Term
What solutions are provided by the Traffic Anomaly Detector with Guard XT for DDoS mitigation? |
|
Definition
Detecting DDoS Attack
Diverting traffic directed at victim to a Cisco appliance for treatment
Analyzing & filtering bad traffic flows from good traffic flows and forwarding only good flows. |
|
|
Term
What does the Traffic Anomaly Detector & Guard XT do during normal operation/startup? |
|
Definition
Learns normal traffic pattern for a protected network area or zone.
Establishes network traffic baseline
Construct DDoS mitigation policies and thresholds. |
|
|
Term
How does Guard XT divert traffic from a DDoS attack? |
|
Definition
Typically by updating BGP routing table, static routes, and policy-based routes. |
|
|
Term
What is the goal of NAC?
What prerequisite application does it require? |
|
Definition
Network Admission Control
(also Cisco Clean Access)
Ensure all devices accessing network resources are adequately protected from network security threats.
Enforce compliance to security policies for devices.
Requires ACS |
|
|
Term
|
Definition
1. Device attempting network connection requests a security profile of endpoint device
2. Profile info compared to network security policy
3. NAC will permit, deny, or restrict access by redirecting to less exposed network segment; can also quarantine non-compliant devices |
|
|
Term
What are the NAC user roles and their characteristics? |
|
Definition
1. unauthenticated - default system role for unauth. users; web login users placed here while network scanning is being performed
2. normal login - authenticated users
3. client posture assessment:
3a. agent temporary - agent users when requirements are still being checked
3b. quarantine - placed here when network scanning detects vulnerabilities
|
|
|
Term
What are the characteristics of Cisco ASDM? |
|
Definition
Adaptive Security Device Manager
Standalone or java based applet
Tool to setup, config, monitor the ASA
Installed as separate software image on the appliance and stored in flash of all FW (post 7.0) |
|
|
Term
What is the purpose and capabilities of CSM? |
|
Definition
Cisco Security Manager
Used to configure security devices (up to 5000)
- configure ACL rules for multiple interfaces/devices
- sharing policy between multiple devices
- analysis on ACL rules
- place & configure devices on toplogy map |
|
|
Term
What are the characteristics of Cat6k IDSM? |
|
Definition
Intrusion Detection Services Module
Switching module on Cat6k; part of Cisco IDS
- captures network packets on VACL or SPAN port
- reassembles and compares against signatures
- generates alarms through the backplane to IDS Director or CSPM
|
|
|
Term
What are the characteristics of FWSM? |
|
Definition
Firewall Services Module
Card on Cat6k; high performance FW solution
Secures traffic flowing between multiple VLANs on network.
integrates FW functionality and switching |
|
|
Term
What are the three deployment scenarios for FWSM? |
|
Definition
MSFC as inside router
MSFC as outside router
MSFC not directly connected to FWSM |
|
|
Term
What are the capabilities of MARS? |
|
Definition
Monitoring, Analysis, and Response System
Security monitoring for security devices and host applications
Supports event aggregation, device discovery, compliance reporting, notifications
Assists in analysis/response of threats on network |
|
|
Term
What are the features available when integrating CSM + MARS |
|
Definition
policy lookup : map syslogs to FW/signature policy on CSM which triggered syslog
CSM can implement suggestions made by MARS (eg. blocking, shunning) |
|
|
Term
What does CSA provide security for?
How does it basically work? |
|
Definition
Cisco Security Agent
Protects servers and PCs
Works on set of predefined rules/policies
Management center monitors behavior of hosts |
|
|
Term
What are some of the general preventive measures that CSA offer and what attacks do they block?
(Hint: 5 P's) |
|
Definition
Prevents port scanning & pinging (probing)
Prevents mail attachments running any applications that can compromise the system (penetration)
Prevents file creation/modification (persist/paralyze)
Prevents hosts from sending malicious traffic to network (propagate) |
|
|
Term
What are CSA policies composed of? |
|
Definition
Collection of (multiple) rule modules
Each rule module is a container for a collection of rules |
|
|
Term
What is the purpose and characteristics of the Audit Mode when configuring CSA policies? |
|
Definition
Audit Mode policies are not "live" - will allow all actions bug instead log actions that should have been denied/queried
Used for testing/observing the effects of a policy before making it live. |
|
|
Term
What are the characteristics of preconfigured policies on CSA? |
|
Definition
Can be used as is.
