Cover image for CCIE security exam certification guide
Title:
CCIE security exam certification guide
Personal Author:
Series:
CCIE self-study
Edition:
2nd ed.
Publication Information:
Indianapolis, IN : Cisco Press, 2005
Physical Description:
1v + 1 CD-ROM
ISBN:
9781587201356
General Note:
Accompanied by compact disc : CP 8962

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010116303 QA76.3 B464 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Covers the CCIE Security written exam 2.0 objectives. Designed to optimize your study time, this book helps you assess your knowledge of the material at the start of each chapter with quizzes for each topic. The CD-ROM test engine enables you take timed practice exams that mimic the real testing environment.


Author Notes

Henry Benjamin , CCIE No. 4695, is a triple CCIE. He has more than 15 years experience in Cisco networks including planning, designing, and implementing large IP networks running IGRP, EIGRP, BGP, OSPF, and voice over IP. Henry has been a key member of the CCIE global team and internal Cisco IT team based in Sydney, Australia, where his tasks included writing and proctoring new laboratory examinations and questions for the coveted CCIE R/S, CCIE Security, and CCIE Service Provider tracks.


Table of Contents

Forewordp. xviii
Introductionp. xx
Chapter 1 General Networking Topicsp. 3
"Do I Know This Already?" Quizp. 4
Foundation Topicsp. 14
Networking Basics-The OSI Reference Modelp. 14
Layer 1 The Physical Layerp. 14
Layer 2 The Data Link Layerp. 15
Layer 3 The Network Layerp. 16
Layer 4 The Transport Layerp. 17
Layer 5 The Session Layerp. 17
Layer 6 The Presentation Layerp. 17
Layer 7 The Application Layerp. 18
TCP/IP and OSI Model Comparisonp. 18
Example of Peer-to-Peer Communicationp. 19
Ethernet Overviewp. 20
Switching and Bridgingp. 22
Bridge Port Statesp. 24
Fast EtherChannelp. 25
Internet Protocolp. 27
Variable-Length Subnet Masksp. 31
Classless Interdomain Routingp. 32
Transmission Control Protocolp. 34
TCP Mechanismsp. 34
TCP/IP Servicesp. 38
Address Resolution Protocolp. 38
Reverse ARPp. 39
Dynamic Host Configuration Protocolp. 40
Hot Standby Router Protocolp. 41
Internet Control Message Protocolp. 46
Telnetp. 47
File Transfer Protocol and Trivial File Transfer Protocolp. 47
Routing Protocolsp. 48
Routing Information Protocolp. 52
Enhanced Interior Gateway Routing Protocolp. 57
EIGRP Terminologyp. 57
EIGRP Configuration Examplep. 59
Open Shortest Path Firstp. 61
OSPF in a Single Areap. 62
Multiple OSPF Areasp. 64
Virtual Linksp. 66
OSPF Configuration Examplep. 66
Border Gateway Protocolp. 71
BGP Attributesp. 72
Configuring BGPp. 74
Integrated Services Digital Networkp. 75
Basic Rate and Primary Rate Interfacesp. 75
ISDN Framing and Frame Formatp. 76
ISDN Layer 2 Protocolsp. 76
High-Level Data Link Controlp. 76
Point-to-Point Protocolp. 77
Cisco IOS ISDN Commandsp. 78
IP Multicastp. 79
Asynchronous Communications and Access Devicesp. 80
Telephony Best Practicesp. 82
Wireless Best Practicesp. 84
Foundation Summaryp. 89
Wireless Best Practicesp. 95
Q & Ap. 96
Scenario: Routing IP on Cisco Routersp. 98
Scenario Answersp. 100
Chapter 2 Application Protocolsp. 103
"Do I Know This Already?" Quizp. 103
Foundation Topicsp. 110
Domain Name Systemp. 110
Trivial File Transfer Protocolp. 114
File Transfer Protocolp. 116
Active FTPp. 117
Passive FTPp. 118
Hypertext Transfer Protocolp. 119
Secure Sockets Layerp. 121
Simple Network Management Protocolp. 122
SNMP Notificationsp. 123
SNMP Examplesp. 128
Simple Mail Transfer Protocolp. 128
Network Time Protocolp. 130
Secure Shell and Cisco IOS SSHp. 133
Cisco IOS SSHp. 135
Remote Data Exchange Protocolp. 138
Foundation Summaryp. 140
