Tag: ccie-rs

IP Traffic Export

No Picture

Scenario: You work for a local copyshop in a small town in the USA. To improve network security you have installed a new Intrusion Detection System (IDS) but right now it’s only receiving traffic from router Ditto. You…

Read More »

IP Source Tracker

No Picture

Scenario: You are the security office for the national security team in the Netherlands. It seems your webserver is under attack but you are unsure where the attacker is located. You want to use a method to track…

Read More »

Role Based CLI Access

No Picture

Scenario: As the security specialist for your company you want to ensure employees don’t get more access than they need to. At this moment everyone is logging in using privilege level 15 for your routers and you want…

Read More »

IOS Login Enhancements

No Picture

Scenario: You are the security office for the national security team in the Netherlands. One of your colleagues demonstrated you how to perform a dictionary attack on the VTY of one of your routers. You read about the…

Read More »

TCP Intercept Watch Mode

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…

Read More »

TCP Intercept

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…

Read More »

Unicast Reverse Path Forwarding (URPF)

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. Recently you are being plagued by different sources sending spoofed IP packets. You want to protect your network by…

Read More »

Policy Based Routing Traffic Filtering

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »

Reflexive Access-List

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »

AAA Command Authorization

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…

Read More »