Day 20 - LAN Security & Device Hardening Flashcards
What are the two content security appliance products Cisco offers?
Cisco Email Security Appliance (ESA)
Cisco Web Security Appliance (WSA)
Endpoints are best protected by what host based Cisco product?
Cisco Advanced Malware Protection (AMP)
This is a Cisco proprietary special device designed to monitor email’s primary protocol, SMTP
ESA (Email Security Appliance)
This Cisco proprietary device can block known threats, remediate against stealth malware that evades initial detection, discard emails with bad links, block access to newly infected sites and encrypt content in outgoing email to prevent data loss
ESA (Email Security Appliance)
This Cisco proprietary device combines advanced malware protection, application visibility and control, acceptable use policy controls, and reporting
WSA (Web Security Appliance)
What can the Cisco WSA perform?
Blacklisting of URLs
URL filtering
Malware scanning
URL categorization
Web app filtering
Encryption and decryption of traffic
What is the issue with this bit of command?
R1(config)#line vty 0 4
R1(config-line)#password ci5c0
R1(config-line)#login
The password will be in plaintext and there is no accountability to who has logged in
This command requires the use of a username/password pair on vty, console and aux ports
login local
What are the correct commands to set up a username/password secret and have it be required to login and have access to the console and vty lines?
username {username} secret {secret}
line con 0
login local
no password
line vty 0 15
login local
no password
This protocol uses plaintext, insecure transmission of both the login and data across the connection
Telnet (port 23)
This protocol is more secure over Telnet
SSH (port 22)
Why is SSH more secure over Telnet?
Required username and password, both of which are encrypted during transmission
Username and password can be auth’d using the local database method
Username is recorded when a user logs in leading to accountability
What command would you use to verify SSH?
show ip ssh
What commands would you use to set up SSH for the domain cisco.com with a username/secret pair for lines VTY 0 15?
ip domain cisco.com
crypto key generate rsa
1024 (bits in the modulus)
line vty 0 15
login local
transport input ssh
username hmolinar secret cisco
How would you remove the RSA key pair?
crypto key zeroize rsa
What is the minimum modulus size that Cisco recommends?
1024
Router interfaces must be activated with what command?
no shutdown
True or False:
With Cisco switches, an interface is activated when a device is connected to the port
True
What are some security best practices for unused interface on Cisco devices?
Perform the commands on int fa0/1
Administratively disable unused ports
Prevent VLAN trunking by putting the port into switchport mode access
Assign the port to an unused VLAN
Change the native VLAN from VLAN 1 to an unused custom VLAN
int fa0/1
shut
sw acc mode
sw acc vlan 999
sw trunk native vlan 999
What commands would you use to create a black hole VLAN and apply it to a range of interfaces fa0/20 to fa0/24?
vlan 999
name BlackHole
int range fa0/20 - 24
shut
switchport mode acc
switchport acc vlan 999
What Cisco framework helps secure device access?
AAA
Authentication, authorization and accounting
What two AAA authentication methods does Cisco support?
TACACS+
RADIUS