Home » Security

Policy Based Routing Traffic Filtering

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »

IP Fragment Filtering

Scenario: As part of the security team you are always looking for ways to improve security within the company. You heard bad things about fragmented IP packets being a security risk to your network. You decide to block…

Read More »

Reflexive Access-List

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »

AAA Command Authorization

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »

AAA Exec Authorization

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…

Read More »

AAA Authentication

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…

Read More »

Time Based Access-List

Scenario: As the owner of a large swiss watch company you would like to make sure your employees are unable to browse the Internet during working hours. Time is money so it’s time to find a solution… Goal:…

Read More »

Dynamic Access List – Lock and Key

Scenario: You are the senior network engineer at a company called “The Router Whisperer”. Your boss heard about a new feature to increase security for one of your customers who is a  famous dog trainer. You need to…

Read More »

Named Access-List

Scenario: After configuring standard and extended access-lists for the agents of three well-known agencies you were promoted to junior security operator. It’s now time to upgrade your skills and show them how to implement named access-lists. Goal: All…

Read More »

Extended Access-List

Scenario: This morning you woke up in a cell feeling dizzy and nauseous, it appears you were kidnapped by a mixture of agents from federal agencies. Your task is to finish this security test, if you pass you…

Read More »