfaces are tagged
into Cisco IOS Zone-Based Policy Firewall zones? - Interfaces in the same
zone can freely communicate and All traffic is denied between zones.
Security Components and
Considerations
Security Components and Considerations
6.1 Describe security operations management architectures
• Single device manager vs. multi-device manager
6.2 Describe Data Center security components and considerations
• Virtualization and Cloud security
6.3 Describe Collaboration security components and considerations
• Basic ASA UC Inspection features
• Protocols that can be inspected: SIP, MGCP, H323 (225, 245), SCCP, protocol
inspection/anomaly check
6.4 Describe common IPv6 security considerations
• Unified IPv6/IPv4 ACL on the ASA
• IPv6 First-Hop Security Concerns
• IPv6 and IPv4 Threat Comparison and Best Practices
Security Components and Considerations— Prep
Resources
Cisco TrustSec 2.0: Design and Implementation Guide
http://www.cisco.com/c/dam/en/us/td/docs/solutions/Enterprise/Security/TrustSec_2-0/trustsec_2-0_dig.pdf
Security and Virtualization in the Data Center
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_3_0/dc_sec_design.html
Cisco Collaboration Security
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/srnd/collab09/clb09/security.html
IPv6 First-Hop Security Concerns
http://www.cisco.com/web/about/security/intelligence/ipv6_first_hop.html
IPv6 and IPv4 Threat Comparison and Best Practice Evaluation (v1.0)
http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf
Security Intelligence Operations - Technical White Papers
http://tools.cisco.com/security/center/whitePapers.x?i=43
Security Components and Considerations—Type of
Exam Questions/Answers
• Match each Cisco SecureX component with its definition – Cisco TrustSec,
Identity Services Engine (ISE), Security Intelligence Organization (SIO), Cisco
AnyConnect Secure Mobility
• Threats that are unique to IPv6?
– Reconnaissance attacks, although more difficult but possible using IPv6 tools such as
Parasit6, Fakeroute6, or Scapy6
– IPv6 protocol stack attacks
– Attacks against ICMPv6
• What is IPv6 stateless address autoconfiguration (SLAAC)? - IPv6 stateless
address autoconfiguration (SLAAC) is a mechanism that enables an IPv6 endpoint to
get an IPv6 address from the link it is coming up on without requiring DHCPv6 address
allocation.
Additional Reference Material:
Lab Equipment, Software
Requirements and Recommended
Labs
CCNP Security ILT—Lab Topology
Attacker PC Guest PC Employee PC
HQ-ASA
L3-Sw
DMZ
Management
Outside
Inside
Site-to-site
Partner-ISR
Branch-ISR
Partner-Srv
Branch-Srv
HQ-ISE Admin PCHQ-CDA
HQ-ESA
HQ-WSA
DMZ-Srv
HQ-ISR
IPS/CX SW Module
HQ-Srv
SP-Srv
Internet-RTR
Internet
Cisco SIO
ScanSafe
Laboratory Equipment
Description
Cisco ASA 5515-X with IPS SW 6GE Data 1 GE Mgmt AC 3DES/AES
ASA 5512-X through 5555-X 120GB MLC SED SSD
Cisco 2901 w/2 GE, 4 EWIC, 2DSP, 256 CF 512 DRAM IP Base
Cisco 2901-2921 IOS Universal
512MB to 1.5GB DRAM Upgrade for Cisco 2901-2921
256MB Compact Flash for 1900, 2900, 3900 ISR
Cisco 2610XM with 1 FE interface
Cisco 3560 Catalyst 24 port
UCS C22 MD SFF w/ rail kit w/o PSF, CPU, mem, HDD PCIe
2.30 GHz , E5-2470/95W 8C/20MB Cache/DDR3 1600MHz
16GB DDR-1600-MHz RDIMM/PC3-12800/dual rank/1.35v
900GB 6Gb SAS 10K RPM SFF HDD/hot plug/drive slide mounted
MegaRAID 9240-8i, RAID 0/1/10/5/50 for C22/C24
650W Power Supply for C-series rack servers
Software List
Description
ASA 9.1 Software image for –X platforms (version 9.1(1)4 with ASDM 7.1(2))
ASA 5515-X Botnet Traffic Filter
ASA 5500 Strong Encryption License (3DES/AES) (Free)
AnyConnect Secure Mobility Client v3.0 (version 3.1.04059)
ISE 1.2 NFR Kit. Cisco Identity Service Engine (ISE) Partner Bundle Offering
(http://cisco.mediuscorp.com/ise)
ESA Premium SW Bundle (AS+AV+OF+ENC+DLP) SYR Lic 100-199 Users
Cisco Context Directory Agent
C2900 Software (C2900-UNIVERSALK9-M), Version 15.3(1)T
C3560 Software (C3560E-UNIVERSALK9-M), Version 15.0(2)SE2
Security License for 2901-2951
IP Base License 2901-2951
Microsoft Windows 7 Enterprise 32-bit
Microsoft Windows Server 2008 Enterprise
Wireshark
Kiwi Syslog Server, Free Edition
Scrutinizer (NetFlow) Trial Edition
Solar Winds REaltime Netflow Analyzer
Lab Equipment
• There are “free” products & demo software available (Example IPS, ASA,
ISE)
 Cisco ASDM 713
http://software.cisco.com/download/release.html?mdfid=280582808&softwareid=280
775064&release=7.1.3
• Home/Work lab environment is highly recommended
• Cisco Routers, Switches, and ASA
 Two Cisco routers configured or at least one to emulate the Internet traffic.
• Your exam preparation should be around ASA, Routers, and Switches
• Similar to the old SECURE exam but includes basic ASA Firewall concepts
now
Minimal Lab Solution
Stripped down Lab
• 1 ASA
• 1 Router
• 1 Switch
• 2 Servers and 2 PCs
Client PC Admin PC
ASA Server
DMZ Server
10.0.1.0/24
172.16.1.0/24
192.168.1.0/24 172.26.26.0/24
.20
.1
.2
.11
.1 .1 .50
Router
Gi0/0Gi0/1
Gi0/2
.1.10
Switch
SENSS 1.0 ILT—Lab Activities
• Lab 2-1: Configure Control and Management Plane Security Controls
• Lab 2-2: Configure Traffic Telemetry Methods
• Lab 2-3: Configure Layer 2 Data Plane Security Controls
• Lab 2-4: Configure Layer 3 Data Plane Security Controls
• Lab 3-1: Configure Cisco ASA NAT
• Lab 3-2: Configure Cisco IOS Software NAT
• Lab 4-1: Configure Basic Cisco ASA Access Policies
• Lab 4-2: Configure Advanced Cisco ASA Access Policies
• Lab 4-3: Configure Cisco ASA Botnet Traffic Filter
• Lab 4-4: Configure Cisco ASA Identity Firewall
• Lab 5-1: Configure Basic Cisco IOS Zone-Based Policy Firewall Access Policies
• Lab 5-2: Configure Advanced Cisco IOS Zone-Based Policy Firewall Access Policies
Lab 2-1: Configure Control and Management Plane
Security Controls
• Implement secure management using cryptographically protected protocols
(SSH, SNMP3)
• Configure Control Plane Protection (CPPr)
Lab 2-2: Configure Traffic Telemetry Methods
• Verify clock synchronization on devices
• Configure NTP, Logging, Netflow (Flexible and Random Sampled) using
ASDM
Lab 2-3: Configure Layer 2 Data Plane Security
Controls
• Perform DHCP Snooping attack to show vulnerability
• Configure ARP inspections; ip-to-mac bindings are verified against DHCP
snooping database, or, static ARP access list
• Configure DHCP snooping
Lab 2-4: Configure Layer 3 Data Plane Security
Controls
• Attack internal host
with spoofed IP
address
• Configure u RPF to
protect subnets
• Configure Source
Guard to protect
VLANs
Lab 3-1: Configure Cisco ASA NAT
• Configure fixed/static translations
• Configure dynamic NAT/PAT
• Monitoring in ASD and CLI
Lab 3-2: Configure Cisco IOS Software NAT
• Enabling Inbound and Outbound connectivity from certain sources to certain
destinations/services
• CLI Commands:
 show ip nat translations
 show ip nat statistics
 debug ip nat
Lab 4-1: Configure Basic Cisco ASA Access Policies
• Configuring Network Object Groups
• Configure Service Object Groups
• Monitoring ACLs in ASDM and CLI
Lab 4-2: Configure Advanced Cisco ASA Access
Policies
• Configure deep packet inspection for services that open channels on
dynamically assigned ports (default vs secondary TCP/UDP ports
• Commands:
 Show conn address x.x.x.x detail
 Show service policy
Lab 4-3: Configure Cisco ASA Botnet Traffic Filter
• Configure Botnet Traffic filter (using Dynamic or Static database)
• If Static Database, configure “Whitelist” destinations
• Enable DNS Inspection
Lab 4-4: Configure Cisco ASA Identity Firewall
• Configure CDA: mapping IP-addresses-to-Usernames
• Configure ASA for AD integration; LDAP on MS AD
• Configure Identity Based ACLS
Lab 5-1: Configure Basic Cisco IOS Zone-Based
Policy Firewall Access Policies
• Configure Zones, Zone Pairs, and Policies
• Configure Class Maps, Policy Maps and ACLs
Lab 5-2: Configure Advanced Cisco IOS Zone-
Based Policy Firewall Access Policies
• Configure parameter map of type “regex” - regular expression for argument
matching
• ‘regex” matches exe file extension
Reading Material &
Resources
Firewall Guides
Start Here
Cisco dot com Resources
• No CCO login required to download
the command references and
configuration guides.
• No need to read these documents
cover to cover, but they are essential
as reference material during exam
preparation.
• ‘Overview’ or ‘Information About’
section very helpful for each of the
many topics and features covered on
the exams.
Firewall Configuration Guides (46)
http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-
firewalls/products-installation-and-configuration-guides-list.html
Read these
guides
Find the ones
with the topics
in the exam
blueprint
Configuration Examples & Technotes (261)
http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-
firewalls/products-configuration-examples-list.html
• Initial Configuration
• AAA
• Allow and Block the
Traffic Through the
Security Appliance
• NAT and Access Lists
• ASDM
Search, Search, and Search Again!
• Many YouTube VODs out on the Internet contain good insight into Cisco ISE
technologies. Search beyond CCNP material, for example: “ASA
Firewall”…“ASA NAT 9.1”
• Not every document out on the Internet is 100% correct, so verify your findings,
then share!!!
• Cisco Configuration documents are a good resource.
• These documents provide valuable information into the theory behind different
ASA configuration challenges and the solutions.
• Key resource: for day-to-day work related problems and exam writers
Cisco Learning Network – Study Portal
Cisco Learning Network – Content Legend
Complete Your Online Session Evaluation
Don’t forget: Cisco Live sessions will be available
for viewing on-demand after the event at
CiscoLive.com/Online
• Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner
will receive a $750 Amazon
gift card.
• Complete your session surveys
though the Cisco Live mobile
app or your computer on
Cisco Live Connect.
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Table Topics
• Meet the Engineer 1:1 meetings
• Related sessions
Thank you
Brkcrt 2214

