Tag: ccie-rs
IP Traffic Export
Scenario: You work for a local copyshop in a small town in the USA. To improve network security you have installed a new Intrusion Detection System (IDS) but right now it’s only receiving traffic from router Ditto. You…
Read More »IP Source Tracker
Scenario: You are the security office for the national security team in the Netherlands. It seems your webserver is under attack but you are unsure where the attacker is located. You want to use a method to track…
Read More »Role Based CLI Access
Scenario: As the security specialist for your company you want to ensure employees don’t get more access than they need to. At this moment everyone is logging in using privilege level 15 for your routers and you want…
Read More »IOS Login Enhancements
Scenario: You are the security office for the national security team in the Netherlands. One of your colleagues demonstrated you how to perform a dictionary attack on the VTY of one of your routers. You read about the…
Read More »TCP Intercept Watch Mode
Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…
Read More »TCP Intercept
Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…
Read More »Unicast Reverse Path Forwarding (URPF)
Scenario: As part of the security team you are always looking for ways to improve security within the company. Recently you are being plagued by different sources sending spoofed IP packets. You want to protect your network by…
Read More »Policy Based Routing Traffic Filtering
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »Reflexive Access-List
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »AAA Command Authorization
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »