Questions Flashcards

(58 cards)

1
Q

Malware and its effects

A

Mitigate Malware

End devices are prone to Malware attacks, Malicious software designed to damage, disrupt, steal or generally inflict bad or illegitimate action on data, hosts or a network.

Several factors make the identification of malware particularly difficult:

  1. Vast amount of malware exists and is created on a daily basis, often results in the uselessness of intrusion detection systems (IDS) based on signature.
  2. Malware integration: Malware is often integrated in otherwise-trusted applications and sent over protocols that are traditionally allowed through firewalls and access lists.
  3. Restricted amount of resources: Organizations have narrow range of resources (both human and technology) to effective control the massive amounts of traffic that pass through the network. The quantity of data traffic, both good and bad, has become so large that it is almost too much for any one organization to keep up.
  4. Use of encryption: The increasing use of encryption has added another challenge for organizations trying to gain visibility into malicious traffic residing on the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to mitigate against malware?

A

The most effective method of mitigating malware threats is to prevent the malware from entering the network at all.

• Advanced Malware Protection Techniques that do not rely solely on signature definitions.

• Scan all incoming email messages, including attachments for malware. Set SPAM filters to reduce unwanted emails. Limit user access to only company approved links, messages and email addresses.

• Security devices at the network perimeter can identify known malware files based on their indicators of compromise. The files can be removed from the incoming data stream before they cause an incident.

• Set automatic real-time signature updates & blacklisting

• Monitoring for suspicious behaviour
Anti-Virus Software / Anti malware software on endpoints:

• Helps prevent hosts from getting infected and spreading malicious code.

• Automated updates keep the virus definitions up to date.

• Do not prevent viruses from entering the network.
Preventative Measures

• Security devices at the network perimeter can identify unknown malware files based on their indicators of compromise, that is, suspicious behaviour, for example, unusual network traffic. The files can be removed from the incoming data stream before they cause an incident.

• Automatic updates

• Monitoring for suspicious behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain what each of the logical planes are on a network device, the value of dividing the functions of a network device into planes and provide examples of technologies designed to protect each of these planes.

A

Routers and switches can be logically divided into three planes:

• Control Plane: Responsible for routing data correctly
• Management Plane: Responsible for managing network elements
• Data Plane: Responsible for forwarding data.

By dividing the network into the three planes we can better protect and secure the traffic traversing each of these planes.

Control Plane

In the Control Plane we have device generated traffic required for the operation of the network such as routing protocol updates. Updates can be protected through routing protocol authentication thus preventing a router from accepting fraudulent updates.

Management Plane

Management plane traffic generated either by network devices or network management stations are an attractive target to hackers and the management plane has several technologies designed to mitigate such risks. For example, use of strong management protocols providing confidentiality, integrity and authentication.

• Login and password policy
• Present legal notification
• Ensure the confidentiality of data
• Role Based Access
• Authorise actions
• Enable management access reporting

Data Plane

Data plane or user traffic forwarded through a device can be secured using ACL’s, ant spoofing mechanism’s and layer 2 security features. We can implement the following measures:

• ACL’s
• Block unwanted traffic or users
• Reduce the chance of DoS attacks (close half open sessions)
• Mitigate spoofing attacks
• Provide bandwidth control
• Classify traffic to protect management and control plane

Layer 2 devices can also help secure the infrastructure:

• Port security
• DHCP Spoofing
• Dynamic ARP inspection
• IP Source Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how configuring an enable secret password helps to protect a device from being compromised by an attack?

A

The goal is to always prevent unauthorized users from accessing a device using Telnet, SSH, or via the console. If attackers are able to penetrate this first layer of defense, using an enable secret password prevents them from being able to alter the configuration of the device. Unless the enable secret password is known, a user cannot go into privileged EXEC mode where they can display the running config and enter various configuration commands to make changes to the router. This provides an additional layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing an edge router is a critical step in securing the network and three areas of router security must be maintained… Explain each of these and give examples.

A

Physical Security

Physical security pertains to where the device is physically located. We can categorise physical controls as

• Preventative: Prevents Access (It must be in a secure locked room, accessible by only those authorised)
• Deterrent: Deters access (Installation of video surveillance)
• Detective: Detects access (Installation of Motion sensors)
It must also be protected from environmental factors to ensure it is free from electrostatic or magnetic interference has fire suppression and temperature and humidity control.