Más contenido relacionado

La actualidad más candente

6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
 
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Salem Trabelsi
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 

La actualidad más candente (20)

6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Example for configuring local attack defense
Example for configuring local attack defenseExample for configuring local attack defense
Example for configuring local attack defense
 
Nse4 fgt 6.0
Nse4 fgt 6.0Nse4 fgt 6.0
Nse4 fgt 6.0
 
Remote VPN
Remote VPNRemote VPN
Remote VPN
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 
How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 

Destacado

Cisco ASA CX обеспечивает безопасность с учетом контекста
Cisco ASA CX обеспечивает безопасность с учетом контекстаCisco ASA CX обеспечивает безопасность с учетом контекста
Cisco ASA CX обеспечивает безопасность с учетом контекста
Cisco Russia
 
Маршрутизаторы Cisco
Маршрутизаторы CiscoМаршрутизаторы Cisco
Маршрутизаторы Cisco
Cisco Russia
 
Обзор обновленной линейки коммутаторов.  Unified Access.
Обзор обновленной линейки коммутаторов. Unified Access. Обзор обновленной линейки коммутаторов. Unified Access.
Обзор обновленной линейки коммутаторов.  Unified Access.
Cisco Russia
 

Destacado (20)

Cisco ASA CX обеспечивает безопасность с учетом контекста
Cisco ASA CX обеспечивает безопасность с учетом контекстаCisco ASA CX обеспечивает безопасность с учетом контекста
Cisco ASA CX обеспечивает безопасность с учетом контекста
 
Маршрутизаторы Cisco
Маршрутизаторы CiscoМаршрутизаторы Cisco
Маршрутизаторы Cisco
 
Обзор обновленной линейки коммутаторов.  Unified Access.
Обзор обновленной линейки коммутаторов. Unified Access. Обзор обновленной линейки коммутаторов. Unified Access.
Обзор обновленной линейки коммутаторов.  Unified Access.
 
Коммутаторы Cisco Catalyst для построения уровня доступа корпоративных сетей
Коммутаторы Cisco Catalyst для построения уровня доступа корпоративных сетейКоммутаторы Cisco Catalyst для построения уровня доступа корпоративных сетей
Коммутаторы Cisco Catalyst для построения уровня доступа корпоративных сетей
 
Обзор новой версии Cisco Identity Service Engine 2.0
Обзор новой версии Cisco Identity Service Engine 2.0Обзор новой версии Cisco Identity Service Engine 2.0
Обзор новой версии Cisco Identity Service Engine 2.0
 
Сетевая безопасность в 2014: новые проблемы и их решение на базе Cisco
Сетевая безопасность в 2014: новые проблемы и их решение на базе CiscoСетевая безопасность в 2014: новые проблемы и их решение на базе Cisco
Сетевая безопасность в 2014: новые проблемы и их решение на базе Cisco
 
Построение технологических сетей связи
Построение технологических сетей связиПостроение технологических сетей связи
Построение технологических сетей связи
 
Архитектура технологических сетей и индустриальные решения Cisco
Архитектура технологических сетей и индустриальные решения Cisco Архитектура технологических сетей и индустриальные решения Cisco
Архитектура технологических сетей и индустриальные решения Cisco
 
Архитектура защиты внутренней сети
Архитектура защиты внутренней сети Архитектура защиты внутренней сети
Архитектура защиты внутренней сети
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
Authentification des protocoles de routage
Authentification des protocoles de routageAuthentification des protocoles de routage
Authentification des protocoles de routage
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
Как получить максимум от сетевого экрана Cisco ASA?
Как получить максимум от сетевого экрана Cisco ASA?Как получить максимум от сетевого экрана Cisco ASA?
Как получить максимум от сетевого экрана Cisco ASA?
 
