Study Material
Study Material
Study Material
(Security Specialist_BNCSD502B)
_______________________________________________________________________________________
Table of Contents
MODULE - I
THE SECURITY THREATS FACING MODERN NETWORK INFRASTRUCTURE
Ethical Hacking
Ethical Hacking is when the individual is allowed to hacks the systems with the
permission to the merchandise owner to search out of weakness in an exceedingly
system and the later fix them.
To find flaws and vulnerabilities
To determine the risk to the organization
SQL injection
SQL is one of the techniques used to steal data from the organizations, it is a fault to
create in the application code. SQL injection happens to when you inject the content into
an SQL query string and the result mode of content into a SQL query string, and the result
modifies the syntax of your query in the ways you did not intend
Phishing
Phishing technique involves sending of false emails, chats or website to the
impersonate real system with aim of stealing information from the original website.
Network Sniffing
A network sniffer to monitors data flowing over the computer network links. By allowing
you to capture and view the packet to level data on your network, sniffer tool can help you
to the locate network problems. Sniffers can be used for both stealing information off the
network and also for legitimate network management.
Page |4
Burp Suite
Burp suite is an integrated platform used for the attacking web applications. It consists
of all the Burp tools and required for attacking an applications. Burp Suite tool has to
same approach for the attacking web applications like framework for handling HTTP
requests, upstream proxies, alerting, logging and so on.
Hacking stages
Hacking, or targeting on an machine, should have the following 5 phases :
Surveillance : This is the principal stage where the hacker is endeavours to gather as
much data is possible about the target.
Scanning : This stage of includes exploiting the data accumulated amid Surveillance
stage and utilizing it to the inspect the casualty. The hacker can a utilize computerized
devices amid the scanning stage which can be incorporate port scanners, mappers
and vulnerability scanners.
Getting access : This is where the real hacking as happens. The hacker attempts to
the exploit data found amid the surveillance and the Scanning stage to get access.
Access Maintenance : Once access is gained, hackers need to a keep that access for
future the exploitation and assaults by securing their exclusive access with a
backdoors, rootkits and Trojans.
Covering tracks : Once hackers have a possessed the capacity to pick up and
maintain to access, they cover their tracks and to keep away from getting is detected.
This likewise enables them to be proceed with the utilization of the hacked framework
and keep themselves away from legitimate activities.
Enumeration
Extracting information from the system\files
Cisco Self Defending Network Architecture:
A new generation of interactive business communication and collaboration
technologies provides tremendous productivity and flexibility gains for organizationsof
all kinds. But this unprecedented connectivity also unleashes new, complex security
risks, including:
Increased exposure to security threats—Ubiquitous access to Web-enabled
applications and services enables users to work from anywhere, anytime—but also
places businesses at risk anywhere, anytime.
An eroding network perimeter—The traditional network barriers that separatedtrusted
from untrusted and “inside” from “outside” are now disappearing. As more applications
become directly accessible to remote users and systems, the concept of the network
perimeter becomes increasingly vague and more difficult to protect.
Evolving threats—Information attacks of the past were largely an issue of cyber-
vandalism, with hackers primarily looking for fame. Today’s attacks are a profit- driven
business, often controlled by organized crime. The modern attacker uses a patient,
“stealth” approach to eventually achieve a successful attack. In addition, modern
attackers often avoid technology defences, using spam, phishing attacks, and
fraudulent Web links to target an organization’s weakest link: human beings. As
security risks have evolved, so have organizations’ approaches to them. Where
information security was once a technology issue, today it is a business issue—
representing a more significant cost and operational challenge, but a fundamental
business enabler as well. More and more organizations are implementing formal
programs to reduce IT risk, especially security and compliance risks. As regulatory
compliance becomes a core requirement for organizations in more industries,
businesses must develop new capabilities for controlling the kinds of information
traversing their network, how that information is used, and who can access it.
Organizations not only face the challenge of becoming compliant, but of staying
compliant as the network continuously evolves with business needs.
Organizations are wrestling with information security demands that span many
overarching business challenges such as complying with regulatory requirements,
Page |6
preventing data loss, and blocking malware. The problem is that dealing with these
types of challenges requires a true security solution—not just security products. To
prevent data loss alone, for example, businesses need a combination of strong
perimeter defences, malware defences, identity services, endpoint security, policy
enforcement mechanisms, and security monitoring tools, as well as a strong plan for
making them all work in concert. No single security product can provide all of these
capabilities. So, today’s businesses need security solutions that combine multiple
best-of-breed products and approaches into a single, autonomous defence system.
They need a truly holistic security solutions approach to network defence.
desktop icon.
Some viruses are designed to affect specific applications, which will either cause them
to crash or force the user to automatically log out of the service.
Crashing of the Device
System crashes and the computer itself unexpectedly closing down are common
indicators of a virus. Computer viruses cause computers to act in a variety of strange
ways, which may include opening files by themselves, displaying unusual error
messages, or clicking keys at random.
Mass Emails Being Sent from Your Email Account
Computer viruses are commonly spread via email. Hackers can use other people's
email accounts to spread malware and carry out wider cyberattacks. Therefore, if an
email account has sent emails in the outbox that a user did not send, then this could
be a sign of a computer virus.
Changes to Your Homepage
Any unexpected changes to a computer—such as your system’s homepage being
amended or any browser settings being updated—are signs that a computer virus may be
present on the device.
they are opened and can quickly spread across systems and networks. It largely
affects files with .exe or .com extensions. The best way to avoid file infector virusesis
to only download official software and deploy an antivirus solution.