In the event of a power failure it should be supported by UPS reducing the possibility of a network failure from power loss.

Router Hardening

Hardening a router means that the router is secured against attacks as best as possible. Each of the functional planes provide different functionality that needs protecting.

This means we need to:

• Secure administration control. Ensure that only authorised personnel have access and level of access is controlled.
• Unused ports and interfaces should be disabled reducing the number of ways a device can be accessed. (aux layer / 2 ports)
• Unnecessary services and default services that are enabled but not required should be disabled as these can be exploited by an attacker (DoS attack)

Operating System Security

There are a few procedures involved in securing the features and performance of the router operating system

• Equip routers with the maximum amount of memory possible. The availability of memory can help mitigate risks to the network from some denial of service (DoS) attacks while supporting the widest range of security services.
• Use the latest, stable version of the operating system that meets the feature specifications of the router or network device. Security and encryption features in an operating system are improved and updated over time, which makes it critical to have the most up-to-date version.
• Keep a secure copy of router operating system images and router configuration files as backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When logging and managing information flow, the information flow between management hosts and the managing device can take two paths. Briefly explain each of these?

A

As a general rule, for security purposes, OOB management is appropriate for large enterprise networks. However, it is not always desirable. The decision to use OOB management depends on the type of management applications running and the protocols being monitored.

OOB management guidelines are:

• Provide the highest level of security.
• Mitigate the risk of passing insecure management protocols over the production network.
In-band management is recommended in smaller networks as a means of achieving a more cost-effective security deployment. In such architectures, management traffic flows in-band in all cases. It is made as secure as possible using secure management protocols, for example using SSH instead of Telnet.

In-band management guidelines are:

• Apply only to devices that need to be managed or monitored.
• Use IPsec, SSH, or SSL when possible.
• Decide whether the management channel needs to be open at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Providing secure administrative access to a network device involves more than configuring just a password. Briefly explain a best practice in the administration of network devices from a management network?

A

• A dedicate VLAN should be established for network management
• A dedicated network management workstation should be established
• A packet filter should be configured to allow only identified administrative hosts
• All traffic between the administrator and network devices should be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When logging and managing information flow, the information flow between management hosts and the managing device can take two paths. Briefly explain each of these?

A

As a general rule, for security purposes, OOB management is appropriate for large enterprise networks. However, it is not always desirable. The decision to use OOB management depends on the type of management applications running and the protocols being monitored.

OOB management guidelines are:

• Provide the highest level of security.
• Mitigate the risk of passing insecure management protocols over the production network.
In-band management is recommended in smaller networks as a means of achieving a more cost-effective security deployment. In such architectures, management traffic flows in-band in all cases. It is made as secure as possible using secure management protocols, for example using SSH instead of Telnet.

In-band management guidelines are:

• Apply only to devices that need to be managed or monitored.
• Use IPsec, SSH, or SSL when possible.
• Decide whether the management channel needs to be open at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The IOS includes 3 privilege levels by default, each of which defines what commands are available to a user. Explain the purpose, commands and prompts identifying each of these levels?

A

Privilege level 0: Includes the disable, enable, exit and logout commands

Privilege level 1: This is User EXEC mode. The command prompt at this mode includes the ‘>’ sign. From this it is not possible to make configuration changes, in other words, the command configure terminal is not available.

Privilege level 15: This is Privilege EXEC mode. This is the highest privilege level, where all CLI commands are available. The command prompt at this mode is the ‘#’ sign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the additional privilege levels?

A

Additional privilege levels range from 2 to 14 and can be used to provide customised access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA is an architectural framework for enabling a set of three independent security functions. Briefly explain each of these?

A
  • Authentication: Enables a user to be identified and verified prior to being granted access to a network device and / or network services.
  • Authorization: Defines the Access privileges and restrictions to be enforced for an authenticated user.
  • Accounting: Provides the ability to track and log user access, includes user identity start and stop times, executed commands and so on. In other words, it maintains a security log of events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS and TACACS can be compared using a number of different criteria that determine how they should be deployed on a network. What are the criteria that determine their primary use?

