CCNA Security 640-554
CCNA Security 640-554
Contents
Security Concepts...................................................................................................................................... 1
AAA............................................................................................................................................................ 3
Layer 2 Security ......................................................................................................................................... 6
Cisco Configuration Professional .............................................................................................................. 8
IPS/IDS ..................................................................................................................................................... 10
Cisco Firewall/ASA .................................................................................................................................. 11
IPSec ........................................................................................................................................................ 14
VPNs ........................................................................................................................................................ 15
IPv6.......................................................................................................................................................... 17
Security Concepts
1+2+3+4= Risk
AAA
Reject
Continue (Need additional info)
Error (Potential packet loss, frame errors)
Authorization- What can an authenticated user do once they're in?
o ISE (Identity Service Engine)
o ACS (Access Control Server)
Protocols used between ACS and the router
TACACS+
Cisco proprietary
TCP-based
Encrypts entire packet
Considers each "A" a seperate process
TCP port 49
RADIUS
Open standard
UDP-based
Encrypts only password in initial packet
Combines authentication and authorization
Can't control authorization of users and router commands
UDP port 1812
Different vendors of RADIUS don't work well together
Accounting- What is the user doing with this access? Who's paying for network resources
the user uses?
o Syslog server
Severity Levels (In IOS)
0- Emergencies
1- Alerts
2- Critical
3- Errors
4- Warnings
5- Notifications
6- Informational
7- Debugging
o SNMP server
SNMP Manager
Runs management application
SNMP agent
Software that runs on a managed device
Management Information Base
Information about a managed device stored here
Message types
GET
Used to retrieve info from managed device
SET
Sets a variable in a managed device
Trap
Layer 2 Security
o Three types
Promiscuous
Can communicate with anyone on the same VLAN
Community
Can communicate with anyone in the community or to
promiscuous ports
Isolated
Can ONLY communicate with promiscuous ports (Not each other)
SPAN (Switchport Analyser)
o Copies traffic from specified port/s (Ingress traffic on one port and egress traffic
on the other) and sends it to a destination SPAN port that can contain a sniffer or
traffic analyser.
o Types
Local SPAN
Remote SPAN
Port-based SPAN
VLAN-based SPAN
ESPAN
To use CCP, there are certain prerequisites to get it working. I will show you how to get
it working (Windows only) so you can play with it managing a router on GNS3
In GNS3, the router you have must be configured to support http and/or https (We’ll just use
http). If you plan to manage multiple routers, make sure you have your routes setup properly
o #ip http server
o #ip http authentication local
o #username *username* privilege 15 secret *password*
o #ip http timeout-policy idle 60 life 86400 requests 10000
Next, you’ll need to configure a Microsoft Loopback adapter on your PC. To do this:
o Go to Start menu, right click on Computer, and when it opens, on the top left, you’ll
see “Device Manager”. Click on it.
o Select “Action” and click on “Add legacy hardware”
o Click next and on the next screen, select “Install the hardware that I manually select
from a list”
o Select Network adapters
o Go down to Microsoft and select the “Microsoft Loopback Adapter”
Go back to GNS3. Drag the cloud icon (It should be in the category with the computer icon)
and double click to configure it.
o In the “NIO Ethernet” tab, you can select your adapter. Select the loopback adapter.
Now that you have that done, you’ll attach the cloud to your router. Next, you’ll have to
configure the router interface, add the routing statement in the router, and configure the
loopback adapter for the same subnet as the IP address on that router interface
o Example: R1- #int f0/0 -> #ip address 192.168.1.1 255.255.255.0 -> no shutdown
o #router eigrp 1
o #network 192.168.0.0
o #no auto-summary
o Loopback adapter IPv4 address: 192.168.1.2 Mask: 255.255.255.0 Gateway:
192.168.1.1
Now that you have that done, make sure you turn your internet off if your internet is using
the same subnet as this can cause conflict when trying to discover.
A few extra things to prevent errors and other small issues. Make sure you run CCP as
administrator (ALWAYS).
o In Control Panel, look for Java. Open it and go to the Security tab. Go to edit site list
and add http://127.0.0.1:8600 as an exception (This is the address for CCP)
o In Internet Explorer, make sure in the option “Compatibility View Settings”, you
have 127.0.0.1 input as well.
o If you have any other issues when running CCP, I probably haven’t had the issue.