Network Virus
Network viruses are extremely dangerous because they can completely cripple entire
computer networks. They are often difficult to discover, as the virus could behidden
within any computer on an infected network. These viruses can easily replicate and
spread by using the internet to transfer to devices connected to the network. Trusted,
robust antivirus solutions and advanced firewalls are crucial to protecting against
network viruses.
Boot Sector Virus
A boot sector virus targets a computer’s master boot record (MBR). The virus injectsits
code into a hard disk’s partition table, then moves into the main memory when a
computer restarts. The presence of the virus is signified by boot-up problems, poor
system performance, and the hard disk becoming unable to locate. Most modern
computers come with boot sector safeguards that restrict the potential of this type of
virus.
Steps to protecting against a boot sector virus include ensuring disks are write-
protected and not starting up a computer with untrusted external drives connected.
Is Ransomware a Virus?
o Ransomware is when attackers lock victims out of their system or files and demanda
ransom to unlock access. Viruses can be used to carry out ransomware attacks.
Is Rootkit a Virus?
o A rootkit is not a virus. Rootkits are software packages that give attackers access to
systems. They cannot self-replicate or spread across systems.
P a g e | 10
20. Design an ACL that allows HTTP traffic from a specific source IP address range and
denies HTTPS traffic from any source IP address.
25. Discuss the role of wildcard masks in defining ACL filtering criteria.
26. Evaluate the potential security risks associated with misconfigured or overly permissive
ACLs.
27. Create an extended ACL that allows SMTP traffic from any source IP address to a
specific destination IP address.
28. What are the default behaviors of an ACL when no explicit permit or deny statements
are configured?
29. What is the purpose of applying ACLs on router interfaces?
P a g e | 13
MODULE - II
FUNDAMENTALS OF VPN TECHNOLOGY AND CRYPTOGRAPHY
A virtual private network (VPN) is used to transport data from a private network to another
private network over a public network, such as the Internet, using encryption to keep the
data confidential. In other words, a VPN is an encrypted connection between private
networks over a public network, most often the Internet. VPNs provide the following
services:
Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the
data. The Internet is inherently insecure as data typically crosses networks and
devices under different administrative controls. Even if someone is able to
intercept data at some point in the network, they will not be able to interpret it
due to encryption.
Integrity: VPNs ensure that data was not modified in any way as it traversed the Internet.
Authentication: VPNs use authentication to verify that the device at the other end of VPN is a
legitimate device and not an attacker impersonating a legitimate device.
Anti-Replay: VPNs ensure that hackers are not able to make changes to packets that flow
from source to destination.
A VPN is essentially a secure channel, often called a tunnel, between two devices or end
points near the edge of the Internet. The VPN end points encrypt the whole of original IP
packet, meaning someone who even manages to see a copy of the packet as it traverses
the network cannot understand the contents of the original packet. The VPN end points
also append headers to the original encrypted packet. The additional headers include
fields that allow VPN devices to perform all their functions.
VPNs have several advantages over other WAN technologies, some of which are
summarized here:
Cost: Internet VPN solutions can be much cheaper than alternate private WAN options
available today.
Security: Modern VPN solutions can be as secure as private WAN options and are being
P a g e | 14
used even by organizations with the most stringent security requirements such as credit card
companies.
Scalability: Internet VPN solutions can be scaled quickly and cost-effectively to a large
number of sites. Each location can choose from multiple options of Internet connectivity.
There are two components required in a remote-access VPN. The first is a network
access server (NAS), also called a media gateway or a remote-access server (RAS).
A NAS might be a dedicated server, or it might be one of multiple software applications
running on a shared server. It is a NAS that a user connects to from the Internet in order to
use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN.
To authenticate the user's credentials, the NAS uses either its own authentication process
or a separate authentication server running on the network.
Site-to-site VPN
A ‘Site-to-Site VPN’ is also called a ‘Router-to-Router VPN’ and is the mostly used in
corporate based operations. The fact that many companies have offices located both
nationally and internationally, a Site- to-Site VPN is used to connect the network of the
main office location to multiple offices. This is also known as an Intranet based VPN. The
opposite is also possible with Site-to-Site VPN. Companies use Site- to-Site VPN to
connect with other companies in the same way and this classified as an Extranet based
VPN. In simple terms, Site-to-Site VPNs build a virtual bridge that joins networks at
various locations in order to connect them to the internet and maintain a secure and
private communication between these networks.
P a g e | 15
1. A PC in the branch office sends a packet to a server in the headquarters, just as it would
without a VPN.
2. Cisco Adaptive Security Appliance (ASA) at the branch office, that is ASA1, encrypts
the original packet, adds a VPN header, and adds a new IP header with public IP
addresses.
3. ASA2 at the headquarters receives the packet, authenticates the identity of the sender,
confirms that the packet has not been changed in transit, and then decrypts the original
packet.
4. The server receives the decrypted packet.
Above figure shows Cisco Adaptive Security Appliance (ASA) performing VPN functions.
However, several other hardware and software products are available for building VPNs.
Some VPN products offered by Cisco are mentioned here.
Cisco Router: All Cisco routers that run Cisco IOS software can support IPsec VPNs. The
only requirement is that you should use a Cisco IOS image with appropriate feature set.
Examples of VPN- enabled routers include the Cisco 1800, Cisco 2800, Cisco 1900, and Cisco
2900 series.