A

RADIUS vs TACACS+ — Quick Notes

Protocol & Ports
* RADIUS

  • Cisco legacy (older impls): UDP 1645 (auth/authz), UDP 1646 (acct)
  • Industry standard: UDP 1812 (authentication/authorization), UDP 1813 (accounting)

TACACS+

  • TCP 49 (single well-known port)

Encryption & EAP

  • RADIUS
    • Encrypts only the password in Access-Request packets
    • Supports EAP (e.g., for 802.1X)

TACACS+

  • Encrypts the entire payload
  • Does not support EAP

Authentication / Authorization / Accounting Flow

  • RADIUS
  • Auth & authz combined in the same exchange
  • Accounting is a separate exchange
  • Limited command authorization (not granular per command on devices)

TACACS+

  • Authentication, authorization, and accounting are separate
  • Granular CLI command authorization (per-user / per-group)

Accounting Focus

  • RADIUS
  • Strong session accounting (e.g., user sessions, VPN/WLAN/802.1X)
  • No detailed network-device CLI accounting
  • TACACS+
    • Network-device CLI accounting (who ran which command, when)

Primary Use Cases

  • RADIUS
    • Secure network access (WLAN, VPN, 802.1X device authentication)
  • TACACS+
  • Network device access (administrative logins)
  • Management of network devices (fine-grained command control & logging)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refer to the above topology and configuration. Briefly explain the purpose of this configuration?

R1 has been configured as follows:
!
aaa new-model
!
aaa authentication login default local
!
username admin1 secret 5 $1$mERr$Ty/EkWXcSXEwIckISrps8/
!
line con 0
password ciscoconpa55
login authentication default

A

Answer
AAA has been enabled on the device and AAA authentication for the console login has been configured to use the local database through the default authentication list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH has been enabled on R1 and the following configuration has now been added to the configuration.

aaa authentication login SSH-LOGIN local
!
line vty 0 4
password ciscovtypa55
login authentication SSH-LOGIN
transport input ssh

A

Answer

A new authentication list SSH-LOGIN has been configured and line vty is configured to use this. The authentication list SSH-LOCAL is case sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two most common AAA protocols and what is each of their preferred use?

A

The two most common AAA protocols are TACACS and RADIUS.

AAA is recommended for network device access control and TACACS+ is the protocol of choice on Cisco proprietary networks.
AAA is recommended for secure network access control and used to obtain the identity of a device or user before that device or user is allowed access to the network. RADIUS is the preferred protocol for secure network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What internal LAN elements should be protected in a network infrastructure?

A

• Endpoints

• Network infrastructure devices susceptible to LAN related attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Briefly explain four measures and their purpose that organisations can take to protect their endpoints from existing and new threats

(You should in your answer identify devices and techniques that also provide host protection)?

A

• Antimalware software: Protects endpoints from malware

• Spam filtering: Prevents spam emails from reaching endpoints

• Blacklisting: Prevents endpoints from connecting to websites with bad reputations by immediately blocking connections based on the latest reputations.

• Data Loss Prevention: Prevents sensitive information from being lost or stolen
The following are examples of devices and techniques that implement host protections at the network level.

Devices and techniques that provide host protection include:

• Advanced Malware Protection (AMP) – This provides endpoint protection from viruses and malware.

• Email Security Appliance (ESA) – This provides filtering of SPAM and potentially malicious emails before they reach the endpoint. An example is the Cisco ESA.

• Web Security Appliance (WSA) – This provides filtering and blocking of websites to prevent hosts from reaching dangerous locations on the web. The Cisco WSA provides control over how users access the internet and can enforce acceptable use policies, control access to specific sites and services, and scan for malware.

• Network Admission Control (NAC) – This permits only authorized and compliant systems to connect to the network

• Data Loss Prevention - This can be provided through hardware and software encryption of local drive [This is not at the network level]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Briefly explain the purpose of Network Access Control (NAC) and give an example of a port-based NAC standard?

A

The purpose of NAC is to allow only authorised and compliant systems whether managed or unmanaged to access the network.

802.1x is a standard for port based network access control that provides an authentication mechanism for Local Area Networks(LAN) and Wireless Local Area Networks(WLAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

On a layer 2 switch what when using 802.1X which three traffic types can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?

A

Until the workstation is authenticated, 802.1X access control enables only:

• Extensible Authentication Protocol over LAN (EAPOL)

• Cisco Discovery Protocol (CDP)

• Spanning Tree Protocol (STP) traffic through the port to which the workstation is connected.