Should NOT be edited (though technically possible)
Instead - should be cloned & edited, or a new similar policy created. |
|
|
Term
What are the characteristics of CSA system state conditions?
When multiple states are configured, how is the trigger determined? |
|
Definition
If statements that trigger conditional rules.
If multiple states configured, all conditions need to be met to trigger the conditional rule. |
|
|
Term
What are some of the specific attacks that CSA protects against or monitors on end users (browsers and OS)? |
|
Definition
Cookies
Browser Helper Objects
Browser Plug-in
Keylogger
NMS Tools
Remote Install tools
Trojan/virus/worms |
|
|
Term
What are the characteristics of Cisco IOS IPS? |
|
Definition
Cisco IOS Intrusion Prevention System
Functions as inline IPS sensor that can be enabled bi-directionally on routers
|
|
|
Term
How does IPS sensors process ACLs?
Which ACLs does it incorporate by default at startup? |
|
Definition
IPS acts on the first line that is matches and does not check further.
At startup, the sensor creates interface ACL of:
1. permit line for IP of the sensor itself
2. all lines of the pre-block ACL
3. deny line for each IP blocked by sensor
4. all lines of post-block ACL |
|
|
Term
What is the general usage and characteristics of pre-block and post-block ACLs on an IPS sensor? |
|
Definition
Pre-Block ACL: Used for permitting what should never be blocked by other ACLs. Overrides deny lines in other ACLs
Post-Block ACL: Used for additional block/permit on the same interface/direction; replaces the default "permit ip any any" at the end of new ACLs. |
|
|
Term
What are the characteristics of an IPS sensor in promiscuous mode?
What are the pros/cons? |
|
Definition
Sensor analyzes copy of all traffic.
Pro: Does not affect latency of traffic flow thru sensor
Con: Post-even responses rely on config changes to other devices (routers/FW) to stop attack; does not catch atomic attacks |
|
|
Term
What are the characteristics of an IPS sensor in inline mode?
What are the pros/cons? |
|
Definition
IPS resides directly in traffic flow
Pro: Sensor able to immediatly drop malicious traffic when sensed; L3/4-7 deep inspection performed
Con: Adds latency to all packets/traffic thru sensor |
|
|
Term
How are IPS signatures loaded/where do they come from? |
|
Definition
IOS IPS has a default set of built-in signatures as part of IOS, assuming post 12.3(8)T
Otherwise, signatures are downloaded in sdf file and saved to flash. Updated sdf files are published on cisco.com |
|
|
Term
When an IPS signature fires, what are the possible actions that can be triggered? |
|
Definition
Generate alert or verbose alert
Log pair/victim/attacker packets
Reset TCP connection
Deny attacker/connection/packet inline
Request for: SNMP Trap, block conn., block host |
|
|
Term
What is the purpose of the IPS command
"ip ips deny-action ips-interface" |
|
Definition
Creates ACl filter for denying connection/flow inline
Action applied on ips interface instead of ingress interface (which is default for ACL filters) |
|
|
Term
What are some of the new features of IPS 5.0 compared to IPS 4.0? |
|
Definition
application layer inspection, fragmentation
MPLS/IPv6/DEP support, more checks for HTTP
monitoring using SNMP instead of syslog
IDM using java instead of HTML
ASDM support
|
|
|
Term
|
Definition
|
|
Term
What are the security capabilities of netflow? |
|
Definition
Identifies and classifies DDOS attacks, viruses and worms in real-time.
Capture changes/anomalies in network behavior (and forward to security/management application). Forensic tool to understand and replay the history of security incidents. |
|
|
Term
What are the general characteristics of Cisco Secure Desktop?
What are its major security features? |
|
Definition
Multifunctional component of the Cisco SSL VPN solution. Secures webhosts against attacks from SSL connections.
Host scan
Secure Desktop (Vault)
Cache cleaner
Keystroke logger detection
Host emulation detection
|
|
|
Term
In Cisco Secure Desktop, what are the purposes of the Host Scan and Secure Desktop/Vault features? |
|
Definition
Host scan - Checks for watermarks on remote computers attempting to open (client or clientless) session to see if they are company owned.
Secure Desktop (Vault) - Encrypts data/files associated with or downloaded during remote session to secure partition; to be wiped when the session ends. |
|
|