Cisco Adaptive Security Appliance (ASA): The Cisco ASA is a versatile appliance that
combines several security functions including firewall and VPN capabilities in a single piece of
hardware. All ASA models support IPsec VPN provided you meet the licensing requirements
to enable the VPN feature.
Cisco VPN Clients: Cisco offers both hardware and software VPN clients. Cisco AnyConnect
Secure Mobility Client is a software VPN client that runs on laptops as well as smartphones
and tablets.
The primary objective of using cryptography is to provide the following four fundamental
information security services –
Data Integrity: It is security service that deals with identifying any alteration to the data.
The data may be modified by an unauthorized entity intentionally or accidently. Integrity
service confirms that whether data is intact or not since it was last created, transmitted,
or stored by an authorized user. Data integrity cannot prevent the alteration of data, but
provides a means for detecting whether data has been manipulated in an unauthorized
manner.
Message authentication identifies the originator of the message without any regard router or
system that has sent the message.
Entity authentication is assurance that data has been received from a specific entity, say a
particular website.
Non-repudiation: It is a security service that ensures that an entity cannot refuse the
ownership of a previous commitment or an action. It is an assurance that the original
creator of the data cannot deny the creation or transmission of the said data to a recipient
or third party. Non-repudiation is a property that is most desirable in situations where there
are chances of a dispute over the exchange of data.
Cryptosystem
Components of a Cryptosystem
Serial In-line Protocol (SLIP): Serial Line IP was created first to allow isolated hosts to
link via TCP/IP over the telephone network. The SLIP protocol defines a simple
mechanism for framing datagrams for transmission across serial lines. SLIP sends the
datagram across the serial line as a series of bytes, and it uses special characters to mark
when a series of bytes should be grouped together as a datagram. SLIP defines two
special characters for this purpose:
The SLIP END character is the character that marks the end of a datagram. When the receiving
SLIP encounters the END character, it knows that it has a complete datagram that can be sent
up to IP.
The SLIP ESC character is used to "escape" the SLIP control characters. If the sending SLIP
encounters a byte value equivalent to either a SLIP END character or a SLIP ESC character in
the datagram it is sending, it converts that character to a sequence of two characters. This
procedure prevents the receiving SLIP from incorrectly interpreting a data byte as the end of the
datagram.
P a g e | 18
The SLIP protocol does not define any link control information that could be used to
dynamically control the characteristics of a connection. Therefore, SLIP systems must assume
certain link characteristics. Because of this limitation, SLIP can only be used when both hosts
know each other's address, and only when IP datagrams are being transmitted.
SLIP does not compensate for noisy, low-speed telephone lines. The protocol does not
provide error correction or data compression.
Point-to-Point Protocol (PPP): PPP was devised by IETF (Internet Engineering Task
Force) to create a data link protocol for point-to-point lines that can solve all the problems
present in SLIP. PPP is most commonly used data link protocol. It is used to connect
the Home PC to the server of ISP via a modem. This protocol offers several facilities that
were not present in SLIP. Some of these facilities are:
1. PPP defines the format of the frame to be exchanged between the devices.
3. It defines how network layer data are encapsulated in data link frame.
5. Unlike SLIP that supports only IP, PPP supports multiple protocols.
6. PPP allows the IP address to be assigned at the connection time i.e. dynamically.
Thus, a temporary IP address can be assigned to each host.
7. It defines how network layer data are encapsulated in data link frame.
Unlike SLIP that supports only IP, PPP supports multiple protocols.
PPP allows the IP address to be assigned at the connection time i.e. dynamically. Thus,
a temporary IP address can be assigned to each host.
P a g e | 19
PPP provides multiple network layer services supporting a variety of network layer protocol.
For this PPP uses a protocol called NCP (Network Control Protocol).
PPP uses several other protocols to establish link, authenticate users and to carry the
network layer data. The various protocols used are:
1. Link Control Protocol (LCP) - It is responsible for establishing, maintaining, configuring and
terminating the link. It also provides negotiation mechanism to set options between two
endpoints.
2.Authentication Protocol (AP) - Authentication protocols help to validate the identity of a user
who needs to access the resources. There are two authentication protocols:
3. Network Control Protocol (NCP) - After establishing the link and authenticating the user, PPP
connects to the network layer. This connection is established by NCP. Therefore, NCP is a set of
control protocols that allow the encapsulation of the data coming from network layer. After one of
the NCP protocols does the network layer configuration, the users can exchange data from the
network layer. PPP can carry a network layer data packet from protocols defined by the Internet,
DECNET, Apple Talk, Novell, OSI, Xerox and so on. None of the NCP packets carries networks
layer data. They just configure the link at the network layer for the incoming data.
PPPoE connection, you will need to enter the service name provided by the ISP as well
as a username and password. This provides a simple way for the ISP to uniquely identify
your system and establish your Internet connection. PPPoE can be contrasted to DHCP,
which dynamically assigns unique IP addresses to connected systems and is typically
used by cable Internet service providers.
The biggest advantage of a PPPoE configuration is that it is easy to set up. It also
supports multiple computers on a local area network (LAN). The downside of PPPoE is
that it requires additional overhead, or extra data, to be sent over the Internet connection.
The user launches a PPTP client that connects to their Internet provider.
PPTP creates a TCP control connection between the VPN client and VPN server. The protocol
uses TCP port 1723 for these connections and General Routing Encapsulation (GRE) to finally
establish the tunnel.
PPTP also supports VPN connectivity across a local network. Once the VPN tunnel is
established, PPTP supports two types of information flow:
Control messages for managing and eventually tearing down the VPN connection.