After authentication succeeds, normal traffic can pass through the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Briefly explain the purpose of Network Access Control (NAC) and give an example of a port-based NAC standard?

A

The purpose of NAC is to allow only authorised and compliant systems whether managed or unmanaged to access the network.

802.1x is a standard for port based network access control that provides an authentication mechanism for Local Area Networks(LAN) and Wireless Local Area Networks(WLAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Briefly explain what a CAM table attack is and what measures can be taken to mitigate this type of attack?

A

A CAM table attack, or MAC flooding, occurs when an attacker overwhelms a switch’s CAM table with fake MAC addresses, using a tool such as macof.

Once the table is full, the switch can no longer map MAC addresses to ports and begins broadcasting all traffic to every port. This allows the attacker to intercept network traffic using a packet sniffer. The attack only affects devices within the same LAN or VLAN.

To mitigate this, port security can be used to limit the number of MAC addresses per port. For larger networks, 802.1X with Network Access Control (NAC) and an Identity Services Engine (ISE) provides scalable protection. Additional steps include disabling unused ports and placing them in an isolated VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of enabling BPDU Guard and where should this be configured?

A

A BPDU (Bridge Protocol Data Unit) is a message that network switches exchange to manage the network topology and prevent network loops

When you enable BPDU Guard, a switch port that was forwarding now stops and disables the port if a BPDU is seen inbound on the port. You would enable BPDU Guard on an access port as a end user should never be generating BPDU’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VLAN architecture simplifies network maintenance and improves performance, however, it opens the door to abuse.

Briefly explain the VLAN hopping attack which takes advantage of a VLAN implementation, explain how this attack is launched and how it might be mitigated?

A

VLAN’s create separate broadcast domains on switches, therefore endpoints on different VLAN’s are unable to communicate with each other unless permitted to do so by a layer 3 device.

A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without the aid of a router, the attacker configures a host to act like a switch and take advantage of the auto trunking feature.

It can be launched by spoofing 802.1q and DTP messages from the attacking host to cause the switch to enter trunk mode or through the introduction of a rouge switch and enabling trunking.

If successful, the attacker can access all the VLAN’s on the switch and see all traffic sent and received

VLAN hopping and VLAN double-tagging attacks can be prevented by implementing the following trunk security guidelines:

• Disabling trunks on all access ports (lab)
• Disabling auto trunking (lab)
• Change the native VLAN (lab)
• Ensure that native VLAN is used only on trunk links (lab)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Briefly explain how the following two network attacks work, their purpose and how they might be mitigated?

(i) DHCP Spoofing
(ii) DHCP Starvation

A

A DHCP spoofing attack occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients. A rogue server can provide a variety of misleading information:

Wrong default gateway - The rogue server provides an invalid gateway, or its own IP address, to create a man-in-the-middle attack.

Wrong DNS server - The rogue server provides an incorrect DNS server address that points the user to a nefarious website.

Wrong IP address - The rogue server provides an invalid IP address which effectively creates a DoS attack on the DHCP client.

Mitigation: Enable DHCP Snooping to trust only legitimate DHCP ports and block unauthorized DHCP offers.

(ii) DHCP Starvation:

An attacker floods the DHCP server with fake DHCP requests using random MAC addresses until all IP addresses are leased, preventing real users from connecting. Tool such as Gobbler is used to do this.

Mitigation:Use Port Security to limit MAC addresses per port and DHCP Snooping to rate-limit DHCP messages.

DHCP messages received on trusted ports are allowed to pass through the device. And packets from these ports are automatically forwarded.

If DHCP Snooping is not enabled, all ports are trusted by default. An untrusted port is a port that is not allowed to assign DHCP addresses.

