Tag: security

Extended Access-List

No Picture

Scenario: This morning you woke up in a cell feeling dizzy and nauseous, it appears you were kidnapped by a mixture of agents from federal agencies. Your task is to finish this security test, if you pass you…

Read More »

Standard Access-List

No Picture

Scenario: This morning you woke up in a cell feeling dizzy and nauseous, it appears you were kidnapped by a mixture of agents from federal agencies. Your task is to finish this security test, if you pass you…

Read More »

GRE over IPSEC

No Picture

Scenario: Your colleagues at “BigLabs” are very pleased with your performance so far…you managed to succesfully configure the “Basic GRE” lab and the “Site-to-Site IPSEC VPN” lab. You managed to configure a GRE tunnel and encrypt it with…

Read More »

Prefix List Filtering

No Picture

Scenario: As a true coffee addict and network junkie you are working on the network of a world famous coffeeshop. Today your caffeine rush kicks in and you have a sudden desire to clean up some of the…

Read More »

Distribute List Filtering

No Picture

Scenario: Ever since you were a child you wanted to be a trappist monk, the silence of the monastery and the science of trappist beer have been a part of your life as far as you can remember….

Read More »

EIGRP Authentication Rotating Key

No Picture

Scenario: As the senior security officer you decide all routing protocols should be configured as secure as possible. The company you work for has a single vendor policy and since you only have Cisco equipment you are running…

Read More »

EIGRP MD5 Authentication

No Picture

Scenario: Ben and Jerry are running their business from the north pole and have an icy request for you. They would like you to setup EIGRP (Enhanced Interior Gateway Routing Protocol) and make sure that all network updates…

Read More »

IOS Firewall – CBAC

No Picture

Scenario: As the network engineer for your company you are responsible for all network-related tasks. One day your security officer comes to you and asks is you can further enhance the network security. He wants you to implement…

Read More »

Basic Zone Based Firewall

No Picture

Scenario: Being a full-time Cisco Network Engineer you decide to implement a new router at your home network. You heard good stories about Zone Based Firewalls so you decide to beef up your home security. Let’s see what…

Read More »

PPP Advanced Authentication

No Picture

Scenario: After configuring some basic PPP authentication, the management of the puppet business decided they want to increase security. One of the things they want you to do is change the behavior of using the hostname as username….

Read More »