Control messages pass directly between VPN client and server.
P a g e | 21
Data packets that pass through the tunnel, to or from the VPN client.
P a g e | 22
Layer-2 Tunneling Protocol (L2TP): This protocol is designed by IETF. L2TP utilizes two types of
messages - control messages and data messages. Control messages are used in the establishment,
maintenance and clearing of tunnels and calls. Data messages are used to encapsulate PPP frames being
carried over the tunnel. Control messages utilize a reliable Control Channel within L2TP to guarantee
delivery. Data messages are not retransmitted when packet loss occurs.
PPP Frames are passed over an unreliable Data Channel encapsulated first by an L2TP header and
then a Packet Transport such as UDP, Frame Relay, ATM, etc. Control messages are sent over a
reliable L2TP Control Channel, which transmits packets in-band over the same Packet Transport.
IP Security Protocol
IPSec provides the capability to secure communications across a LAN, across private
andpublic wide area networks (WAN’s), and across the Internet.
• Secure branch office connectivity over the Internet: A company can build a secure virtual
private network over the Internet or over a public WAN. This enables a business to rely heavily
on the Internet and reduce its need for private networks, saving costs and network management
overhead.
• Secure remote access over the Internet: An end user whose system is equipped with IP
security protocols can make a local call to an Internet service provider (ISP) and gain secure
access to a company network. This reduces the cost of toll charges for travelling employees and
telecommuters.
• Establishing extranet and intranet connectivity with partners: IPSec can be used to secure
communication with other organizations, ensuring authentication and confidentiality and
providing a key exchange mechanism.
• Enhancing electronic commerce security: Even though some Web and electronic commerce
applications have built-in security protocols, the use of IPSec enhances that security.
The following figure shows a typical scenario of IPSec usage. An organization maintains LANs at
dispersed locations. Non-secure IP traffic is conducted on each LAN.
IP Security Architecture
• Encapsulating Security Payload (ESP): Covers the packet format and general issues related
to the use
of the ESP for packet encryption and,
optionally, authentication.
• Authentication Header (AH): Covers the packet format and general issues related to the use
of AH for
packet authentication.
• Encryption Algorithm: A set of documents that describe how various encryption algorithms
are used for ESP.
• Domain of Interpretation (DOI): Contains values needed for the other documents to relate
to each
other. These include identifiers for approved encryption
and authentication algorithms, as well as operational
parameters such as key lifetime.
In year 1995, Netscape developed SSLv2 and used in Netscape Navigator 1.1. The SSL
version1 was never published and used. Later, Microsoft improved upon SSLv2 and
introduced another similar protocol named Private Communications Technology (PCT).
Netscape substantially improved SSLv2 on various security issues and deployed SSLv3
in 1999. The Internet Engineering Task Force (IETF) subsequently, introduced a similar
TLS (Transport Layer Security) protocol as an open standard. TLS protocol is non-
interoperable with SSLv3. The salient features of SSL protocol are as follows −
SSL is specific to TCP and it does not work with UDP. SSL provides Application
Programming Interface (API) to applications. SSL itself is not a single layer protocol as
depicted in the image; in fact it is composed of two sub-layers.
Lower sub-layer comprises of the one component of SSL protocol called as SSL Record
Protocol. This component provides integrity and confidentiality services.
Upper sub-layer comprises of three SSL-related protocol components and an application
protocol. Application component provides the information transfer service between
client/server interactions. Technically, it can operate on top of SSL layer as well. Three
SSL related protocol components are −
o SSL Handshake Protocol
o Change Cipher Spec Protocol
o Alert Protocol.
These three protocols manage all of SSL message exchanges
Record Protocol
o It is the most complex part of SSL. It is invoked before any application data is transmitted. It
creates SSL sessions between the client and the server.
o Establishment of session involves Server authentication, Key and algorithm negotiation,
P a g e | 26
o This protocol is used to report errors – such as unexpected message, bad record MAC,
security parameters negotiation failed, etc.
o It is also used for other purposes – such as notify closure of the TCP connection, notify
receipt of bad or unknown certificate, etc.
P a g e | 27
The digital certificate is one of the foundations of a public key infrastructure (PKI). A
digital certificate is in many ways the electronic equivalent of a passport or driver's
license, and maybe used to identify and authenticate someone making online
transactions. A certification authority issues a digital certificate to a certificate holder
on the request of a registration authority.
P a g e | 28
standard.
The public key and private key pair can be generated on a secure device. A
certification authority creates the digital certificate, incorporating the public key and
signs it, protecting the integrity of the information. The public key in a digital certificate
is linked to the private key. The certificate holder must hold the private key securely.
The security of the private key is extremely important. In many applications a private
key is stored by placing or creating the private key on a physical token such as a
smart card.
There are three different types of digital certificates used by web servers and web
browsers to authenticate over the internet. These digital certificates are used to link
a web server for a domain to the individual or organization that owns the domain –
Domain Validated (DV SSL) certificates offer the least amount of assurance about the holder
of the certificate. Applicants for DV SSL certificates need only demonstrate that they have the
right to use the domain name. While these certificates can give assurance that data is being sent
and received by the holder of the certificate, they give no guarantees about who that entity is.
Organization Validated (OV SSL) certificates provide additional assurances about the holder
of the certificate; in addition to confirming that the applicant has the right to use the domain, OV
SSL certificate applicants undergo additional confirmation of their ownership of the domain.