25
The diagram and table above shows three hosts connected to a switch on interfaces A, B & C all in the same subnet. (i) Briefly explain what happens when host A needs to communicate with host B at the IP layer?
Host A broadcasts an ARP request for the MAC address associated with the IP address IB. When the switch and host B receive the ARP request they populate their ARP caches with an ARP binding for a host with the IP address IA and a MAC address MA. When host B responds, the switch and host A populate their ARP caches with a binding for a host with the IP address IB and the MAC address MB. (1) (ii) Briefly explain how host C can poison the ARP cache of the switch for host A and Host B and the result of this action? Host C can poison the ARP cache by broadcasting forged ARP responses with the bindings for a host with an IP address of IA (or IB) and a MAC address of MC. Hosts with poisoned ARP caches use the MAC address MC as the destination MAC address for traffic intended for IA (or IB). Because host C knows the true MAC addresses associated with IA and IB, it can forward the intercepted traffic to those hosts by using the correct MAC address as the destination. Host C has inserted itself into the traffic stream from Host A to Host B, which is known as a Man in the Middle Attack. (iii) Briefly explain how this type of attack be mitigated? Answer Dynamic ARP inspection is a security feature that validates ARP packets in a network. DAI intercepts, logs and discards ARP packets based on valid IP-to-MAC address bindings stored in a trusted database (DHCP snooping and binding database). This capability protects the network from some M-I-T-M attacks. (1)
26
Explain access control and its primary objective?
Answer Access controls is a security features that governs how users and processes communicate and interact with systems and resources. The primary objective of access control is to protect information and information systems from unauthorized access [confidentiality], modification[integrity] or disruption [availability].
27
Explain the principle of least privilege and separation of duty?
Answer The principle of least privilege states that all users (employees, managers, directors) should be granted only the level of privilege to do their jobs and no more. Somewhat related to the principle of least privilege is the concept of “need to know” which means that users should get access only to data and systems that they need to do their job. Separation of duties is an administrative control that dictates that a single individual should not perform all critical or privilege level duties. Additionally, duties must be separated or divided among several individuals within the organisation. The goal is to safeguard against a single individual performing sufficiently critical or privileged actions that could damage a system or organisation as a whole. For example, a network administrator should not have the rights to alter logs on their systems.
28
Explain the first step in the authentication process?
Answer Identification is the is the process of providing the identity of a subject or user and is the first step in the AAA process.
29
What are the key concepts of identification?
Answer * Identity should be unique * Identity should be non-descriptive * Identities should be securely issued * Identities can be location based
30
Explain the process of authorization and the two concepts it should implement?
Answer Authorization is the process of assigning authenticated subject’s permissions to carry out a specific operation. **An authorization policy should implement two concepts:** **Implicit deny:** If no rule is specified for the transaction of the subject/object the authorization policy should deny the transaction. **Need to know: ** A subject should be granted access to an object only if the access is needed
31
Briefly explain the process of accounting and why it is important?
Answer Accounting is the process of auditing and monitoring what a user does once a specific resource is accessed. It is important to be aware of accounting as it is critical in the detection and investigation of cyber security breaches. When accounting is implemented an audit trail log is created and stored detailing when the user has accessed the resource, what the user did with that resource and when the user stopped using the resource.
32
Briefly explain the different types of access control?
Answer **Mandatory Access Control** Defined by policy and cannot be modified by the information owner. MAC is primarily used in highly secure environments that require a high degree of confidentiality. Subjects are assigned a security label indicating classification [top secret] and category [flight plans] of the resource. **Discretionary Access Control** DAC’s are defined by the owner of the object and used in commercial operating systems. The object owner builds an Access Control List that allows or denies access to the object based on the user’s unique identity. **Role Based Access Control** RBAC are based on a specific role or function. Administrators grant access rights and permissions to roles. **Rule Based Access Control** In a rule-based access control environment access is based on criteria that are independent of the user or group account. The rules are determined by the resource owner. **Attribute Based Access Control** Attribute based access control is a logical access control model that controls access to objects by evaluating rules against the attribute of entities operations and the environment relevant to the request.
