CCNASv2 InstructorPPT CH5
CCNASv2 InstructorPPT CH5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Upon completion of this section, you should be able to:
• Explain zero-day attacks.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Advantages of an IDS:
• Works passively
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
IPS:
• Implemented in an inline mode
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Advantages IDS: Advantages IPS:
• No impact on network • Stops trigger packets
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Cisco IPS AIM and Network
Module Enhanced (IPS NME)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Factors affecting the IPS sensor selection and deployment:
• Amount of network traffic
• Network topology
• Security budget
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Promiscuous Mode
Inline Mode
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Traffic Sniffing Using
a Hub
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Cisco SPAN Commands:
• Monitor session command – used to associate a source port and a destination
port with a SPAN session.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Upon completion of the section, you should be able to:
• Understand IPS signature characteristics
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
A signature is a set of rules that an IDS and an IPS use to detect typical
intrusion activity.
Signatures have three distinct attributes:
• Type
• Trigger (alarm)
• Action
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Signatures are categorized as either:
• Atomic – this simplest type of signature consists of a single packet, activity, or
event that is examined to determine if it matches a configured signature. If
yes, an alarm is triggered and a signature action is performed.
• Composite – this type of signature identifies a sequence of operations
distributed across multiple hosts over an arbitrary period of time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
• As new threats are identified, new signatures must be created and
uploaded to an IPS.
• A signature file contains a package of network signatures.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Cisco IOS defines five micro-engines:
• Atomic – Signatures that examine simple packets.
• Service – Signatures that examine the many services that are attacked.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Benefits:
• It uses underlying routing
infrastructure to provide an
additional layer of security.
• It is inline and is supported on a
broad range of routing platforms.
• It provides threat protection at all
entry points to the network when
used in combination with Cisco
IDS, Cisco IOS Firewall, VPN,
and NAC solutions
• The size of the signature
database used by the devices
can be adapted to the amount of
available memory in the router.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Understanding Alarm Types:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Summary of Action Categories:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Generating an Alert:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Logging the Activity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Dropping or Preventing the Activity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Resetting the Connection and Blocking the Activity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
IPS Planning and Monitoring Considerations:
• Management method
• Event correlation
• Security staff
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Goals of global correlation:
• Dealing intelligently with alerts to improve effectiveness
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Network participation gathers the following data:
• Signature ID
• Attacker IP address
• Attacker port
• Victim IP address
• Victim port
• Signature version
• Reputation score
• Risk rating
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Upon completion of this section, you should be able to:
• Understand how to configure Cisco IOS IPS with CLI
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Step 1. Download the IOS IPS files.
Step 2. Create an IOS IPS configuration directory in Flash.
Step 3. Configure an IOS IPS crypto key.
Step 4. Enable IOS IPS.
Step 5. Load the IOS IPS signature package to the router.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Retiring an Individual Signature:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Show commands to verify the IOS IPS configuration:
• show ip ips
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Chapter Objectives:
• Describe IPS technologies and how they are implemented.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Thank you.
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page. 1
(https://www.netacad.com) 2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70