Chapter 34 - Securing Network Devices Flashcards
What command can you use to encrypt passwords that are currently stored in the router as plain text?
‘service password-encryption’
- This only encrypts passwords and not secrets as secrets are already encrypted
When using the ‘enable secret <secret>' command, what is the encryption level set to by default?</secret>
5
When using the ‘service password-encryption’ command, what is the encryption level set to?
7
True or False. Entering ‘enable secret <secret>' and 'enable secret 5 <secret>' will do the same thing.</secret></secret>
False.
- When using ‘enable secret <secret>' you can enter the clear-text version of a password and login with the clear-text version</secret>
- When using ‘enable secret 5 <secret>' you must enter the MD5 encrypted version of your password and then to login you can use the unencrypted version. The password you enter after the 5 is the encrypted version of your actual password.</secret>
For example, entering ‘$1$mERr$YlCkLMcTYWwkF1Ccndtll.’ as the secret will allow you to login with secret ‘Cisco’.
What is the encryption level for clear-text passwords and secrets?
0
True or False. After using the ‘no service password-encryption’ command on an encrypted password it will automatically decrypt the password into its clear-text state.
False. You need to enter a new password which will be created as clear-text.
True or False. ‘enable secret’ overrides ‘enable password’
True. If both are enabled use the secret.
True or False. It is best practice to use ‘enable secret’ rather than ‘enable password’.
True. Secret is encrypted by default and therefore much more secure.
What are the 2 more secure algorithm types on newer Cisco IOS versions?
- Type 8 - SHA-256 - ‘enable algorithm-type sha256 secret <secret>'</secret>
- Type 9 - Scrypt (uses SHA-256) - ‘enable algorithm-type scrypt secret <secret>'</secret>
These can also be used with the username command to create a more secure user login. Just swap ‘enable…’ for ‘username name…’
What command could you use to deny certain addresses from accessing a Cisco device?
Create an access-list for the specific addresses and then enable it per vty or console line using the below command from line configuration mode:
- ‘access-class <ACL> in'
- You can also add 'out' at the end to stop users from using the 'telnet' or 'ssh' commands to access other devices from the console of this router. However it bases this decision on the destination address rather than the source.</ACL>
What are some of the benefits of dedicated firewalls over router ACLs?
- Firewalls can inspect application layer data and connections to know what additional TCP and UDP ports are used by said connections and filter based on those.
- Firewalls can inspect traffic so thoroughly that it can filter based on the URI of a HTTP request.
- Firewalls (stateful) can keep state information by storing information about each packet and make decisions about filtering future packets in the same connection based on the historical state information. Cisco router ACLs are generally speaking stateless.
What is an example of a stateful firewall being a security benefit over a stateless firewall?
- Stateful firewalls could assist when it comes to DOS attacks.
- They would have historical state information so they could see that a large amount of TCP connections have come from a particular address or small number of devices (characteristic of a DOS attack)
- However, in a stateless firewall it would not have this historical information so could not filter in this way.
What is a Security Zone?
- Allows to define security rules based on where the connection comes from and add interfaces to define which rules apply to them.
- For example, you may have a security zone for the internal network and one for the internet. Your internet facing interfaces would be put in the internet security zone and have different rules applied compared to those on internal interfaces.
- You may allow new connections from internal to internet but not from internet to internal.
What is a DMZ?
- De-Militarised Zone
- Used for devices that need to be accessible from outside your network (e.g. Web servers)
What is an IPS?
- Intrusion Prevention System
- Has a database of known potential exploits and characteristics of them
- Monitors traffic for these characteristics to stop exploits (e.g. DoS, DDoS, Worms, Viruses)
- Generally uses rules defined by the IPS vendor rather than the company or its engineers