Tag: security
AAA Exec Authorization
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…
Read More »AAA Authentication
Scenario: As part of the security team you are always looking for ways to improve security within the company. You want to get rid of all the local vty/console logins within your network so you decide to setup…
Read More »BGP TTL Security
Scenario: After years of plumbing work you switched your career to become a network engineer. Besides being good at routing & switching you are very security-minded. One of your routers is connected to your brother’s network and you…
Read More »Remote Shell
Scenario: You are working as a network engineer at a Turtle Aquarium based in Florida. Your colleague wants to check the running-configuration of one of the routers in the network but because of the security policy he’s not…
Read More »Access-List Logging
Scenario: The local boyscout needs your help as a network engineer. They want to make sure everytime their router receives an OSPF packet this will be logged on their local router. Think you can help them out? Goal:…
Read More »BGP MD5 Authentication
Scenario: You are working for a networking site and responsible for creating labs. After a day of working on BGP labs you notice you don’t have any lab on MD5 authentication. BGP authentication is one of the features…
Read More »OSPF Authentication
Scenario: The local zoo needs your help with their OSPF network. Since a recent animal breakout the security department decides all routing protocols need authentication. You decide to implement OSPF authentication in any way you can. Goal: All…
Read More »Time Based Access-List
Scenario: As the owner of a large swiss watch company you would like to make sure your employees are unable to browse the Internet during working hours. Time is money so it’s time to find a solution… Goal:…
Read More »Dynamic Access List – Lock and Key
Scenario: You are the senior network engineer at a company called “The Router Whisperer”. Your boss heard about a new feature to increase security for one of your customers who is a famous dog trainer. You need to…
Read More »Named Access-List
Scenario: After configuring standard and extended access-lists for the agents of three well-known agencies you were promoted to junior security operator. It’s now time to upgrade your skills and show them how to implement named access-lists. Goal: All…
Read More »