Home » Security

Transparent IOS Firewall

Scenario: You are part of the security team for the Rotterdam Harbor located in The Netherlands. One of your firewalls has crashed and due to decreased IT budgets you don’t have any spare firewalls around. You do have…

Read More »

ACL Selective IP Options Drop

Scenario: You are the security office for the national security team in the Netherlands. One of your routers has a very high CPU load and after looking closely you can see it’s spending a lot of cycles processing…

Read More »

Control Plane Policing

Scenario: You are the security office for the national security team in the Netherlands. Recently you did everything in order to protect the data plane of your routers. The only you haven’t done yet is securing the control…

Read More »

IP Traffic Export

Scenario: You work for a local copyshop in a small town in the USA. To improve network security you have installed a new Intrusion Detection System (IDS) but right now it’s only receiving traffic from router Ditto. You…

Read More »

IP Source Tracker

Scenario: You are the security office for the national security team in the Netherlands. It seems your webserver is under attack but you are unsure where the attacker is located. You want to use a method to track…

Read More »

Role Based CLI Access

Scenario: As the security specialist for your company you want to ensure employees don’t get more access than they need to. At this moment everyone is logging in using privilege level 15 for your routers and you want…

Read More »

IOS Login Enhancements

Scenario: You are the security office for the national security team in the Netherlands. One of your colleagues demonstrated you how to perform a dictionary attack on the VTY of one of your routers. You read about the…

Read More »

TCP Intercept Watch Mode

Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…

Read More »

TCP Intercept

Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…

Read More »

Unicast Reverse Path Forwarding (URPF)

Scenario: As part of the security team you are always looking for ways to improve security within the company. Recently you are being plagued by different sources sending spoofed IP packets. You want to protect your network by…

Read More »