Tag: security
VACL (VLAN Access List)
Scenario: For this lab you need REAL hardware. You can’t use switches in GNS3! You need at least a Cisco Catalyst 3550 switch for this lab. The network agency corporation has security issues with their network. They are…
Read More »Transparent IOS Firewall
Scenario: You are part of the security team for the Rotterdam Harbor located in The Netherlands. One of your firewalls has crashed and due to decreased IT budgets you don’t have any spare firewalls around. You do have…
Read More »Role Based CLI Access
Scenario: As the security specialist for your company you want to ensure employees don’t get more access than they need to. At this moment everyone is logging in using privilege level 15 for your routers and you want…
Read More »TCP Intercept Watch Mode
Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…
Read More »TCP Intercept
Scenario: As part of the security team you are always looking for ways to improve security within the company. Lately the company is under fire by TCP SYN floods. You don’t have any budget to buy some firewalls…
Read More »Unicast Reverse Path Forwarding (URPF)
Scenario: As part of the security team you are always looking for ways to improve security within the company. Recently you are being plagued by different sources sending spoofed IP packets. You want to protect your network by…
Read More »Policy Based Routing Traffic Filtering
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »IP Fragment Filtering
Scenario: As part of the security team you are always looking for ways to improve security within the company. You heard bad things about fragmented IP packets being a security risk to your network. You decide to block…
Read More »Reflexive Access-List
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »AAA Command Authorization
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to implement…
Read More »