EtherChannel
EtherChannelEtherChannel
EtherChannel
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Каталог продукции SALTO
Каталог продукции SALTOКаталог продукции SALTO
Каталог продукции SALTO
 
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
 
Virtuals LAN
Virtuals LANVirtuals LAN
Virtuals LAN
 
Protocole IKE/IPsec
Protocole IKE/IPsecProtocole IKE/IPsec
Protocole IKE/IPsec
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 

Similar a Brkcrt 2214

Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
ali raza
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
slavenvvv
 

Similar a Brkcrt 2214 (20)

Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
 
MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the Cloud
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud Security
 
Resume
ResumeResume
Resume
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
CCNA_Security_03.ppt
CCNA_Security_03.pptCCNA_Security_03.ppt
CCNA_Security_03.ppt
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
 
Unleashing the Power of Fabric Orchestrating New Performance Features for SR-...
Unleashing the Power of Fabric Orchestrating New Performance Features for SR-...Unleashing the Power of Fabric Orchestrating New Performance Features for SR-...
Unleashing the Power of Fabric Orchestrating New Performance Features for SR-...
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Brkcrt 2214

  • 1.
  • 2. Implementing Cisco Edge Network Security Solutions - Preparing for the SENSS Exam Jagdeep Kang CCNP Sec, Content Engineer Mark Bernard CCIE 23864, Consulting Systems Engineer BRKCRT-2214
  • 3. Agenda • Overview of CCNP Security • SENSS Exam Information • SENSS Topics: Technical Introduction • What You Need to Know? • Sample Questions • Conclusion with Q & A
  • 4. CCNP Security Requirements • The CCNA Security exam is the pre-requisites for this certification. • Candidates will benefit from having some basic routing & switching knowledge and have passed the CCNA Security (Implementing Cisco IOS Network Security - IINS 640-554) exam. • CCNP Security Certification requires the passing of four exams: • 300-206 SENSS – Implementing Cisco Edge Network Security Solutions • 300-207 SITCS – Implementing Cisco Threat Control Solutions • 300-208 SISAS – Implementing Cisco Secure Access Solutions • 300-209 SIMOS – Implementing Cisco Secure Mobile Solutions • Certification valid for 3 years
  • 5. 300-206 SENSS Exam • 90-minute exam • Register with PearsonVUE • www.vue.com/.cisco • Exam cost is $250.00 US
  • 6. Preparing for the 300-206 SENSS Exam • Recommended reading • CCNP Security Firewall 642-618 Quick Reference • CCNP Security FIREWALL 642-618 Official Cert Guide • Recommended training via CLP • Deploying Cisco ASA Firewall Solutions v2.0 • Cisco learning network • www.cisco.com/go/learnnetspace • Practical experience Available for pre-order
  • 7. Test Taking Tips • It’s not possible to cover everything! • We want you to get a feel for the technical level of the exam, not every topic possible • Give you suggestions, resources, some examples • Will focus on key topics • Expect approx. 50 - 60 hours of reading per exam to achieve a firm understanding on concepts – Reading study material and books (reading material suggestions to follow) – Watching technical VoDs & Webinars • Plan for min. 20 - 25 hours of hands on lab practice – Initial Setup, Configuration, Troubleshooting specific devices
  • 8. 300-206 SENSS High-Level Topics and Weighting SENSS (300-206) Exam—Topics and Weighting • 25% 1.0 Threat Defense • 25% 2.0 Cisco Security Devices GUIs and Secured CLI Management • 12% 3.0 Management Services on Cisco Devices • 10% 4.0 Troubleshooting, Monitoring and Reporting Tools • 16% 5.0 Threat Defense Architectures • 12% 6.0 Security Components and Considerations
  • 10. Threat Defense—Key Concepts 1.1 Implement Firewall (ASA or IOS depending on which supports the implementation) • Implement ACLs • Implement Static/Dynamic NAT/PAT; redesign of Network Address Translation on the Cisco ASA (8.3 or Higher) • Implement Object Groups • Describe Threat Detection features • Implement Botnet Traffic Filtering • Configure Application Filtering and Protocol Inspection • Describe ASA security context
  • 11. Firewall Filtering Technologies • The following are the mainstream filtering technologies: • Stateless packet filtering Layer 3-only filtering • Stateful packet filtering Layers 3 and 4 • Stateful packet filtering with AIC (or AVC) Layers 3—7 • Reputation-based filtering Botnet Traffic Filter • Application layer gateway Layer 7 • Identity Firewall AD + 5-tuple information • Cisco ASA version 8.4(2) introduces the concept of Identity Firewall; enables the firewall to allow or deny access to network resources based on the username identity instead of a simple source IP address. • The Identity Firewall integrates with Microsoft Active Directory in conjunction with an external Active Directory (AD) Agent that provides the actual identity mapping.
  • 12. Identity Firewall Components The three main components of the Cisco ASA Identity Firewall solution are: • Cisco ASA • Cisco Context Directory Agent • Microsoft Active Directory Domain Controllers
  • 13. NAT Post ASA Version 8.3 NAT is redesigned in 8.3 and above to simplify operations: • A single rule to translate the source and destination IP address. • You can also manually establish the order in which NAT rules are processed. • Introduction of NAT to “any” interface Two Nat modes available in 8.3 and above • Network Object NAT: translation rule that defines a network object. • Well suited for source-only NAT • Sometimes referred to as "Auto-NAT“ • Manual NAT: • Policy based NAT when the source and destination address or port need to be considered • Sometimes referred to as Twice NAT
  • 14. Deploying Cisco ASA Botnet Traffic Filter • The Botnet Traffic Filter is a reputation-based mechanism used to prevent traffic from and to known bot-infected hosts. • The Botnet Traffic Filter compares the source and destination IP address of each connection to the following: • Dynamic Cisco SIO database, updated by Cisco • Static database, which can be populated manually • When traffic matches an entry in either database, a syslog message is logged and traffic can be dropped.
  • 15. Deploying Cisco ASA Botnet Traffic Filter Dynamic Database • A dynamic database of known bad hostnames is downloaded from the Cisco SIO to the Cisco ASA and is constantly updated. • DNS replies for bad hostnames are cached on the appliance in a DNS reverse-lookup cache. • When a new connection is initiated, its source and destination IP addresses are compared with entries in the DNS reverse-lookup cache.
  • 16. Deploying Cisco ASA Botnet Traffic Filter To configure Botnet Traffic Filter, complete these tasks: 1.Enable lookups to the dynamic database 2.Optionally, add entries to the static database 3.Enable DNS inspection (DNS snooping) 4.Enable the Botnet Traffic Filter to detect bot traffic 5.Optionally, enable the Botnet Traffic Filter to drop bot traffic