33
Refer to the topology above. Users connected to the R1 192.168.10.0/24 LAN (i.e., PC1 and PC2) are only permitted to access the R3 LAN 192.168.31.0/24. Users connected to the R1 192.168.11.0/24 (i.e., PC3) are allowed access the R3 192.168.30.0/24 & 192.168.31.0/24 LAN. How would you implement this policy (ACL type / where would you place it / direction)?
Answer ip access-list standard Q1 permit 192.168.11.0 0.0.0.255 deny any ! interface GigabitEthernet0/0 ip address 192.168.30.1 255.255.255.0 ip access-group Q1a out
34
Refer to the topology above. You have to write an ACL whereby only PC1 & PC2 have access to the R3 LAN 192.168.31.0/24 LAN for HTTPs & DNS services only. How would you implement this policy? (ACL type / where would you place it / direction)?
Answer ip access-list extended Q2 permit udp 192.168.10.0 0.0.0.255 host 192.168.31.12 eq domain permit tcp 192.168.10.0 0.0.0.255 host 192.168.31.12 eq 443 deny ip any any ! interface Serial0/0/0 ip address 10.10.1.1 255.255.255.252 ip access-group Q2 out
35
Refer to the topology above. PC3 the management PC (192.168.11.10) is the only PC allowed to ssh R1, R2 & R3. How would you implement this policy? You will also need to configure ssh.
Answer ip access-list standard Q3 permit host 192.168.11.10 deny any ! enable secret 5 $1$mERr$TjKPmiquLyuWgX8fktHjh0 ! username admin secret 5 $1$mERr$C.klg7GUxOnQDtT9GgE0G1 ! ip ssh version 2 ip ssh authentication-retries 5 ip domain-name netsec.com crytpto key generate rsa general-keys modulus 1024 ! line vty 0 4 access-class Q3 in login local transport input ssh line vty 5 15 access-class Q3 in login local transport input ssh
36
Configure a named ACL that will permit the upper range of a network address range (192.168.100.128 – 192.168.100.255) for ICMP & deny everything else from accessing the host 192.168.30.1
ip access-list extended permit_upper permit ip 192.168.100.128 0.0.0.127 host 192.168.30.1 deny ip any any
37
Configure a named ACL that will permit the lower range of a network address range (192.168.100.0 – 192.168.100.127) for ICMP & deny everything else from accessing the host 192.168.30.1
ip access-list extended permit_lower permit ip 192.168.100.0 0.0.0.127 host 192.168.30.1 deny ip any any
38
Configure a named ACL that will permit the odd range of a network address range (192.168.100.0 – 192.168.100.254) for ICMP & deny everything else from accessing the host 192.168.30.1
ip access-list extended permit_odd permit icmp 192.168.100.1 0.0.0.254 host 192.168.30.1 deny ip any any
39
Configure a named ACL that will permit the even range of a network address range (192.168.100.0 – 192.168.100.254) for ICMP & deny everything else from accessing the host 192.168.30.1
ip access-list extended permit_even permit icmp 192.168.100.0 0.0.0.254 host 192.168.30.1 deny ip any any
40
Configure an ACL that will only permit the management host (192.168.100.1) to access rtr001 via vty using SSH.
41
Refer to the topology & configuration above. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0. All other traffic into subnet 172.16.3.0/24 should be permitted. The standard ACL was applied outbound on interface g0/0/0. Which conclusion can be drawn from this configuration? a) Only traffic from the 172.16.4.0/24 subnet is blocked, and all other traffic is allowed b) An extended ACL must be used in this situation c) The ACL should be applied to the gigabit ethernet 0/0/0 interface on R1 inbound to accomplish the requirement d) The ACL should be applied to the outbound on all interfaces of R1 e) None of the above
Answer: e) None of the above Explanation: The ACL contains only access-list 1 deny 172.16.4.0 0.0.0.255 and is applied outbound on G0/0/0. Because a standard ACL with only a deny statement has an implicit “deny any” at the end, all traffic destined out G0/0/0 (i.e., to 172.16.3.0/24) will be dropped, not just traffic sourced from 172.16.4.0/24. To meet the intention, the ACL must also include a permit for other traffic (e.g., access-list 1 permit any) while keeping the outbound placement close to the destination.
42
When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks? a) ACEs to prevent HTTP traffic b) ACEs to prevent ICMP traffic c) ACEs to prevent SNMP traffic d) ACEs to prevent broadcast address traffic e) ACEs to prevent traffic from private address spaces
Answer: e) ACEs to prevent traffic from private address spaces Explanation: When applying inbound ACLs on an Internet-facing router interface, one of the key security measures is to block packets claiming to originate from private (RFC 1918) address ranges, such as 10.0.0.0/8, 172.16.0.0/12, or 192.168.0.0/16. These addresses should never appear as source addresses on traffic coming from the Internet. If they do, it indicates IP spoofing, which is commonly used in attacks. Preventing this traffic protects against spoofed packets pretending to be from internal networks.
