Network Security Flashcards
What are the two categories of control plane security controls:
signaling protection (routing protocol authC and STP)
control plane processes protection
Which devices support MPP (management plane protection)?
Routers and switches
Which Cisco devices do not support TACACS+?
NGFW, WSA, ESA
Cisco offers centralized operational tools to simplify and help you manage your network security deployment. What are some?
These tools include Cisco Security Manager, Firepower Management Center (FMC), Cisco Content Security Management Appliance (SMA), Cisco Defense Orchestrator, and Cisco Configuration Professional (CCP) for Catalyst.
What are some signs a network device has been compromised?
The signs of a compromise in a network can take many forms, including network devices that are exfiltrating data, forwarding packets to unexpected destinations, sending unrequested ICMP replies, and more
What are the steps in the process of protecting and monitoring infrastructure devices?
Harden devices.
Instrument the network. Establish a baseline. Analyze deviations from the baseline.
The routed control plane shares the CPU of the main router with two other groups of processes:
The management processes, which provide device management functions.
The slow data path processes (process switching or the Cisco Express Forwarding process path), which manage traffic that cannot be managed by the fast data path. (The fast path consists of interrupt switching functions of Cisco Express Forwarding, or hardware-assisted forwarding.)
Where are infrastructure ACLs typically applied?
input direction at all the network edge routers
Which Cisco IOS tool does CoPP use to protect the router CPU?
Modular QoS CLI (MQC)
How does CPPr work?
CPPr extends the CoPP functionality by automatically classifying all CPU-bound traffic into three queues (or subinterfaces) under the aggregate control plane interface. Each subinterface receives and processes a specific type of CPU-bound traffic, and each subinterface has a separate traffic policy that is attached to it, which makes the limit configuration easier.
What are the steps to configure CPPr?
Create traffic classes that describe valid control plane traffic. You can configure as many traffic classes as you need, depending on the required granularity of your policy.
Create a traffic policy that will permit, deny, or rate-limit the configured traffic classes and therefore conserve process layer resources, or even act as a device firewall by hiding most device resources from the network. Apply the configured traffic policy to a required CPPr subinterface.
What are the three control plane subinterfaces that are automatically created by control plane protection?
Host, Cisco Express Forwarding-exception subinterface, transit
Which two secure authentication types can be used with OSPF authentication on Cisco IOS routers?
MD5 & SHA
Which Cisco IOS command applies the CPPr policy to the host subinterface?
Service-policy
Routing processes run in which network device plane?
Control Plane