  • 17. Deploying Cisco ASA Botnet Traffic Filter • Downloaded database is stored in running memory • The update server determines how often the ASA polls the server for update Task 1: Enable Lookups to the Dynamic Database Configuration > Firewall > Botnet Traffic Filter > Botnet Database
  • 18. Deploying Cisco ASA Botnet Traffic Filter Task 2: Optionally, Add Entries to the Static Database Configuration > Firewall > Botnet Traffic Filter > Black and White Lists • Add an entry to the blacklist to drop traffic from or to that host • Add an entry to the whitelist to receive a syslog message when traffic goes to or from that host
  • 19. Deploying Cisco ASA Botnet Traffic Filter Task 3: Enable DNS Snooping Configuration > Firewall > Botnet Traffic Filter > DNS Snooping • DNS snooping is required to intercept and cache DNS replies in the DNS reverse lookup cache • This window displays all polices that include DNS inspection
  • 20. Deploying Cisco ASA Botnet Traffic Filter Task 4: Enable the Botnet Traffic Filter to Detect Bot Traffic Configuration > Firewall > Botnet Traffic Filter > Traffic Settings • Monitoring of traffic triggers a syslog message when traffic goes to or from blacklisted or whitelisted IP address • Enable Botnet traffic filter on all interfaces facing the Internet
  • 21. Deploying Cisco ASA Botnet Traffic Filter Task 5: Optionally, Enable Botnet Traffic Filter to Drop Traffic Configuration > Firewall > Botnet Traffic Filter > Traffic Settings • Blacklisted action causes traffic matching a blacklisted host to be dropped
  • 22. Threat Defense—Key Concepts 1.2 Describe Layer 2 and Layer 3 Security • Configure DHCP Snooping • Describe and configure Dynamic ARP Inspection (DAI) • Describe and configure Storm Control • Describe and configure Port Security • Describe common layer 2 threats and attacks and mitigation • Describe and configure MACSec • Describe and configure IP Source Guard
  • 23. Threat Defense - Layer 2 Security Concepts • DHCP Snooping - Specifically prevents DHCP server spoofing attacks and mitigates DHCP starvation to a degree. • ARP Inspection - Prevents ARP spoofing attacks by intercepting and validating all ARP requests and responses. • Storm Control - Monitors incoming traffic levels over a 1-second traffic storm control interval. Prevents traffic from being disrupted by a broadcast, multicast, or unicast flood • Private VLANs - Provide Layer 2 isolation between ports within the same VLAN. • MACsec Encryption - Provides MAC-layer encryption over wired networks using OOB methods for encryption keying.
  • 24. Threat Defense - Layer 3 Security Concepts • uRPF – Ensures that traffic from known invalid networks should not be accepted on interfaces from which they have never originated. • Interface ACL - Filter traffic on an interface based on match criteria in the packet header-source and destination IP address, source and destination port, protocol, and flags. • Flexible Packet Matching - An ACL pattern-matching tool and provides more thorough and customized packet filters. Enables users to match on arbitrary bits of a packet at an arbitrary depth in the packet header and payload.
  • 25. Threat Defense—Configure Device Hardening Per Best Practice • 1.3 Configure Device Hardening Per Best Practices • Network Device Planes – Data, Control, Management (Configure device hardening per best practices for Routers, Switches, Firewalls)
  • 26. Threat Defense – Network Device Planes Data Plane Provides traffic forwarding functions: switched and routed data Control Plane Builds control structures required for traffic forwarding Management Plane Provides device management functions
  • 27. Threat Defense – Control Plane Security Controls • Control Plane Policing – Allows users to configure a quality of service (QoS) filter that can granularly permit, drop, or rate-limit traffic to the CPU using a MQC interface. • Control Plane Protection - Extends the CPP feature by enabling classification of the control plane traffic based on packet destination and information provided by the forwarding plane, allowing appropriate throttling for each category of packet. • Router Protocol Authentication & Filtering - Prevents injection of malicious routing information and adjacency from unknown, unauthenticated peers.
  • 28. Threat Defense – Control Plane Protection Configure The ACL Configure The Class Map Configure The Policy Map Apply The Policy Map ip access-list extended CPPR-EIGRP permit eigrp 10.0.0.0 0.255.255.255 any ! class-map CPPR-EIGRP-CLASS match access-group name CPPR-EIGRP ! policy-map CPPR-POLICY class CPPR-EIGRP-CLASS police rate 200 pps conform-action transmit exceed-action drop class class-default police rate 50 pps conform-action transmit exceed- action drop ! control-plane host service-policy input CPPR-POLICY
  • 29. Threat Defense - Additional Reading Topics • NAT on the ASA (8.3 or Higher) – • https://learningnetwork.cisco.com/blogs/vip-perspectives/2012/10/11/meet-the-new-nat- on-the-asa-83-or-higher • Introduction to the Cisco ASA 1000V – • http://www.cisco.com/c/en/us/td/docs/security/asa/asa87/asdm67/configuration_guide/a sa_67_asdm_config/intro_intro.pdf • Configuring Modules (ASA CX Module, ASA IPS Module, ASA CSC Module) – • http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_fi rewall_config/modules_cx.html
  • 30. Simulation Example You are the network security engineer for the XYZ network. The XYZ network requires network address translation in order to hide internal addressing and to enable connectivity from the network to the Internet. The CSO tasked you with implementing dynamic NAT with PAT on the Cisco ASA for the hosts that require only outbound connectivity. The CSO also tasked you to configure static NAT for servers that require also inbound connectivity. In this activity you will need to do the following: • Create a new network object with name DMZ-SRV and IP address 192.168.10.10. • Configure static NAT with the following parameters: - Translated IP address: 209.165.201.1 - Object name for the translated IP address: TRANSLATED-DMZ-SRV - Source interface: DMZ - Destination interface: outside • Access the HQ-ASA console. Check the configuration by displaying the NAT table. Click the grey buttons at the bottom of this frame to view the different windows. Windows can be minimized and repositioned. You can reposition a window by dragging it by the title bar. Configure static NAT using network object NAT on the Cisco ASA
  • 31. Simulation Example (Cont.) Configure static NAT using network object NAT on the Cisco ASA Not all ASDM screens are fully functional.
