Infrastructure Security Flashcards
a command-line facility that implements security measures across all three of the planes
auto secure
- Specific sub-interfaces classification
- handles traffic to one of the physical or logical interface of the router
host sub-interface
Specific sub-interfaces classification
-handles certain data plane traffic that requires CPU intervention before forwarding(such as IP Options)
transit sub-interface
Specific sub-interfaces classification
Exception traffic such as keep-alives or packets with time to live
CEF-Exception sub-interface
Syslog Levels
0 - Emergencies - System is unsuable 1 - Alerts - Immediate Action is needed 2 - Critical 3 - Error 4 - Warnings 5 - Notifications 6 - Informational 7 - Debugging
commands to secure boot image
secure boot-image
Threats to Both Ipv4 and ipv6
-an attacker is using a network service in an unexpected or malicious way. To protect againts this, you can place filters to allow only the required protocols through network
Application layer attacks
Threats to Both Ipv4 and ipv6
Individuals not authorized for access are gaining access to network resources. To protect against this, use AAA service to challenge the user.
Unauthorized Access
Threats to Both Ipv4 and ipv6
Someone or something is between the two devices who believe they are communicating directly with each other. You can prevent this by implement dynamic arp inspectiong (DAI) and spanning tree protocol guards (STP)
Man-in-the-middle
Threats to Both Ipv4 and ipv6
An attacker is listening in on the network traffic of others. This could be done where the attacker has implemented a content-addressable memory (CAM) table overflow. To protect against this you can use port-security.
Snipping or eavesdropping
Threats to Both Ipv4 and ipv6
Making services that should be available to user unavailable. Performing packet inspection and rate limiting can help mitigate
Denial of Service (DOS)
Threats to Both Ipv4 and ipv6
Forge addressing or packet content. Filtering traffic that is attempting to enter the network is one of the best first steps to mitigate this type of traffic.
Spoofed packets
New potential risk with Ipv6
Network Discovery protocol (NDP) Neighbour cache resource starvation DHCPv6 Hop-by-hop extension headers Packet amplification attacks ICMPv6 Tunneling options Autoconfigurations Dual Stacks Bugs in code
IPV6 Best practices
Filter bogus addresses Filter nonlocal multicast addresses Filter ICMPv6 that is not needed Drop routing header type 0 packets use manual tunnels rather than automatic tunnels Protect IPV6 rouge devices Secure Neighbor Discovery (SeND) in IPV6
Mechanism to prevent spoofing of IPV6 addresses
IPv6 first-hop security binding table IPv6 device tracking IPv6 port-based access list support IPv6 RA guard IPV6 ND inspection