This is what I did to make it work.
Input username and password of local login on your router when logging into CCP along
with the IP of the attached interface.
Creating user profiles
o Application -> Create User Profile -> New
o Select Devices -> Next -> Select Permissions
Template Creation
o Template -> Create
o Select a template from your localhost
o Paramaterize: Select what you want to parameterize (i.e. hostname) and click the
button
Security Audit
o Under Security, select Security Audit
o Perform security audit vs One-step lockdown
One-step lockdown implements all security features without giving you the
option to pick and choose
Common threats observed by the Security Audit Feature
Finger Service
TCP/UDP small servers
CDP
Password encryption
Enabling ip CEF
Disabling IP gratuitous ARPs
Minimum password length
Enabling SSH
Cisco security management tools
o Security Device Manager
Used to configure and manage standalone routers
o Cisco Security Manager
Manage a Cisco based network where you can manage and maintain up to
thousands of devices to include ASA and VPN technologies.
IPS/IDS
o Reputation based
One network tells another about a restriction/blocking of a host
Risk Rating (RR)
o The higher the rating, the greater the risk in a particular event occurring
o Valued between 0-100
o Signature Fidelity Rating (SFR)
Value of 0-100
Reflect’s a signature’s accuracy
o Alert Severity Rating
Value assigned to damaged that would be caused by a successful attack
25- Information
50- Low
75- Medium
100- High
o Target Value Rating
Rates relative importance of a target
75- Low Asset
100- Medium Asset
150- High Asset
200- Mission Critical Asset
Cisco Firewall/ASA
Allows conversation for traffic to be initiated from inside to out, but not
the outside to in
Maintains a session table
Source/Destination IP with port numbers
TCP/UDP flag settings
TCP sequencing info
Doesn’t combat against application-layer attacks
o Application gateway
Another device connects to the outside destination for you
Inside user attempts to connect to an outside destination
Proxy receives attempt, holds it, and attempts to connect to the
destination (If allowed)
Proxy connects, gets information, then presents the inside user
(Which all of this is transparent to that user)
Works up to the application layer
Requires strong/expensive hardware
Works well against denial of service attacks
Cisco IOS Zone-based Firewall
o Zones are logical zones of multiple interfaces
o Interfaces can only be assigned to one zone
o Traffic in one zone can’t be allowed into another by default
o Self-zone
Traffic destined for an IP address on the same router which is generated
by the router
o Zone pair
Allows/inspects traffic destined between zones
Unidirectional (Needs a zone pair on each side to be bidirectional)
Action based on policy maps configured
o DMZ
Most exposed to outside networks
o Class Maps
Identify specific traffic and classify it
#class-map type inspect match-any *NAME*
#match protocol [http | https | other]
o Policy maps
Take action on the traffic specified by the Class Map
Actions taken:
Inspect
o Permits and inspects traffic
o Used by users who respect a reply from devices on the
other side
Pass
o Permits traffic but doesn’t create entry in the database
o Traffic will get to destination but sender will not get a reply
Drop
o Denies the packet
Log
o Logs the traffic
#policy-map type inspect *NAME*
#class type inspect *Class map name*
#[drop | inspect | pass | log]
o Zone security
#zone security *INSIDE*
#zone security *OUTSIDE*
#zone-pair security *IN_TO_OUT* source *INSIDE* destination
*OUTSIDE*
#service-policy type inspect *Policy Map Name*
#int f0/0
#zone-member security *INSIDE*
#show zone-pair security
#show zone security
o CCP Configuration
Security -> Firewall -> Basic/Advanced Firewall
Define inside/outside (And DMZ if you have one)
Verifying zone pairs: Security -> Firewall Status
NAT Configuration: Router -> NAT -> Basic/Advanced NAT -> Define
inside and outside interfaces
Cisco ASA
o Features
Packet filtering (Both standard and extended ACLs)
Stateful Filtering
Application inspection
NAT support (exempt for VPN)
Can act as DHCP server
Routing
VPN support
IPSec support for remote-access and site-to-site
SSL support for clientless and AnyConnect
Object Groups
Refers to one or more items (i.e. subnet)
Botnet traffic filtering
AAA support
Supports Active/Active and Active/Standby failover
o Security levels
0-100
The greater the number, the more trusted the interface
Defaults
Inside: 100
DMZ: 50
Outside: 0
Traffic initiating from lower to higher value will not go through.