43
Please refer to the topology above. An extended access control list has been written to prevent student’s from gaining access to the student records department. All other traffic is permitted. On which router interface and direction should an access list be placed? a) Router R1 interface g0/0/2 outbound b) Router R1 interface g0/0/0 outbound c) Router R2 interface g0/0/1 outbound d) Router R1 interface g0/0/0 inbound e) Router R2 interface g0/0/2 inbound f) Router R2 interface g0/0/1 inbound
Answer: d) Router R1 interface g0/0/0 inbound Explanation: Extended ACLs should be placed as close to the source as possible. The “student users” subnet (192.168.1.32/27) enters the network via R1 G0/0/0. Applying the ACL inbound on that interface blocks student traffic destined for the student records subnet (192.168.1.96/27) before it traverses the rest of the network, while permitting all other traffic.
44
(8) Refer to the topology and configuration above. Which of the following two statements are correct? a) All IP addresses in the 192.168.100.0/24 network can ping Srv001(192.168.30.1). b) The even IP addresses in the 192.168.100.0/24 network cannot HTTP c) Even IP addresses in the 192.168.100.0/24 network can ping Srv001(192.168.30.1). d) Odd IP addresses in the 192.168.100.0/24 network can ping Srv001(192.168.30.1). e) All addresses in the 192.168.100.0/24 network can HTTP Srv001(192.168.30.1).
Answer: d) Odd IP addresses in the 192.168.100.0/24 network can ping Srv001 (192.168.30.1). e) All addresses in the 192.168.100.0/24 network can HTTP Srv001 (192.168.30.1). Explanation: The ACL denies ICMP from 192.168.100.0 0.0.0.254 to host 192.168.30.1. Wildcard 0.0.0.254 (binary 11111110) matches even host addresses only (LSB must be 0). Thus, even hosts cannot ping Srv001, while odd hosts can. The subsequent permit ip any any allows all other protocols (including HTTP) from all hosts.
45
Explain how Access Control Lists (ACLs) can be configured to mitigate attacks at the perimeter of a network.
Answer ACLs can be configured on routers or firewalls at the network perimeter to filter traffic based on source/destination IP addresses, ports, and protocols. By explicitly allowing only trusted traffic and denying all other traffic (using a “deny by default” approach), ACLs prevent unauthorized access, IP spoofing, and scanning attempts from reaching internal networks. They can also block traffic from known malicious sources or disallow risky protocols.
46
A network administrator wants to protect the internal network from external scanning and unauthorized access attempts. Describe how ACLs could be applied on the perimeter router to reduce these threats.
Answer The administrator can apply inbound ACLs on the perimeter router’s external interface to block traffic from untrusted or private IP ranges (e.g., RFC 1918 addresses), which helps prevent spoofing. They can also deny ICMP echo requests or TCP SYN packets to unused ports to reduce exposure to reconnaissance scans. Only required services such as HTTPS or VPN traffic should be explicitly permitted, with all other traffic implicitly denied.
47
Evaluate the role of ACLs as part of a layered defence strategy at the perimeter and how they might mitigate a type of attack. Include how they interact with other security controls such as firewalls or intrusion prevention systems (IPS).
Answer ACLs serve as a foundational control at the perimeter, enforcing basic traffic filtering to mitigate common threats based on source and destination IP addresses before more advanced inspection occurs. Network threats, such as IP spoofing and Denial of Service attacks can be mitigated by ACLs. For example, inbound packets should never be accepted from a range of address types, such as, all zeros’ addresses, broadcast addresses, local host addresses, automatic private Ip addresses, RFC1918 and IP multicast address range as these are likely spoofed. They restrict traffic flow based on IP, port, and protocol, preventing many low-level attacks. In a layered security model, ACLs complement firewalls and IPS by reducing unnecessary traffic load and acting as a first line of defence. However, ACLs are static and lack deep packet inspection, so they should be combined with dynamic tools like IPS and application firewalls for comprehensive protection.
48
Attackers can use ICMP and echo packets in reconnaissance attacks and to also generate DoS flood attacks. For proper network operation explain what ICMP messages should be allowed in and out of the network.
Answer Allowed into the internal network: * Echo Reply: Allows users to ping external hosts. * Source Quench: Requests that the sender decrease the traffic rate of messages * Unreachable: Generated for packets that are administratively denied by an ACL Allowed to exit the network: * Echo: Allows users to ping external hosts * Prameter problem: Informs the host of packet header problems * Packet to big: Enables packet maximum transmission unit discovery * Source quench: Throttles down traffic when necessary
49
Explain the purpose of an object and the advantage of using objects in a configuration?