Extended Validation (EV SSL) certificates are issued only after the applicant is able to prove
their identity to the satisfaction of the CA. The vetting process includes verification of the
existence of the entity applying for the certificate, verifying that identity matches official records,
verifying that the entity is authorized to use the domain and confirming that the owner of the
domain has authorized the issuance of the certificate.
Details on a digital certificate include the certificate holder's name, their public key, the
name of the certification authority and an indication of the certificate policy under
which it was issued. Most digital certificates are in the format specified in the X.509
P a g e | 29
MCQ
1. What is a Virtual Private Network (VPN)?
2. How does a VPN provide secure communication over a public network?
3. What is the purpose of a site-to-site VPN?
4. What is the difference between remote access VPN and site-to-site VPN?
5. What are the advantages of using VPN for remote access to a network?
6. How does IPsec contribute to VPN security?
7. What is the purpose of using encryption in VPN?
8. What are the different types of VPN protocols commonly used in network environments?
9. What is the purpose of a VPN concentrator?
10. What is the significance of proper VPN configuration and encryption protocols for data
privacy?
11. What is the purpose of a VPN client in establishing a VPN connection?
12. How does tunneling contribute to secure transmission of data in a VPN?
13. What is the purpose of a VPN profile?
14. What is the role of SSL/TLS in VPN security?
15. What are the potential challenges of implementing VPN in a large-scale network?
16. What is the purpose of split tunneling in VPN?
17. What are the advantages of using VPN over traditional dedicated leased lines for network
connectivity?
18. What is the purpose of a VPN gateway in establishing VPN connections?
19. What is the potential impact of misconfigured VPN settings on network connectivity?
20. What is the purpose of using multi-factor authentication in VPN?
21. What is the role of VPN concentrators in handling multiple VPN connections simultaneously?
22. What are the potential security risks and vulnerabilities associated with VPN
implementations?
23. What is the purpose of implementing two-factor authentication in VPN?
24. What is the significance of VPN monitoring and logging in network security?
25. What are the potential security risks associated with VPN protocols that use weak encryption
algorithms?
26. What is the purpose of implementing network segmentation in VPN environments?
27. What is the role of VPN encryption in ensuring data privacy during transmission?
28. What are the potential security risks associated with using outdated VPN protocols?
P a g e | 30
SAQ
Authentication Identifies and verifies the remote user. This process can take the form of a
simple password or user name/password combination verified locally by the
NAS, or it could use one or more authentication servers and technologies, such
as one-time passwords (OTPs) or tokens.
Authorization Determines what devices, features, or services a specific remote user is
authorized to access in the network, such as network resources or services. This
concept is much like that of user permissions in the Windows server model.
Accounting Allows the network administrator to define a process for tracking the services
remote users are accessing. The data collected can be used for client billing,
auditing, or network planning.
Why Authenticate?
Not too long ago, PCs didn’t require a user to type in their user name and/or a
password. The computer powered up, and whoever was sitting at the keyboard had
full access to anything stored on the machine. Even many networked computers
were configured without a login requirement because, after all, “everybody was just
like family.” This would be the ultimate “open” system.
It didn’t take long to determine that possibly everyone in the family doesn’t need to
see the checkbook program or read each other’s e-mails, but, to protect those
resources, it was necessary to know who was sitting at the keyboard. Some
applications experimented with using passwords, and people learned to use
password protection on shared resources like folders or printers. Once a password
was created, it had to be shared with anyone who needed access. If more than one
shared resource existed, one of two problems arose. Either unique passwords were
necessary for each resource, requiring some users to keep track of multiple
passwords and the resource they were associated with, or the same password was
used, which meant any user who had legitimate access to one protected resource
now had the password for all protected resources.
If someone left under less-than-favorable circumstances, all passwords known to
that person had to be changed, and then the other users had to be told about the
changes. These early efforts showed right away that leaving security up to the
individual users wasn’t reliable and wouldn’t scale well as the network group.
Many organizations have this same problem with the user names/and or passwords
used to access their network devices, such as routers and switches, by storing the
access user name and/or password locally on the device. The following output
demonstrates access requiring onlya password (line con 0 and line aux 0) and
access using the local database (line vty 0 4).
P a g e | 32
The preceding techniques were covered in Chapter 2. While both methods work, they
have the same shortfalls and security issues as the early networking administrators faced
with user data and applications. The example could be made more secure by using
techniques covered in Chapter 2, including the following:
Using a different password for each access point
Using complex passwords containing eight or more characters, incorporating
uppercase and lowercase letters, plus numbers and symbols
Requiring routine password changes
Using the service password-encryption command to hide the
passwords from wandering eyes that could see the configuration
The encryption also reduces the chances of someone being able to capture the
passwords if the configuration is included in a Telnet session. Telnet transmits all
communications in cleartext.
Centralized Authentication
The lack of scalability and reliability limitations associated with locally stored
authentication can only be overcome by using some form(s) of centralized
authentication server. Network operating systems (OSs) typically have this feature at
their core. In addition to allowing access to the network, this system usually is linked
to a mechanism for matching login IDs with permissions to use protected resources.
While all authenticated users might have permission to use any of the network
printers, only members of the “accounting” group might be granted “permission” to
access to the Accounting Department servers. And maybe only those accounting
group members who are also part of the “payroll” group might be granted access to
the payroll software and data.
If a payroll accountant leaves the company under any circumstances, it’s only
necessary to delete their user account, which also removes them from the
accounting and payroll groups, maintaining security for those assets.
