Home » Security
Policy Based Routing Traffic Filtering
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »IP Fragment Filtering
Scenario: As part of the security team you are always looking for ways to improve security within the company. You heard bad things about fragmented IP packets being a security risk to your network. You decide to block…
Read More »Reflexive Access-List
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »AAA Command Authorization
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »AAA Exec Authorization
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…
Read More »AAA Authentication
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…
Read More »Time Based Access-List
Scenario: As the owner of a large swiss watch company you would like to make sure your employees are unable to browse the Internet during working hours. Time is money so it’s time to find a solution… Goal:…
Read More »Dynamic Access List – Lock and Key
Scenario: You are the senior network engineer at a company called “The Router Whisperer”. Your boss heard about a new feature to increase security for one of your customers who is a famous dog trainer. You need to…
Read More »Named Access-List
Scenario: After configuring standard and extended access-lists for the agents of three well-known agencies you were promoted to junior security operator. It’s now time to upgrade your skills and show them how to implement named access-lists. Goal: All…
Read More »Extended Access-List
Scenario: This morning you woke up in a cell feeling dizzy and nauseous, it appears you were kidnapped by a mixture of agents from federal agencies. Your task is to finish this security test, if you pass you…
Read More »