Q & Ap. 143
Scenario: Configuring DNS, TFTP, NTP, and SNMPp. 145
Scenario Answersp. 147
Chapter 3 Cisco IOS Specifics and Securityp. 149
"Do I Know This Already?" Quizp. 149
Foundation Topicsp. 156
Cisco Hardwarep. 156
Random-Access Memoryp. 157
Nonvolatile RAMp. 157
System Flashp. 157
Central Processing Unitp. 158
Read-Only Memoryp. 159
Configuration Registersp. 160
Cisco Interfacesp. 163
Saving and Loading Filesp. 165
show and debug Commandsp. 166
Router CLIp. 166
show Commandsp. 166
Debugging Cisco Routersp. 175
Password Recoveryp. 182
Basic Security on Cisco Routersp. 187
IP Access Listsp. 190
Access Lists on Cisco Routersp. 190
Extended Access Listsp. 196
Layer 2 Switching Securityp. 199
CAM Table Overflowp. 199
VLAN Hoppingp. 202
Spanning Tree Protocol Manipulationp. 204
MAC Spoofing Attackp. 205
DHCP Starvation Attacksp. 207
Security Policy Best Practices-A Cisco Viewp. 208
Foundation Summaryp. 210
Q & Ap. 213
Scenario: Configuring Cisco Routers for Passwords and Access Listsp. 215
Scenario Answersp. 217
Chapter 4 Security Protocolsp. 221
"Do I Know This Already?" Quizp. 221
Foundation Topicsp. 228
Authentication, Authorization, and Accountingp. 228
Authenticationp. 230
Authorizationp. 230
Accountingp. 231
Remote Authentication Dial-In User Servicep. 232
RADIUS Configuration Task Listp. 236
Terminal Access Controler Access Control System Plusp. 238
TACACS+ Configuration Task Listp. 241
TACACS+ Versus RADIUSp. 245
Encryption Technology Overviewp. 246
DES and 3DESp. 248
Advanced Encryption Standardp. 250
Message Digest 5 and Secure Hash Algorithmp. 251
Diffie-Hellmanp. 252
IP Securityp. 254
Encapsulating Security Payloadp. 255
Authentication Headerp. 257
Internet Key Exchangep. 258
Cisco IOS IPSec Configurationp. 264
Certificate Enrollment Protocolp. 272
Extensible Authentication Protocol, Protected EAP, and Temporal Key Integrity Protocolp. 272
Virtual Private Dial-Up Networks (VPDN)p. 276
VPDN Configuration Task Listp. 279
Foundation Summaryp. 282
Q & Ap. 286
Scenario: Configuring Cisco Routers for IPSecp. 288
Scenario Answersp. 292
Chapter 5 Cisco Security Applicationsp. 297
"Do I Know This Already?" Quizp. 298
Foundation Topicsp. 301
Cisco Secure for Windows (NT) and Cisco Secure ACSp. 301
Cisco Secure ACSp. 303
IDS Fundamentalsp. 303
Notification Alarmsp. 303
Signature-Based IDSp. 304
Anomaly-Based IDSp. 305
Network-Based IDS Versus Host-Based IDSp. 305
IDS Placementp. 305
IDS Tuningp. 307
Cisco Secure Intrusion Detection System and Catalyst Services Modulesp. 309
Cisco Secure IDSp. 309
Cisco Inline IDS (Intrusion Prevention System)p. 311
Catalyst Services Modulep. 312
CiscoWorks VMSp. 313
Cisco VPN 3000 Concentratorp. 314
Cisco Secure VPN Clientp. 326
Cisco Router and Security Device Managerp. 328
Security Information Monitoring Systemp. 331
Foundation Summaryp. 332
Q & Ap. 334
Scenario: Cisco Secure IDS Database Eventp. 335
Scenario Answersp. 337
Chapter 6 Security Technologiesp. 341
"Do I Know This Already?" Quizp. 342
Foundation Topicsp. 351
Advanced Security Conceptsp. 351
Network Address Translation and Port Address Translationp. 355
NAT Operation on Cisco Routersp. 358
Dynamic NAT Configuration Task Listp. 359
Monitoring NAT Operations with show Commandsp. 360
Cisco PIX Firewallp. 361
Configuring a PIX Firewallp. 364
PIX Firewall Configuration Task Listp. 364
Miscellaneous PIX Firewall Commandsp. 370
Advanced Cisco PIX Commandsp. 373
Troubleshooting PIX Firewall Log Filesp. 374
Cisco PIX Firewall Software Featuresp. 376
Cisco IOS Firewall Feature Setp. 377
CBAC Configuration Task Listp. 380
Public Key Infrastructurep. 382
Virtual Private Networksp. 383
Network-Based Intrusion Detection Systemsp. 386