AAA is a technology that can work independently or with the network security system
to provide centralized authentication, authorization, and accounting security for
network devices and remote user access. Figure 3-3 demonstrates a simple example
of AAA and a NAS server providing secure access to a company network. With only
authentication features, the remote user could have access to both the server (web
server possibly) and the company network. With authorization implemented, it would
be possible to allow the modem user access to both, while limiting the ISDN user to
one or the other.
AAA Benefits
Cisco’s AAA technology centralized network access security provides many
benefits to the organization and network administrator, including the following:
Increased flexibility
Increased security
Scalability
Standard authentication methods
P a g e | 33
AAA supports multiple security servers, such as TACACS+, on the same network to
provide redundancy in case of device failure or link congestion. In addition, AAA
allows for multiple authentication methods to be specified so, if the first one is
unavailable, then a second or third option could be used. For example, if the
specified TACACS+ server is offline, the locally stored user name/password
database could possibly be used or maybe even the enable password. These
alternatives must be defined in advance or access could be blocked until the
specified service is restored.
P a g e | 34
Kerberos
Kerberos derives its name from the three-headed dog that guards the gates of
Hades in Greek mythology. Kerberos, the security protocol, is an authentication
system developed at the Massachusetts Institute of Technology (MIT), which uses
the Data Encryption Standard (DES) cryptographic algorithm for encryption and
authentication. Kerberos is based on the assumption that internal users are no more
inherently trustworthy than external users and, therefore, applies security and
encrypted communications for services like Telnet for all users.
Kerberos is designed to enable two parties to exchange private information across
an otherwise open network like the Internet by assigning a unique key, called a
ticket, to each user that logs on to the network. The ticket is then embedded in
messages to identify the sender of the message. Kerberos is based on the concept
of a trusted third party, called the key distribution center (KDC), a Kerberos
authentication server (AS), performing secure verification of all users and services
on the network. This verification involves exchanging encrypted authentication
messages without transmitting the user password.
The “lite” explanation of using Kerberos to gain network access might help.
1. A remote user opens a PPP connection to an organization’s NAS router.
2. The router prompts the user for a user name and a password.
3. The router then uses only the user name to request a ticket or credential verifying
the user identity (TGT) from the key distribution center (KDC).
4. Assuming the user name is known to the KDC, an encrypted TGT is sent back to
the router, which includes (among other things) the user’s identity. The ticket has
a limit life of eight hours to reduce the exposure to an unauthorized capture and
replay attempt.
P a g e | 35
5. The router uses the password from Step 2 to decrypt the TGT. If the decryption is
successful, the remote user is authenticated to the router and granted access to
the network.
When a remote user successfully authenticates at a boundary router, the user and
the user’s machine become part of the network. Another TGT from the KDC is
necessary to access network services because the original TGT is stored on the
router and isn’t used for additional authentication, unless the user physically logs on
to that router.
Securing a network service involves a double encryption. When a user requests
access to a network service, such as a printer or Telnet access to a host, the KDC
creates a service credential. This service credential contains the client’s identity, the
desired network service’s identity, and a time limit. The service credential is
encrypted first using a password shared by the KDC and the service. The result is
encrypted again using the user’s TGT as the key.
The target service uses the TGT supplied by the user to perform the first decryption.
If the result can be successfully decrypted using the password shared by the KDC
and the service, then the service is available.
Since Cisco IOS 11.2, organizations already using Kerberos 5 security can use their
existing authentication servers to authenticate their routers and switches. The IOS
software Kerberos authentication capabilities support the following network services:
Telnet
rlogin
rsh
rcp
The previous applications are said to be Kerberized, applications and services
that have been modified to support the Kerberos credential infrastructure and
encrypted communications.
Driver’s License Analogy
An analogy commonly used for Kerberos is a state driver’s license, wherein the state
is the KDC that issues a TGT, the license. The license contains information that
can authenticate the user: the picture and description items. In addition, the
permissions, such as motorcycle endorsement, and restrictions, such as glasses
required, associated with the license are also included. Like a TGT, the license also
has an expiration time after which it’s no longer valid.
Some states include an authentication code made up of portions of the key supplied
data, such as name and birth date. Any crude attempt to alter part of the key data
makes the authentication code not match.
To complete the analogy, a third party accepts the TGT, license, and, after
confirming the picture and description, trusts that the state did a reasonable job in
confirming the identity before issuing the license, and thereby accepts it as proof of
identity, age, or the right to drive.
RADIUS
This section compares several key features of TACACS+ and RADIUS to help
understand the strengths and weaknesses of each. While counterpointing many of
these comparisons is possible and the information is useful, remember, in the long
run, it’s Cisco’s certification and their comparison.
Authentication and Authorization
RADIUS combines the authentication and authorization services. The access-accept
packets sent by the RADIUS server in cleartext to the client contain authorization
information. Accounting is a separate service on the RADIUS server.
TACACS+ fully supports the AAA architecture by separating the authentication,
authorization, and accounting. This allows the flexibility of using another service,
such as Kerberos, for authentication, while still using TACACS+ for authorization
and/or accounting.
UDP vs. TCP
TACACS+ uses TCP for connection-oriented transport between clients and servers.
TCP port 49 is reserved for TACACS+. RADIUS uses UDP for best-effort delivery,
requiring additional variables to be defined, such as retransmit attempts and time-
outs to compensate.
The acknowledgements (TCP ACK) provide indications that a request has been
received within (approximately) a network round-trip time (RTT). This same TCP
process uses RST (reset) packets to provide immediate indication of a failed (or
offline) authentication server. UDP can’t tell the difference between a failed server, a
slow server, and a nonexistent server.