Objects are reusable components for use in configurations and make it easy to maintain configurations. The advantage is that when an object is modified, the change is automatically applied to all rules that use that specified object. Two types of network objects: Network object: Can contain a host, network IP address, range of IP addresses or a FQDN. Service Object: Contains a protocol and optional source / destination port.
50
To configure network address translation on the ASA firewall what do you need to create?
To configure NAT a network object is required that identifies the source that has to be translated in dynamic NAT or host in a static Nat translation
51
What are the main differences between an IOS and ASA ACL?
Answer * The ASA uses a network mask (e.g., 255.255.255.0) and not a wildcard mask (e.g. 0.0.0.255). * ACLs are always named instead of numbered. * By default, interface security levels apply access control without an ACL configured
52
Briefly explain two packet filtering techniques used on an ASA?
**Through-traffic filtering** - Traffic that is passing through the security appliance from one interface to another interface. The configuration is completed in two steps. The first step is to set up an ACL. The second step is to apply that ACL to an interface. **To-the-box-traffic filtering ** Also known as a management access rule, to-the-box-traffic filtering applies to traffic that terminates at the ASA. They are created to filter traffic that is destined for the control plane of the ASA. They are completed in one step but require an additional set of rules to implement access control. Note: Security Levels apply access control without an ACL configured.
53
How can we enable a host from a lower security level interface access a host on an interface with a higher security level?
ASA devices differ from their router counterparts because of interface security levels. By default, security levels apply access control without an ACL configured. For instance, traffic from a more secure interface, such as security level 100, is allowed to access less secure interfaces, such as level 0. Traffic from a less secure interface is blocked from accessing more secure interfaces. Access from a lower security level to a higher security level can be achieved through ACL’s. The security level default behaviour is to implicitly permit traffic from a higher security interface to a lower security interface outbound. Traffic is implicitly permitted between interfaces with the same security level if the ASA has been configured to globally permit this behaviour. Traffic from interfaces with lower security levels is implicitly denied to interfaces with higher security levels.
54
Provide an example of where extended ACL’ can be used in a firewall environment?
**Control network access for IP traffic** The ASA does not allow any traffic from a lower security interface to a higher security interface unless it is explicitly permitted by an extended access list. **Identify traffic for AAA rules** AAA rules use access lists to identify traffic. **Identify addresses for NAT** Policy NAT lets you identify local traffic for address translation by specifying the source and destination addresses in an extended access list. **Establish VPN access** Extended access list can be used in VPN commands. **Identify traffic for Modular Policy Framework (MPF)** Access lists can be used to identify traffic in a class map, which is used for features that support MPF. Features that support MPF include TCP, general connection settings, and inspection.
55
access-list ACL-IN extended deny ip 172.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224 access-list ACL-IN extended permit ip any any access-group ACL-IN in interface INSIDE
ACL prevents hosts on 172.16.1.0/24 from accessing the 209.165.201.0/27 network. Internal hosts are permitted access to all other addresses. All other traffic is implicitly denied.
56
What are the three methods NAT can be deployed on an ASA?
**Inside NAT: ** Typically deployed when a host from a higher security level has traffic destined for an lower security level. The ASA translates the internal host address into a global address. **Outside NAT: ** Used when traffic from a lower security interface is destined for a host on the higher security interface must be translated. Typically used to access services on the DMZ. **Bidirectional NAT: ** Indicates that both inside and outside NAT are used together.
57
What are the three configuration objects defined in the Modular Policy Framework (MPF) and their purpose?
Class Map: Identifies the traffic on which to perform an action Policy Map: Defines the action we are going to perform on the traffic. Service Policy: Defines where the action is performed.
58
What are the steps to configure the Modular Policy Framework?
* Configure an extended ACL to identify granular traffic (this may be optional) * Configure the class map to define interesting traffic * Configure a policy map to apply actions to the identified traffic * Configure a service policy to identify which interface should be activated for the service or if it should be activated globally.