  • 32. Threat Defense—Type of Exam Questions/Answers • What is required to configure an application-layer inspection of FTP traffic on port 21 as well as 1056 (a non-standard port)? - create an access list that specifies the ports, and assign it to a new class map • What network device plane is responsible for device administration, provision configuration and monitoring the device operation? – Control Plane • What are the two common AAA protocols that are used to configure external AAA for management access on the Cisco ASA? – RADIUS & TACACS+ • Scenario: At an organization, they have salesmen coming in to demo products, and they just pull the Ethernet jack off employee PC and connect it to their laptop, hoping to get Internet access. Which action can the administrator take to prevent this from occurring? - Configure port-security • Name some hardening techniques for Cisco IOS router? – SSH, ACLs, password encryption • What command is used to disable Cisco Discovery Protocol (CDP)? And why? - Switch1(config- if)#no cdp enable; for example, on the external interface of the Internet router connected to your ISP because the ISP does not need the details about the internal network configuration.
  • 33. Cisco Security Devices GUIs and Secured CLI Management
  • 34. Cisco Security Devices GUIs and Secured CLI Management—Key Concepts • 2.1 Implement SSHv2, HTTPS, SNMPv3 access on the network devices • 2.2 Implement RBAC on the ASA/IOS CLI and ASDM • 2.3 Describe Cisco Prime Infrastructure • Functions and use cases of Cisco Prime • Device Management • 2.4 Describe Cisco Security Manager (CSM) • Functions and use cases of Cisco Prime • Device Management • 2.5 Implement Device Manager • Implement ASA firewall features using ASDM Overview Licensing Requirements Prerequisites Guidelines and Limitations Configuring the Feature Monitoring the Logs
  • 35. 2.1 Implement the following access on network devices: • SSH v2 • HTTPS • SNMP v3
  • 36. Implement SSHv2, HTTPS, SNMPv3 Access • AAA – A central repository of authentication credentials, authorization rules, and accounting logs. Permits who can access the device, what they are authorized to do, and what they accomplished by logging. • SSH- A strongly encrypted and strongly authenticated protocol that allows CLI access to the ASA. Requires generating an RSA key of at least 768 bits to enable. • HTTPs - AA strongly encrypted and strongly authenticated protocol that allows GUI and file copy access to the adaptive security appliance. • SNMPv3 - v3 uses authentication and encryption for transmission protection, and therefore can be deployed over untrusted network paths.
  • 37. Implement HTTPS on the ASA interface Management0/0 nameif management security-level 80 ip address 10.10.2.1 255.255.255.0 no shutdown ! http server enable http 172.16.200.0 255.255.255.0 management HTTPS Configuration Scenario CLI Requirements on the ASA
  • 38. Implement SSH access on an IOS device hostname RouterA ip domain-name cisco.com ! crypto key generate rsa modulus 2048 ! ip ssh version 2 username admin privilege 15 secret Admin92DXBh ! ip access-list standard 90 permit 10.10.10.0 0.0.0.255 deny any log ! vty 0 15 transport input ssh login local access-class 90 in Configure the transport Input to only accept SSH Specify hostname and domain name Create an RSA key pair * for SSH v2 the modulus size must be at least 768 bits Optionally configure an ACL to apply to the vty
  • 39. Implement RBAC on the ASA/IOS CLI and ASDM • RBAC is an access control approach that restricts user access based on the role of the user. • Users are assigned to roles with specific permissions • RBAC is being depreciated in IOS with the Role Based CLI access “Parser View” command (shown later) • User accounts have the following attributes: username, password, expiry date, user roles
  • 40. Implement RBAC on the ASA using ASDM Setting Privilege Level
  • 41. Implement RBAC on the IOS device aaa-new model ! aaa authentication login MGMT_ACCESS group tacacs+ local aaa authorization exec MGMT_ACCESS group tacacs+ local aaa authorization commands 1 MGMT_ACCESS group tacacs+ local aaa authorization commands 15 MGMT_ACCESS group tacacs+ local aaa accounting exec MGMT_ACCESS start-stop group tacacs+ aaa accounting commands 1 MGMT_ACCESS start-stop group tacacs+ aaa accounting commands 15 MGMT_ACCESS start-stop group tacacs+ ! username admin_backup privilege 15 secret admin_backup123 username security_viewer_backup privilege 7 secret security_viewer_backup123 ! privilege exec level 7 show crypto ipsec sa privilege exec level 7 show crypto ikev2 sa ! tacacs server TACACS+ address ipv4 10.10.2.20 key cisco123 Configure commands and exec levels Configure usernames and privilege levels Configure AAA requirements
  • 42. Implement Role Based CLI access on IOS devices enable view parser view NOC secret 5 $1$TDy.$kquP9EdEYGJ0.oQE3cJaN. commands configure include all ip access-list commands configure include all interface commands configure include ip commands exec include configure terminal commands exec include configure commands exec include show running-config commands exec include show parser view secop secret 5 $1$BLsw$UjHivthLFLACo9ClKXi46/ commands configure include all interface commands configure include all zone-pair commands configure include all zone commands configure include all policy-map Configure SOC view • Allows SOC configure commands Allows NOC the following: • dynamic routing protocol • static routes • apply interface specific commands • execute any show commands Configure NOC view Enables root view
  • 43. Describe Cisco Prime Infrastructure Cisco Prime Infrastructure can be used to generate the following: • Hardware lifecycle (EoX) • Compliance details • Security Reports - Product Security Incident Response Team (PSIRT) EoX / PSIRT Reports
  • 44. Cisco Security Manger (CSM) Features: • AAA and Access Rules • Zone Based Policy Firewall Rules (IOS) • Inspection Rules • Access Control • IPS Device Management • DMVPN • GETVPN • QoS • Comprehensive Reporting Describe Cisco Security Manager (CSM)
  • 45. 1. Create a Layer 7 class map to identify traffic by matching criteria specific to applications: 2. Create a Layer 7 policy map to defend against Application Layer attacks by referencing a Layer 7 class-map and applying an action 3. Create a Layer 3/4 policy map to associate traffic defined in a Layer 3/4 class map and reference the Layer 7 policy map: 4. Use a service policy to activate the Layer 3/4 policy on an interface or globally • IM • RTSP • SIP • DNS • FTP • H.323 • HTTP Configuring Layer 7 Inspection Using ASDM Use Case:
  • 46. Filtering FTP Commands: Layer 7 Policy Map NAT Rules Firewall
  • 47. Filtering FTP Commands: Layer 7 Policy Map (Cont.) Inspections
  • 48. Filtering FTP Commands: Service Policy Rule
  • 49. Filtering FTP Commands: Service Policy Rule (Cont.)
  • 50. • Match traffic based on protocols, ports, IP addresses, and other layer 3 or 4 attributes: • ACL • Any packet • Default inspection traffic • IP differentiated services code point • TCP and UDP ports • IP precedence • RTP port numbers • VPN tunnel group • Typically contain only one match condition • Are mandatory MPF components Layer 7 Class MapsLayer 3/4 Class Maps • Work with layer 7 policy maps to implement advanced protocol inspection • Match criteria is specific to one of the following applications: • DNS • FTP • H.323 • HTTP • Enable you to specify a not operator for a match condition • Can contain one or more match conditions • Can use regular expressions as match criteria • Are optional MPF components (match criteria can be specified in a layer 7 policy map instead) • IM • RTSP • SIP Implement Device Manager for Layer 7 Inspection