Cisco Security Agent and Host-Based IDSp. 387
Cisco Threat Responsep. 391
Cisco Threat Response IDS Requirementsp. 392
Authorization Technologies (IOS Authentication 802.1X)p. 392
Foundation Summaryp. 395
Q & Ap. 399
Scenario: Configuring a Cisco PIX Firewall for NATp. 401
Scenario Answerp. 402
Chapter 7 Network Security Policies, Vulnerabilities, and Protectionp. 405
"Do I Know This Already?" Quizp. 405
Foundation Topicsp. 412
Network Security Policiesp. 412
Standards Bodies and Incident Response Teamsp. 413
Incident Response Teamsp. 415
Internet Newsgroupsp. 416
Vulnerabilities, Attacks, and Common Exploitsp. 417
Intrusion Detection Systemp. 422
Protecting Cisco IOS from Intrusionp. 425
Foundation Summaryp. 432
Q & Ap. 435
Scenario: Defining Cisco IOS Commands to View DoS Attacks in Real Timep. 436
Scenario Answersp. 437
Chapter 8 CCIE Security Self-Study Labp. 441
How to Use This Chapterp. 442
Preparing for this Labp. 442
Goal of This Labp. 443
CCIE Security Self-Study Lab Part I Goalsp. 444
CCIE Security Self-Study Lab Part II Goalsp. 445
General Lab Guidelines and Setupp. 445
Communications Server (0 Points)p. 448
Communications Server Solutionp. 448
CCIE Security Self-Study Lab Part I: Basic Network Connectivity (4 Hours)p. 450
Basic Frame Relay Setup (5 Points)p. 450
Basic Frame Relay Setup Solutionp. 451
Physical Connectivity (0 Points)p. 456
Catalyst Ethernet Switch Setup I (5 Points)p. 457
Catalyst Ethernet Switch Setup I Solutionp. 457
Catalyst Ethernet Switch Setup II (6 Points)p. 463
Catalyst Ethernet Switch Setup II Solutionp. 463
IP Host Lookup and Disable DNS (1 Point)p. 464
IP Host Lookup and Disable DNS Solutionp. 464
PIX Configuration (6 Points)p. 465
PIX Configuration Solutionp. 466
IGP Routing (18 Points)p. 470
Basic RIP Configuration (6 of 18 Points)p. 470
EIGRP Configuration (5 of 18 Points)p. 471
OSPF Configuration (7 of 18 Points)p. 475
Basic ISDN Configuration (6 Points)p. 484
Basic ISDN Configuration Solutionp. 485
DHCP Configuration (3 Points)p. 490
DHCP Configuration Solutionp. 491
BGP Routing Configuration (6 Points)p. 491
Basic IBGP Configurationp. 492
CCIE Security Self-Study Lab Part II: Advanced Security Design (4 Hours)p. 495
IP Access List (4 Points)p. 495
IP Access List Solutionp. 496
Prevent Denial-of-Service Attacks (4 Points)p. 497
Prevent Denial-of-Service Attacks Solutionp. 497
Time-Based Access List (4 Points)p. 499
Time-Based Access List Solutionp. 499
Dynamic Access List/Lock and Key Feature (5 Points)p. 501
Dynamic Access List/Lock and Key Feature Solutionp. 501
Cisco IOS Firewall Configuration on R5 (6 Points)p. 503
Cisco IOS Firewall Configuration on R5 Solutionp. 503
IPSec Configuration (6 Points)p. 505
IPSec Configuration Solutionp. 506
Advanced PIX Configuration (5 Points)p. 511
Configuring SSH on the PIXp. 512
Configuring the PIX for Intrusion Detectionp. 512
ACS Configuration (5 Points)p. 514
Non-AAA Authentication Methodsp. 514
Login Authentication Methodsp. 516
Login Authentication Using TACACS+p. 518
ACS Configuration: Login Authentication Using RADIUSp. 521
Cisco Intrusion Detection System (5 Points)p. 525
Cisco Intrusion Detection System Solutionp. 527
Final Configurationsp. 538
Additional Advanced Lab Topics (No Solutions Provided)p. 557
Advanced Security Lab Topics (4 Points)p. 558
Content Filtering (2 Points)p. 558
FTP Issues (3 Points)p. 558
Routing Table Authenticity (4 Points)p. 558
Access Control on R2 Ethernet Interface (4 Points)p. 558
Conclusionp. 559
Appendix A Answers to Quiz Questionsp. 561
Appendix B Study Tips for CCIE Security Examinationsp. 625
Appendix C Sample CCIE Routing and Switching Lab Ip. 639
Appendix D Sample CCIE Routing and Switching Lab IIp. 657
Indexp. 671