Tag: security

AAA Exec Authorization

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…

Read More »

AAA Authentication

No Picture

Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…

Read More »

BGP TTL Security

No Picture

Scenario: After years of plumbing work you switched your career to become a network engineer. Besides being good at routing & switching you are very security-minded. One of your routers is connected to your brother’s network and you…

Read More »

Remote Shell

No Picture

Scenario: You are working as a network engineer at a Turtle Aquarium based in Florida. Your colleague wants to check the running-configuration of one of the routers in the network but because of the security policy he’s not…

Read More »

Access-List Logging

No Picture

Scenario: The local boyscout needs your help as a network engineer. They want to make sure everytime their router receives an OSPF packet this will be logged on their local router. Think you can help them out? Goal:…

Read More »

BGP MD5 Authentication

No Picture

Scenario: You are working for a networking site and responsible for creating labs. After a day of working on BGP labs you notice you don’t have any lab on MD5 authentication. BGP authentication is one of the features…

Read More »

OSPF Authentication

No Picture

Scenario: The local zoo needs your help with their OSPF network. Since a recent animal breakout the security department decides all routing protocols need authentication. You decide to implement OSPF authentication in any way you can. Goal: All…

Read More »

Time Based Access-List

No Picture

Scenario: As the owner of a large swiss watch company you would like to make sure your employees are unable to browse the Internet during working hours. Time is money so it’s time to find a solution… Goal:…

Read More »

Dynamic Access List – Lock and Key

No Picture

Scenario: You are the senior network engineer at a company called “The Router Whisperer”. Your boss heard about a new feature to increase security for one of your customers who is a  famous dog trainer. You need to…

Read More »

Named Access-List

No Picture

Scenario: After configuring standard and extended access-lists for the agents of three well-known agencies you were promoted to junior security operator. It’s now time to upgrade your skills and show them how to implement named access-lists. Goal: All…

Read More »