  • 51. Cisco Security Devices GUIs and Secured CLI Management—Prep Resources 25% 2.0 Cisco Security Devices GUIs and Secured CLI Management • User Guide for Cisco Security Manager 4.3 - http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_mana ger/security_manager/4-3/user/guide/CSMUserGuide_wrapper.html • Cisco Router and Security Device Manager_Technical References - http://www.cisco.com/c/en/us/support/cloud-systems-management/router-security-device- manager/products-technical-reference-list.html • Cisco Prime Infrastructure 2.1 Release Notes - http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2- 1/release/notes/cpi_rn.html • Administering Cisco ISE - http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_admin.htML
  • 52. Cisco Security Devices GUIs and Secured CLI Management—Type of Exam Questions/Answer • List few caveats for ASDM compatibility. - ASDM Launcher requires trusted certificate, requires strong encryption license (3DES/AES) on ASA or workaround etc. • List some features of the Cisco Prime Security Manager. - Cisco Prime Security Manager provides a range of features for the Cisco ASA 5500-X NGFW platform: preloaded on-box single-device management, central management application for multi- device management, traffic-pattern reports, Object import, behavior-based policy management, event analysis, monitoring, license management etc. • What is the default service account in Cisco Security Manager 4.4? - casuser
  • 54. Management Services on Cisco Devices • 3.1 Configure NetFlow exporter on Cisco Routers, Switches, and ASA • 3.2 Implement SNMPv3 • 3.3 Implement logging on Cisco Routers, Switches, and ASA using Cisco best practices • 3.4 Implement NTP with authentication on Cisco Routers, Switches, and ASA • 3.5 Describe CDP, DNS, SCP, SFTP, and DHCP Overview Licensing Requirements Prerequisites Guidelines and Limitations Configuring the Feature Monitoring the Logs
  • 55. Configure NetFlow exporter on Cisco IOS Device Configuration Tasks: 1. Configure a Flexible NetFlow exporter. 2. Configure a Flexible NetFlow monitor. 3. Apply Flexible NetFlow monitors to routed interfaces. .
  • 56. Configure NetFlow exporter on Cisco IOS Device flow exporter MYEXPORTER destination 172.16.200.12 transport udp 9996 export-protocol netflow-v9 ! flow monitor MYMONITOR record netflow ipv4 original-input exporter MYEXPORTER ! ip flow-export source Loopback0 ! interface GigabitEthernet 0/1 ip flow monitor MYMONITOR input Configure the Flexible NetFlow exporter. Optionally set the source address of the Netflow export device Configure a Flexible NetFlow monitor Apply the configured Flexible NetFlow monitor to a network interface Optionally you can configure Sampled Netflow: Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/12-4t/nf-12-4t- book/nflow-filt-samp-traff.html#GUID-A3BE26F6-B683-4E51-BEE2-FCAC8C229C5D
  • 57. Implement SNMPv3 on the ASA Create a SNMPv3 group and user for use.
  • 58. Implement SNMPv3 on the ASA (Cont.) Allow the SNMP clients to poll or to receive traps from the ASA.
  • 59. Implement SNMPv3 on the ASA (Cont.) Select the events to notify on through SNMP traps using ASDM. Example link up/down state.
  • 60. Implement logging on Cisco Routers, Switches, and ASA Logging of device and network events can be used for: • Device failure notifications • Network telemetry and forensics • Security audit Support for the following logging destinations: • Console • Telnet or SSH administrative sessions (Terminal) • The internal in-memory buffer • Remote syslog servers
  • 61. Implement logging on Cisco Routers, Switches, and ASA logging on ! logging buffered informational ! logging trap debugging logging host 192.168.20.51 Logging on Cisco IOS Software Router# show logging Syslog logging: enabled (0 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) <output omitted> Console logging: level debugging, 3306 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level informational, 3306 messages logged, xml disabled, filtering disabled <output omitted> Trap logging: level debugging, 61 message lines logged Logging to 192.168.21.51 (udp port 514, audit disabled, link up), <output omiited> Logging on Cisco IOS Software Logging buffered enabled Logging trap enabled Logging to host 192.168.21.51
  • 62. Implement logging on the ASA using the ASDM 0. Emergencies 1. Alert 2. Critical 3. Error 4. Warning 5. Notification 6. Informational 7. Debugging: Possible message severity levels are: Globally enable logging on the ASA Configuration > Device Management > Logging > Logging Setup Suppress message logging example: MY_ASA(confIg)# no logging message 111009 level 7
  • 63. NTP with authentication on Cisco Routers, Switches, and ASA Overview of NTP • NTP is used for clock synchronization between network devices • Uses UDP on port 123 • NTP authentication and logging are disabled by default • NTP authentication can be enabled to eliminate spoofing attacks (Best Practice) • Accurate clock settings are required for: • Logging with accurate timestamps • Digital certificate validation • SSO authentication mechanisms
  • 64. Implement NTP on Cisco IOS Devices NTP on Cisco IOS Example clock timezone CET 1 clock summer-time CEST recurring last Sun Mar 2:00 last Sun Oct 3:00 ! ntp server 192.16.20.123 ! ntp authenticate ntp authentication-key 1 md5 cisco ntp server 192.168.20.123 key 1 ntp trusted-key 1 Commands Description show ntp associations [Detail] Displays the status of NTP associations show ntp status Displays the status of NTP Show NTP verification Status on Cisco IOS
  • 65. Management Services on Cisco Devices—Type of Exam Questions/Answers • Which command Enables random mode and specifies a sampling rate for the NetFlow sampler? - mode random one-out-of sampling-rate Example: Router(config-sampler)# mode random one-out-of 100 • Name three security features provided in SNMPv3? - Message integrity, Authentication, and Encryption • Which commands can disable logging to the console sessions and terminal lines? - no logging console, no logging monitor • What is the severity level of the following partial event message? Jan 5 2011 09:27:16 FIREWALL : %ASA-6-725002: Device completed ... - Informational
  • 67. Troubleshooting, Monitoring and Reporting Tools • 4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog • Analyze packet tracer on the firewall using CLI/ASDM • Configure and analyze packet capture using CLI/ASDM • Analyze syslog events generated from ASA
  • 68. Use ASDM Packet Tracer to analyze packets. • Packet Tracer is a tool that can verify how rules will affect traffic passing through the firewall. • Optionally this can also be done CLI. ciscoasa# packet-tracer input inside tcp 10.2.25.3 www 209.165.202.158 aol detailed Packet Tracer
  • 69. Use ASDM Packet Capture Wizard to analyze packets. • A wizard can be used to capture traffic to the ASDM GUI. • Optionally this can also be done CLI. Packet Capture Wizard