If it’s a tie, traffic is also not allowed (Refer to ASDM section below to
determine workaround)
Base license only allows three interfaces (Which includes the DMZ)
o ASDM config
Configuration -> Startup wizard -> Assign IP to management interface ->
Next -> Host name, domain name (Can also change enable password) ->
Choose outside/inside/DMZ vlans -> Allocate ports to inside, outside and
DMZ -> Define inside/outside/DMZ IPs -> Define two interfaces in which
the traffic can be restricted -> (Optional) Define DHCP scope -> Setup
NAT/PAT interfaces
Interface -> In this window, you can enable traffic between two or more
interfaces which are configured with the same security level
Make sure to apply changes afterwords
Configuration -> Firewall -> Access rules (This is where you can change
default rules/security. You can add additional rules for more specific
security
IPSec
SHA1
HMAC
o Hashing with an additional secret
key both parties have to know
Authentication method
PSK or RSA digital signature
Diffie-Helman Group (Random number)
Lifetime
The time until the tunnel should be torn
down (In minutes)
Encryption Algorithm (AES, 3DES, DES)
Phase 1.5
o Optional
o Can use extended authentication (xauth) for additional
security
Phase 2
o SA will be used
o Unidirectional SA in this phase
Tunnel Termination (After specified lifetime)
Tunnel vs Transport Mode
o Tunnel
IPSec process is transparent to end hosts
Entire IP packet is encrypted and placed in an additional IP packet
Specialized IPSec gateway handles workload
o Transport
Encrypts the payload
No protection for the original IP
IPSec header inserted directly after IP header
L4-7 is protected only
VPNs
o Security
Four things VPNs provide
o Authentication
Combo of ciphers and keys (Pre-shared keys)
o Data Integrity
Ensures data that arrives originated with the source authenticated devices
(Hashing)
o Confidentiality
Only two of the endpoints should read the data (Cryptography)
o Anti-Replay
Prevents MITM attacks
Cryptography
o Symmetric
DES
1. 56 bits
3DES
1. 168 bits, effective 112
AES
1. Runs on Cisco router that has IPSec 3DES/DES capability
RC4, Blowfish, IDEA
Faster than asymmetric but less secure
o Asymmetric
Private and Public key used
Diffie-Helman, RSA, DSS
1. Diffie-Helman
o Makes secure key exchange over a non-secure channel
possible
o Endpoints must agree on a non-secure, non-secret numeric
value before it works. Numbers, not keys
o Does not include authentication
PKI (Public Key Infrastructure)
o User’s info to Certificate Authority
Public key
IP address
Name (hostname.domainname.com)
o CA issues digital certificate
Signed by CA with public key
o Digital signature
1. Computer 1 (Sender) runs a hash and encrypts data with their private key
2. Computer 2 (Receiver) decrypts the message with Computer 1’s public
key
3. Computer 2 runs the hash algorithm
4. If the results are identical, the signature is authenticate
5. If it’s not, the person could be a fake or the transmission went corrupt
o Methods of verifying revoked certificates
CRL (Certificate Revocation List)
IPv6
Anycasts
o Address that represents multiple interfaces
Identification
o 001 (Global Address)
o 1111 1111 (Multicast)
o 1111 1110 11 (Link local)
o ::1 (Loopback)
Common link local addresses
o FF02::1 (All nodes)
o FF02::2 (All routers)
o FF02::9 (All RIP routers)
o FF02::A (All EIGRP routers)
DAD (Duplicate Address Detection)
o Host sends a neighbor solicitation message to see if any other host is using the
same link local address
o If a neighbor advertisement is received, the host will disable its link local address
o Next, the host sends a router solicitation message to the router on the link to
retrieve info. The router responds with a RA (Router advertisement) containing:
Whether the host should use DHCP
If DHCP is in use, it tells the host where the server is
If not, it provides needed network prefix and lifetime information