Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
14 October 2024

CCNA Super Study Guide: Section 5

by C. Casquatch

Space to dump notes for CCNA

End goal is to obtain a CCNA certificate from Cisco and maybe learn networking

Utilities Used

Environments Used

CCNA 200-301 Exam Notes: 5.0 Security Fundamentals

===========================

5.1 Define Key Security Concepts

Key security concepts include:

Malware

Malware is malicious software, including:

Evolution of a Targeted Attack

  1. External reconnaissance
  2. Initial compromise
  3. Escalation of privileges
  4. Internal reconnaissance
  5. Further compromise
  6. Further privilege escalation
  7. End goal

Common Attacks

Reconnaissance

Gathering information about the target, often using methods like:

Social Engineering

Manipulating individuals into revealing confidential information through deception.

Phishing

A social engineering attack where attackers impersonate reputable entities to steal sensitive information.

Data Exfiltration

Unauthorized transfer of data out of an organization, either maliciously or accidentally.

Denial of Service (DoS)

Flooding a target system with excessive traffic, preventing legitimate access.

TCP SYN Flood Attack: Exploits the TCP handshake by sending SYN requests without completing the handshake.

Distributed Denial of Service (DDoS)

A DoS attack from multiple sources, often using a botnet.

Spoofing

Faking an identity, such as IP or MAC address spoofing, or rogue application servers.

Reflection and Amplification Attacks

Sending spoofed requests to elicit large responses, overwhelming the victim with traffic.

Man-in-the-Middle (MITM) Attacks

Intercepting and potentially modifying communication between two legitimate hosts.

Password Attacks

Techniques like guessing, brute force, and dictionary attacks to gain unauthorized access.

Buffer Overflow Attacks

Sending excessive or malformed data to a system, causing it to crash or become compromised.

Mitigation Techniques

General Techniques

Specific Mitigations

Reconnaissance and Social Engineering

Mitigate low-tech attacks through staff security awareness, policies, and procedures.


5.2 Describe security program elements (user awareness, training, and physical access control)

1. User Awareness

Definition: User awareness programs educate employees and users about security threats, best practices, and their role in maintaining security within an organization.

Key Components:

Best Practices:

2. Training

Definition: Security training equips employees with the necessary knowledge and skills to handle security challenges effectively.

Key Objectives:

Types of Training:

Best Practices:

3. Physical Access Control

Definition: Physical access control involves implementing measures to restrict unauthorized individuals from accessing physical assets, such as buildings, data centers, and sensitive equipment.

Key Methods:

Best Practices:

By understanding and implementing these elements, organizations can build a robust security program that mitigates risks and protects assets effectively.


5.3 Configure and Verify Device Access Control Using Local Passwords ====================================================================

Overview of Device Access Control

Access Points for Local Password Control

Configuring Local Passwords

Steps for Configuration:

  1. Console Access:

    line console 0 password login

  2. VTY Lines:

    line vty 0 4 password login

  3. Enable Secret Password:

    enable secret

Password Verification

  1. Console Login: Connect physically and verify the password prompt.
  2. VTY Access: Use SSH or Telnet:

    ssh @

    Verify the correct password prompt.

  3. Privilege Mode Password: Enter privileged EXEC mode with enable and confirm the enable secret/password prompt.

Encrypting Local Passwords

By default, passwords are stored in plaintext. To encrypt them, use:

service password-encryption

This enables Type 7 encryption (weak, but better than plaintext).

Best Practices for Local Passwords

Common Issues and Troubleshooting

Key Takeaways


5.4 Security Password Policies

1. Password Management

Password management ensures secure handling of passwords throughout their lifecycle, reducing the risk of compromise.

Key Elements:

Implementation in Networking Devices:

username secret

2. Password Complexity

Complexity rules make passwords harder to guess, protecting against brute-force and dictionary attacks.

Best Practices for Password Complexity:

Implementation in Networking Devices:

Configure device login policies to enforce complexity (where supported).

3. Password Alternatives

Password alternatives enhance security by supplementing or replacing traditional passwords.

3.a Multifactor Authentication (MFA):

3.b Certificates:

3.c Biometrics:

4. Combining Passwords with Alternatives

A hybrid approach increases security:

5. Security Policies for Password Alternatives

6. Comparison of Methods

Compare security methods based on deployment, scalability, and effectiveness.

7. Verification Commands

8. Best Practices


5.5 IPsec Remote Access and Site-to-Site VPNs

Site-to-Site VPN Options

Cisco Example – Cisco AnyConnect Secure Mobility Client

The Cisco AnyConnect Secure Mobility Client is a remote access VPN application that uses the ASA firewall and TLS (Transport Layer Security).

Tunneling Options:


5.6 Configure and Verify Access Control Lists

1. Overview of Access Control Lists (ACLs)

2. Structure of an ACL

Each ACL contains one or more access control entries (ACEs), also known as rules. ACLs are processed sequentially, starting from the top. A default implicit deny is applied if no rules match the traffic.

3. ACL Configuration Steps

  1. Step 1: Create an ACL

    Define the rules to permit or deny traffic.