  • 70. Troubleshooting, Monitoring and Reporting Tools— Prep Resources • Embedded Packet Capture for Cisco IOS and IOS-XE Configuration Example - http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios- embedded-packet-capture/116045-productconfig-epc-00.html • Cisco Packet Tracer - https://www.netacad.com/web/about-us/cisco-packet-tracer • Monitoring the Logs - http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa- general-cli/monitor-syslog.html#pgfId-1806075
  • 71. Troubleshooting, Monitoring and Reporting Tools — Type of Exam Questions/Answers • Which of the following represent ASA functions that can be tested with Packet Tracer? - Routing table lookup, Network Address Translation entries, Host connection limits, Access list results….. • What are optional parameters of the packet-tracer command? - packet- tracer input [src_int] protocol src_addr src_port dest_addr dest_port [detailed] [xml] • Which command shows the current logging rate-limit setting? - show running-config logging rate-limit
  • 73. Threat Defense Architectures 5.1 Design a Firewall Solution • High-availability • Basic concepts of security zoning • Transparent & Routed Modes • Security Contexts 5.2 Layer 2 Security Solutions • Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks • Describe best practices for implementation • Describe how PVLANs can be used to segregate network traffic at Layer 2
  • 74. Know the Cisco ASA Product Portfolio PerformanceandScalability Data CenterCampusBranch Office Internet Edge ASA 5585-X SSP-20 (10 Gbps, 125K cps) ASA 5585-X SSP-60 (40 Gbps, 350K cps) ASA 5585-X SSP-40 (20 Gbps, 200K cps) ASA 5585-X SSP-10 (4 Gbps, 50K cps) ASA 5555-X (4 Gbps,50K cps) ASA 5545-X (3 Gbps,30K cps) ASA 5525-X (2 Gbps, 20K cps) ASA 5512-X (1 Gbps, 10K cps) ASA 5515-X (1.2 Gbps,15K cps) SMB/SOHO ASA 5505 (150 Mbps, 4K cps) ASAv10 (1 Gbps, 20K cps) ASAv30 (2 Gbps, 60K cps) ASAv5 (100 Mbps, 8K cps) ASA 5506-X ASA 5506W-X ASA 5506H-X ASA 5508-X
  • 75. Layer 2 Security Solutions Private VLANs (PVLAN) • A VLAN can be divided into multiple logical segments (secondary VLANs) that have specific connectivity needs. • Secondary VLANs can create host groups or isolate individual hosts and still provide Layer 3 routing out of the VLAN. • Private VLANS run over VLAN Trunking Protocol in transparent mode. PVLANs allow you to provide coarse access control within a VLAN to limit connectivity:
  • 76. Layer 2 Security Solutions Private VLANs (Cont.) A port in a PVLAN can be one of three types: • Isolated: Communicate only with promiscuous ports • Promiscuous: Communicate with all other ports • Community: Communicate with other members of the community and all promiscuous ports Note: For PVLANs, the VTP mode must be transparent, not client or server.
  • 77. Layer 2 Security Solutions Private VLANs (Cont.) vtp mode transparent ! vlan 600 private-vlan community vlan 400 private-vlan isolated vlan 200 private-vlan primary private-vlan association 400,600 ! interface FastEthernet 5/1 switchport mode private-vlan host switchport private-vlan host-association 200,400 interface range FastEthernet 5/2 - 3 switchport mode private-vlan host switchport private-vlan host-association 200,600 interface FastEthernet 5/4 switchport mode private-vlan promiscuous switchport private-vlan mapping 200,400,600 interface GigabitEthernet0/1 switchport mode trunk switchport trunk encapsulation dot1q
  • 78. Threat Defense Architectures—Prep Resources • Firewall and IPS_Technology Design Guide: http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD- FirewallAndIPSDesignGuide-AUG13.pdf • Design Zone for Security http://www.cisco.com/c/en/us/solutions/enterprise/design-zone- security/index.html
  • 79. Threat Defense Architectures—Type of Exam Questions/Answers • What is a Zone-Based Policy Firewall zone? - collection of networks reachable over one or a specific set of router interfaces • Which two options are the default behavior when interfaces are tagged into Cisco IOS Zone-Based Policy Firewall zones? - Interfaces in the same zone can freely communicate and All traffic is denied between zones.
  • 81. Security Components and Considerations 6.1 Describe security operations management architectures • Single device manager vs. multi-device manager 6.2 Describe Data Center security components and considerations • Virtualization and Cloud security 6.3 Describe Collaboration security components and considerations • Basic ASA UC Inspection features • Protocols that can be inspected: SIP, MGCP, H323 (225, 245), SCCP, protocol inspection/anomaly check 6.4 Describe common IPv6 security considerations • Unified IPv6/IPv4 ACL on the ASA • IPv6 First-Hop Security Concerns • IPv6 and IPv4 Threat Comparison and Best Practices
  • 82. Security Components and Considerations— Prep Resources Cisco TrustSec 2.0: Design and Implementation Guide http://www.cisco.com/c/dam/en/us/td/docs/solutions/Enterprise/Security/TrustSec_2-0/trustsec_2-0_dig.pdf Security and Virtualization in the Data Center http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_3_0/dc_sec_design.html Cisco Collaboration Security http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/srnd/collab09/clb09/security.html IPv6 First-Hop Security Concerns http://www.cisco.com/web/about/security/intelligence/ipv6_first_hop.html IPv6 and IPv4 Threat Comparison and Best Practice Evaluation (v1.0) http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf Security Intelligence Operations - Technical White Papers http://tools.cisco.com/security/center/whitePapers.x?i=43
  • 83. Security Components and Considerations—Type of Exam Questions/Answers • Match each Cisco SecureX component with its definition – Cisco TrustSec, Identity Services Engine (ISE), Security Intelligence Organization (SIO), Cisco AnyConnect Secure Mobility • Threats that are unique to IPv6? – Reconnaissance attacks, although more difficult but possible using IPv6 tools such as Parasit6, Fakeroute6, or Scapy6 – IPv6 protocol stack attacks – Attacks against ICMPv6 • What is IPv6 stateless address autoconfiguration (SLAAC)? - IPv6 stateless address autoconfiguration (SLAAC) is a mechanism that enables an IPv6 endpoint to get an IPv6 address from the link it is coming up on without requiring DHCPv6 address allocation.
  • 84. Additional Reference Material: Lab Equipment, Software Requirements and Recommended Labs
  • 85. CCNP Security ILT—Lab Topology Attacker PC Guest PC Employee PC HQ-ASA L3-Sw DMZ Management Outside Inside Site-to-site Partner-ISR Branch-ISR Partner-Srv Branch-Srv HQ-ISE Admin PCHQ-CDA HQ-ESA HQ-WSA DMZ-Srv HQ-ISR IPS/CX SW Module HQ-Srv SP-Srv Internet-RTR Internet Cisco SIO ScanSafe
  • 86. Laboratory Equipment Description Cisco ASA 5515-X with IPS SW 6GE Data 1 GE Mgmt AC 3DES/AES ASA 5512-X through 5555-X 120GB MLC SED SSD Cisco 2901 w/2 GE, 4 EWIC, 2DSP, 256 CF 512 DRAM IP Base Cisco 2901-2921 IOS Universal 512MB to 1.5GB DRAM Upgrade for Cisco 2901-2921 256MB Compact Flash for 1900, 2900, 3900 ISR Cisco 2610XM with 1 FE interface Cisco 3560 Catalyst 24 port UCS C22 MD SFF w/ rail kit w/o PSF, CPU, mem, HDD PCIe 2.30 GHz , E5-2470/95W 8C/20MB Cache/DDR3 1600MHz 16GB DDR-1600-MHz RDIMM/PC3-12800/dual rank/1.35v 900GB 6Gb SAS 10K RPM SFF HDD/hot plug/drive slide mounted MegaRAID 9240-8i, RAID 0/1/10/5/50 for C22/C24 650W Power Supply for C-series rack servers