TCP keepalive packets can be used to watch for failed servers and to facilitate rapid
failover between multiple connected authentication servers.
TCP scales better and adapts better to growing and/or congested networks.
38
Challenge/Response
RADIUS supports only unidirectional challenge/response from the RADIUS server
to the RADIUS client. TACACS+ supports bidirectional challenge/response like
CHAP between the two NASs.
Multiprotocol Support
Both TACACS+ and RADIUS support SLIP and PPP encapsulation protocols,
but RADIUS doesn’t support the following TACACS+ supported protocols:
Novell Asynchronous Services Interface (NASI)
X.25 PAD connection
Net BIOS Frame Protocol Control protocol
AppleTalk Remote Access protocol (ARAP)
Packet Encryption
RADIUS encrypts only the password in the access-request packet from the client to
the server, using MD5 hashing for security. The remainder of the packet is in
cleartext exposing information such as user name, authorized services, and
accounting to be captured by snooping.
TACACS+ encrypts the entire data payload of the packet leaving only the standard
TACACS+ header in cleartext. While leaving the body of the packets unencrypted is
possible for debugging purposes, normal operation fully encrypts the body for more
secure communications. A field in the header indicates whether the body is
encrypted.
Router Management
RADIUS doesn’t support limiting the user access to specific router commands
as a tool for router management or terminal services.
TACACS+ supports two methods for controlling the authorization of router
commands on either a per-user or a per-group basis.
Assign commands to privilege levels and have the router use TACACS+ to verify
that the user is authorized at the specified privilege level.
Explicitly define the commands allowed on a per-user or a per-group basis on
the TACACS+ server.
39
MCQ
1. What does AAA stand for in the context of network authentication?
2. What is the purpose of AAA authentication in network security?
3. Which layer of the OSI model does AAA authentication operate at?
4. What are the three components of AAA authentication?
5. What is the purpose of the authentication server in AAA authentication?
6. How does AAA authentication handle user authentication requests from network devices?
7. Which command is used to configure AAA authentication on a Cisco router?
8. What is the difference between AAA authentication and local authentication on network
devices?
9. What is the purpose of AAA authorization in network security?
10. Which statement accurately describes AAA accounting?
11. What is the purpose of the accounting server in AAA authentication?
12. Which type of information can be collected through AAA accounting?
13. What is the difference between AAA authentication and AAA authorization?
14. What is the purpose of AAA accounting in network security?
15. What is a common protocol used for AAA authentication and accounting?
16. Which statement accurately describes the role of AAA authentication in network security?
17. What is the difference between RADIUS and TACACS+ in AAA authentication?
18. What is the purpose of AAA accounting in network security?
19. What is the difference between AAA accounting and AAA authorization?
20. Which statement accurately describes the purpose of AAA accounting?
21. What is the purpose of the authorization server in AAA authentication?
22. What is the difference between RADIUS and TACACS+ in AAA authentication?
23. What is the purpose of AAA accounting in network security?
24. Which statement accurately describes the role of AAA authentication in network security?
25. What is the difference between RADIUS and TACACS+ in AAA authentication?
26. What is the purpose of AAA accounting in network security?
27. What is the difference between AAA accounting and AAA authorization?
28. Which statement accurately describes the purpose of AAA accounting?
40
SAQ
1. What does AAA stand for in the context of network authentication?
2. Explain the concept of AAA authentication and its role in network security.
3. How does AAA authentication differ from local authentication on network devices?
4. Configure AAA authentication on a Cisco router to use a remote RADIUS server for user
authentication.
5. Discuss the benefits of using AAA authentication for centralized user management and
access control.
6. Evaluate the advantages and disadvantages of using AAA authentication compared to
other authentication methods.
7. Design a AAA authentication configuration that utilizes both local and remote
authentication methods.
8. What are the three components of AAA authentication?
9. What is the purpose of the authentication server in AAA authentication?
10. How does AAA authentication handle user authentication requests from network devices?
11. Configure a Cisco switch to use TACACS+ authentication for administrative access.
12. Explain the process of AAA authentication when multiple authentication methods are
configured.
13. Assess the significance of proper AAA authentication configuration for network security
and access control.
14. Create a AAA authentication configuration that allows users to authenticate using both
local accounts and Active Directory credentials.
15. What are the primary differences between RADIUS and TACACS+ in AAA authentication?
16. What is the purpose of the authorization server in AAA authentication?
17. How does AAA authentication provide granular access control based on user roles and
privileges?
18. Configure AAA authentication to require multi-factor authentication for specific user
accounts.
19. Discuss the potential impact of a misconfigured AAA authentication configuration on
network access.
20. Evaluate the scalability and performance considerations of using AAA authentication in
large network environments.
21. Design a AAA authentication configuration that utilizes certificate-based authentication for
wireless network access.
22. What is the purpose of the accounting server in AAA authentication?
23. What types of information can be collected through AAA accounting?
24. How does AAA authentication contribute to auditing and compliance requirements in
network environments?
25. Configure AAA accounting to log user activity for a specific network device.
26. Explain the role of AAA authentication in preventing unauthorized access to network
resources.
27. Assess the impact of a compromised authentication server on network security.
28. Create a AAA authentication configuration that allows users to authenticate using biometric
credentials.
29. What are the different methods of implementing AAA authentication in Cisco devices?
BRAINWARE UNIVERSITY
NAT
CLASS NOTES
Q.8. What are Inside Local, Inside Global, Outside Local, Outside Global address?