    Standard ACL Syntax:

    access-list {permit | deny} \[wildcard-mask\]

    Example:

    access-list 10 permit 192.168.1.0 0.0.0.255

    Extended ACL Syntax:

    access-list {permit | deny} \[wildcard-mask\] \[wildcard-mask\] \[eq \]

    Example:

    access-list 110 permit tcp 192.168.1.0 0.0.0.255 10.1.1.0 0.0.0.255 eq 443

  2. Step 2: Apply the ACL to an Interface

    ACLs must be applied to an interface for them to take effect.

    ip access-group {in | out}

    Example:

    interface GigabitEthernet0/1

    ip access-group 10 in

4. Verification of ACLs

5. Wildcard Masks

Wildcard masks determine which bits of an IP address are significant. Formula: Wildcard mask = Inverted subnet mask.

Examples:

Shortcut:

6. Types of Traffic Controlled by ACLs

7. Extended ACL Protocol and Port Matching

Protocols: Common ones include ip, tcp, udp, icmp, and ipx.

Ports: Specify a service by port number or name (e.g., 80 or http).

8. Named ACLs

Named ACLs allow using descriptive names instead of numbers.

Syntax:

ip access-list {standard extended}

Add rules:

{permit deny} \[eq \]

Example:

ip access-list extended Block_HTTP

deny tcp any any eq 80

permit ip any any

Apply the ACL:

interface GigabitEthernet0/1

ip access-group Block_HTTP in

9. Best Practices

10. Common Issues and Troubleshooting


5.7 Configure and Verify Layer 2 Security Features (DHCP Snooping, Dynamic ARP Inspection, and Port Security)

Layer 2 Security Features

Layer 2 security features are essential for protecting against attacks that target vulnerabilities at the data link layer of the OSI model. These attacks can involve DHCP, ARP, and port security issues.

1. DHCP Snooping

2. Dynamic ARP Inspection (DAI)

3. Port Security

4. Best Practices for Layer 2 Security

5. Troubleshooting Layer 2 Security

6. Summary


5.8 Compare Authentication, Authorization, and Accounting Concepts

1. Overview of AAA: Authentication, Authorization, and Accounting

AAA is a security framework used to control access to network resources. It provides mechanisms for verifying identity, determining access rights, and tracking user activities. AAA is often implemented using protocols such as RADIUS or TACACS+.

2. Authentication

Definition: The process of verifying the identity of a user, device, or application attempting to access the network.

Purpose: Ensures that only authorized users or devices can access the network.

Authentication Methods:

Key Components:

3. Authorization

Definition: The process of granting or denying access to resources based on the authenticated user’s permissions.

Purpose: Ensures users only access resources they are allowed to.

Authorization Elements:

How It Works:

  1. After authentication, the system evaluates the user’s access policies.
  2. The system grants or denies resource access based on the user’s role, group, or policy.

4. Accounting

Definition: The process of tracking user activities and network resource usage.

Purpose: Provides visibility into who accessed what, when, and how.

Accounting Functions:

Accounting Benefits:

5. Key Differences Between Authentication, Authorization, and Accounting

Authentication verifies identity, Authorization determines access rights, and Accounting tracks activities. Together, they form a complete security framework.

6. Implementation in Networks

AAA Protocols:

Implementation Examples:

7. Benefits of AAA

8. Summary

Authentication: Verifies identity (e.g., password login).

Authorization: Determines access rights (e.g., admin privileges).

Accounting: Tracks activities (e.g., session logs).

Together, these elements form a comprehensive framework for network security and access control.


5.9 Describe Wireless Security Protocols (WPA, WPA2, and WPA3)

1. Overview of Wireless Security Protocols

Wireless security protocols protect wireless networks by encrypting data and controlling access. They prevent unauthorized access and eavesdropping on wireless communications. The main protocols include:

2. WPA (Wi-Fi Protected Access)

Introduced: 2003 as a replacement for WEP (Wired Equivalent Privacy).

Encryption: Uses TKIP (Temporal Key Integrity Protocol).

Features:

Drawbacks:

3. WPA2 (Wi-Fi Protected Access 2)

Introduced: 2004 as an improvement over WPA.

Encryption: Uses AES (Advanced Encryption Standard) with CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).

Features:

Drawbacks:

4. WPA3 (Wi-Fi Protected Access 3)

Introduced: 2018 to address WPA2 vulnerabilities and adapt to modern security needs.

Encryption: Uses GCMP-256 (Galois/Counter Mode Protocol) and SAE (Simultaneous Authentication of Equals).

Features:

Benefits:

5. Key Differences Between WPA, WPA2, and WPA3

The primary differences are in the encryption methods, security features, and protection against modern threats. WPA3 offers the strongest security, with improved encryption and authentication methods.

6. WPA3 Transition and Coexistence

7. Summary and Best Practices

Key Recommendations:

Use Cases:


5.10 Configure and Verify WLAN within the GUI using WPA2 PSK

1. Overview

Configuring a Wireless Local Area Network (WLAN) with WPA2-PSK (Pre-Shared Key) involves setting up secure access to a wireless network using a shared password. The configuration is often done through the Graphical User Interface (GUI) of a wireless access point (AP) or wireless router.

2. Steps to Configure WLAN Using WPA2-PSK in the GUI

Step 1: Log In to the Wireless Device’s GUI

Step 2: Navigate to the Wireless Settings

Step 3: Configure the Basic Wireless Settings

Step 4: Enable WPA2-PSK Security

Step 5: Save and Apply Settings

3. Verifying WLAN Configuration

Step 1: Connect to the WLAN

Step 2: Test Connectivity

Step 3: Check Client Information in the GUI

4. Best Practices for WLAN Configuration with WPA2-PSK

5. Troubleshooting Tips

6. Summary

WPA2-PSK remains a widely used and effective method for securing home and small business wireless networks.

tags: ccna - study - cisco