  • 87. Software List Description ASA 9.1 Software image for –X platforms (version 9.1(1)4 with ASDM 7.1(2)) ASA 5515-X Botnet Traffic Filter ASA 5500 Strong Encryption License (3DES/AES) (Free) AnyConnect Secure Mobility Client v3.0 (version 3.1.04059) ISE 1.2 NFR Kit. Cisco Identity Service Engine (ISE) Partner Bundle Offering (http://cisco.mediuscorp.com/ise) ESA Premium SW Bundle (AS+AV+OF+ENC+DLP) SYR Lic 100-199 Users Cisco Context Directory Agent C2900 Software (C2900-UNIVERSALK9-M), Version 15.3(1)T C3560 Software (C3560E-UNIVERSALK9-M), Version 15.0(2)SE2 Security License for 2901-2951 IP Base License 2901-2951 Microsoft Windows 7 Enterprise 32-bit Microsoft Windows Server 2008 Enterprise Wireshark Kiwi Syslog Server, Free Edition Scrutinizer (NetFlow) Trial Edition Solar Winds REaltime Netflow Analyzer
  • 88. Lab Equipment • There are “free” products & demo software available (Example IPS, ASA, ISE)  Cisco ASDM 713 http://software.cisco.com/download/release.html?mdfid=280582808&softwareid=280 775064&release=7.1.3 • Home/Work lab environment is highly recommended • Cisco Routers, Switches, and ASA  Two Cisco routers configured or at least one to emulate the Internet traffic. • Your exam preparation should be around ASA, Routers, and Switches • Similar to the old SECURE exam but includes basic ASA Firewall concepts now
  • 89. Minimal Lab Solution Stripped down Lab • 1 ASA • 1 Router • 1 Switch • 2 Servers and 2 PCs Client PC Admin PC ASA Server DMZ Server 10.0.1.0/24 172.16.1.0/24 192.168.1.0/24 172.26.26.0/24 .20 .1 .2 .11 .1 .1 .50 Router Gi0/0Gi0/1 Gi0/2 .1.10 Switch
  • 90. SENSS 1.0 ILT—Lab Activities • Lab 2-1: Configure Control and Management Plane Security Controls • Lab 2-2: Configure Traffic Telemetry Methods • Lab 2-3: Configure Layer 2 Data Plane Security Controls • Lab 2-4: Configure Layer 3 Data Plane Security Controls • Lab 3-1: Configure Cisco ASA NAT • Lab 3-2: Configure Cisco IOS Software NAT • Lab 4-1: Configure Basic Cisco ASA Access Policies • Lab 4-2: Configure Advanced Cisco ASA Access Policies • Lab 4-3: Configure Cisco ASA Botnet Traffic Filter • Lab 4-4: Configure Cisco ASA Identity Firewall • Lab 5-1: Configure Basic Cisco IOS Zone-Based Policy Firewall Access Policies • Lab 5-2: Configure Advanced Cisco IOS Zone-Based Policy Firewall Access Policies
  • 91. Lab 2-1: Configure Control and Management Plane Security Controls • Implement secure management using cryptographically protected protocols (SSH, SNMP3) • Configure Control Plane Protection (CPPr)
  • 92. Lab 2-2: Configure Traffic Telemetry Methods • Verify clock synchronization on devices • Configure NTP, Logging, Netflow (Flexible and Random Sampled) using ASDM
  • 93. Lab 2-3: Configure Layer 2 Data Plane Security Controls • Perform DHCP Snooping attack to show vulnerability • Configure ARP inspections; ip-to-mac bindings are verified against DHCP snooping database, or, static ARP access list • Configure DHCP snooping
  • 94. Lab 2-4: Configure Layer 3 Data Plane Security Controls • Attack internal host with spoofed IP address • Configure u RPF to protect subnets • Configure Source Guard to protect VLANs
  • 95. Lab 3-1: Configure Cisco ASA NAT • Configure fixed/static translations • Configure dynamic NAT/PAT • Monitoring in ASD and CLI
  • 96. Lab 3-2: Configure Cisco IOS Software NAT • Enabling Inbound and Outbound connectivity from certain sources to certain destinations/services • CLI Commands:  show ip nat translations  show ip nat statistics  debug ip nat
  • 97. Lab 4-1: Configure Basic Cisco ASA Access Policies • Configuring Network Object Groups • Configure Service Object Groups • Monitoring ACLs in ASDM and CLI
  • 98. Lab 4-2: Configure Advanced Cisco ASA Access Policies • Configure deep packet inspection for services that open channels on dynamically assigned ports (default vs secondary TCP/UDP ports • Commands:  Show conn address x.x.x.x detail  Show service policy
  • 99. Lab 4-3: Configure Cisco ASA Botnet Traffic Filter • Configure Botnet Traffic filter (using Dynamic or Static database) • If Static Database, configure “Whitelist” destinations • Enable DNS Inspection
  • 100. Lab 4-4: Configure Cisco ASA Identity Firewall • Configure CDA: mapping IP-addresses-to-Usernames • Configure ASA for AD integration; LDAP on MS AD • Configure Identity Based ACLS
  • 101. Lab 5-1: Configure Basic Cisco IOS Zone-Based Policy Firewall Access Policies • Configure Zones, Zone Pairs, and Policies • Configure Class Maps, Policy Maps and ACLs
  • 102. Lab 5-2: Configure Advanced Cisco IOS Zone- Based Policy Firewall Access Policies • Configure parameter map of type “regex” - regular expression for argument matching • ‘regex” matches exe file extension
  • 105. Cisco dot com Resources • No CCO login required to download the command references and configuration guides. • No need to read these documents cover to cover, but they are essential as reference material during exam preparation. • ‘Overview’ or ‘Information About’ section very helpful for each of the many topics and features covered on the exams.
  • 106. Firewall Configuration Guides (46) http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation- firewalls/products-installation-and-configuration-guides-list.html Read these guides Find the ones with the topics in the exam blueprint
  • 107. Configuration Examples & Technotes (261) http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation- firewalls/products-configuration-examples-list.html • Initial Configuration • AAA • Allow and Block the Traffic Through the Security Appliance • NAT and Access Lists • ASDM
  • 108. Search, Search, and Search Again! • Many YouTube VODs out on the Internet contain good insight into Cisco ISE technologies. Search beyond CCNP material, for example: “ASA Firewall”…“ASA NAT 9.1” • Not every document out on the Internet is 100% correct, so verify your findings, then share!!! • Cisco Configuration documents are a good resource. • These documents provide valuable information into the theory behind different ASA configuration challenges and the solutions. • Key resource: for day-to-day work related problems and exam writers
  • 109. Cisco Learning Network – Study Portal
  • 110. Cisco Learning Network – Content Legend
  • 111. Complete Your Online Session Evaluation Don’t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online • Give us your feedback to be entered into a Daily Survey Drawing. A daily winner will receive a $750 Amazon gift card. • Complete your session surveys though the Cisco Live mobile app or your computer on Cisco Live Connect.
  • 112. Continue Your Education • Demos in the Cisco campus • Walk-in Self-Paced Labs • Table Topics • Meet the Engineer 1:1 meetings • Related sessions