An Inside local address is an IP address of host before
translation. Inside Global address is the public IP address
of host after translation.
Outside Local address is the address of router interface
connected to ISP. Outside Global address is the address of the
outside destination.
PAT (Port Address Translation) - Port Address Translation (PAT) is another type of
dynamic NAT which can map multiple private IP addresses to a single public IP
address by using a technology known as Port Address Translation.
Here when a client from inside network communicate to a host in the internet, the router
changes the source port (TCP or UDP) number with another port number. These port
mappings are kept in a table. When the router receive from internet, it will refer the table
which keep the port mappings and forward the data packet to the original sender.
MCQ
1. What is Network Address Translation (NAT)?
2. What is the purpose of Network Address Translation (NAT) in a network?
3. Which layer of the OSI model does NAT operate at?
4. What is the difference between static NAT and dynamic NAT?
5. How does Network Address Translation (NAT) help conserve IPv4 address space?
6. Which type of NAT allows multiple devices on an internal network to share a single
public IP address?
7. What is the difference between source NAT and destination NAT?
8. What is a NAT translation table?
9. Which NAT mechanism allows devices behind a NAT device to establish connections
with external devices?
10. What is the purpose of NAT overload?
11. What is the difference between NAT and PAT?
12. What is the purpose of NAT traversal?
13. What are the benefits of using NAT for security purposes?
14. What is a NAT translation error?
15. Which command is used to configure static NAT on a Cisco router?
16. Which NAT mechanism is used for mapping a range of internal IP addresses to a
range of public IP addresses?
17. Which statement accurately describes NAT overload?
18. Which type of NAT allows traffic initiated from the internal network to flow out to the
internet but prevents unsolicited inbound traffic?
19. What is the purpose of NAT in load balancing scenarios?
20. What is the purpose of NAT in high availability scenarios?
21. What is the purpose of NAT in VPN connections?
22. What is the difference between inside local, inside global, outside local, and outside
global addresses in NAT?
23. What is the purpose of NAT reflection?
24. What are the limitations of using NAT in a network environment?
25. What is a NAT translation error?
26. What is the purpose of NAT traversal?
27. What is the purpose of a NAT gateway?
28. What is the difference between static NAT and dynamic NAT?
29. What is the purpose of NAT in a network?
30. Which statement accurately describes PAT (Port Address Translation)?
31. What is the purpose of NAT in load balancing scenarios?
32. What is the purpose of NAT in VPN connections?
Cisco Access Control Lists (ACLs) are used in nearly all product lines for several purposes, including
filtering packets (data traffic) as it crosses from an inbound port to an outbound port on a router or
switch, defining classes of traffic, and restricting access to devices or services. Knowing how to
design, configure, and troubleshoot
ACLsisrequiredforallnetworkengineersworkingwithina Cisconetwork.
Objectives:-
The objective is to provide a fundamental explanation of Cisco ACLs with the following topics:
1. An analogy aboutfiltering
2. The uses of ACLs
3. Types of ACLs, operations and best practices
4. Wildcard Masks
5. Configuring named ACLs with examples
6. Monitoring ACLs
Use of ACLs:-
BRAINWARE UNIVERSITY
The graphic further clarifies the idea. It is the company’s policy that not all traffic from the computer
on the left will be allowed to exit the router via the interface on the right. Virtually all companies
have detailed security policy (orshould have one) and the policy is followed to implement
proper filtering.
One of the two major reasons to use ACLs in a Cisco network is to either filter traffic going
through the router or switch, or traffic to and from the device. The other reason is to classify traffic
for access to services or to trigger an event.
As the graphic shows, a good place for a filter is between the enterprise network and the Internet.
An entire range of firewalling technologies exist here, and ACLs are one tool.
BRAINWARE UNIVERSITY
The graphic illustrates three more uses of ACLs to classify traffic (IP addresses) for specific purposes. For
example, filtering can be used to identify the traffic which is allowed to traverse a virtual private
network (VPN), andthe block of IP addresses to be translated by the network address translation
(NAT) process.
Also, routers and multi-layer switches run dynamic routing protocols such as Open Shortest Path First
(OSPF) and Enhanced Interior Gateway Protocol (EIGRP) to exchange lists of reachable IP networks.
These updates can be filtered with ACLs to limit the number of IP addresses in the list of routes
learned.
Types of ACL:-
As the name implies, Extended Access Lists use a much more detailed list of match criteria,
including source IP address, destination IP address, protocol type field in the IP header, TCP/UDP
port number, and additional criteria such as time range.
For both types, the wildcard mask identifies a “range” or block of addresses or a specific host.
Cisco ACLs may be numbered or named. A range of numbers for each type of list has been defined by
Cisco, and numbered ACLs have been used for years. The named access list is more convenient
and easier to edit. The operation of each is identical. Named access lists are recommended for
engineers learning ACLs for the first time. Configuration syntax will be covered later.
The graphic shows router logic in checking for the existence of and using an outbound ACL. One
thing to note with an outbound list is that the router has already expended the resources to route
the packet before the permit/deny logic is applied to the packet. If the ACL is inbound, the
permit/deny logic is applied before the routing process occurs.
BRAINWARE UNIVERSITY
Each line in the list is processed in top-down order. As soon as a match for either permit or deny
happens, the required action is taken and the list processing stops. That is why it is so important to
permit or deny specific itemssuch as hosts before permitting ordenying entire subnets or larger
address blocks.
SAQ