BRKCRT 2214
BRKCRT 2214
BRKCRT 2214
Security Solutions
- Preparing for the SENSS Exam
Jagdeep Kang CCNP Sec, Content Engineer
Mark Bernard CCIE 23864, Consulting Systems Engineer
BRKCRT-2214
Agenda
Overview of CCNP Security
SENSS Exam Information
SENSS Topics: Technical Introduction
What You Need to Know?
Sample Questions
Conclusion with Q & A
CCNP Security Requirements
The CCNA Security exam is the pre-requisites for this certification.
Candidates will benefit from having some basic routing & switching knowledge and have
passed the CCNA Security (Implementing Cisco IOS Network Security - IINS 640-554)
exam.
CCNP Security Certification requires the passing of four exams:
300-206 SENSS Implementing Cisco Edge Network Security Solutions
300-207 SITCS Implementing Cisco Threat Control Solutions
300-208 SISAS Implementing Cisco Secure Access Solutions
300-209 SIMOS Implementing Cisco Secure Mobile Solutions
When traffic matches an entry in either database, a syslog message is logged and
traffic can be dropped.
Deploying Cisco ASA Botnet Traffic Filter
Dynamic Database
A dynamic database of known bad hostnames is downloaded from the Cisco SIO to the Cisco ASA
and is constantly updated.
DNS replies for bad hostnames are cached on the appliance in a DNS reverse-lookup cache.
When a new connection is initiated, its source and destination IP addresses are compared with
entries in the DNS reverse-lookup cache.
Deploying Cisco ASA Botnet Traffic Filter
To configure Botnet Traffic Filter, complete these tasks:
1.Enable lookups to the dynamic database
2.Optionally, add entries to the static database
3.Enable DNS inspection (DNS snooping)
4.Enable the Botnet Traffic Filter to detect bot traffic
5.Optionally, enable the Botnet Traffic Filter to drop bot traffic
Deploying Cisco ASA Botnet Traffic Filter
Task 1: Enable Lookups to the Dynamic Database
Configuration > Firewall > Botnet Traffic Filter > Botnet Database
DNS snooping is required to intercept and cache DNS replies in the DNS
reverse lookup cache
This window displays all polices that include DNS inspection
Deploying Cisco ASA Botnet Traffic Filter
Task 4: Enable the Botnet Traffic Filter to Detect Bot Traffic
Configuration > Firewall > Botnet Traffic Filter > Traffic Settings
Click the grey buttons at the bottom of this frame to view the different windows.
Windows can be minimized and repositioned. You can reposition a window by dragging it by the
title bar.
You are the network security engineer for the XYZ network. The XYZ network requires
network address translation in order to hide internal addressing and to enable
connectivity from the network to the Internet. The CSO tasked you with implementing
dynamic NAT with PAT on the Cisco ASA for the hosts that require only outbound
connectivity. The CSO also tasked you to configure static NAT for servers that require
also inbound connectivity. In this activity you will need to do the following:
Create a new network object with name DMZ-SRV and IP address 192.168.10.10.
HTTPS Configuration
Scenario
interface Management0/0
CLI Requirements nameif management
security-level 80
on the ASA ip address 10.10.2.1 255.255.255.0
no shutdown
!
http server enable
http 172.16.200.0 255.255.255.0 management
Implement SSH access on an IOS device
Specify hostname and hostname RouterA
ip domain-name cisco.com
domain name
!
Create an RSA key pair crypto key generate rsa modulus 2048
!
* for SSH v2 the ip ssh version 2
modulus size must be at username admin privilege 15 secret
least 768 bits Admin92DXBh
!
Optionally configure an ip access-list standard 90
permit 10.10.10.0 0.0.0.255
ACL to apply to the vty deny any log
!
vty 0 15
Configure the transport transport input ssh
login local
Input to only accept SSH access-class 90 in
Implement RBAC on the ASA/IOS CLI and ASDM
RBAC is an access control
approach that restricts user
access based on the role of the
user.
Users are assigned to roles with
specific permissions
RBAC is being depreciated in IOS
with the Role Based CLI access
Parser View command (shown
later)
User accounts have the following
attributes: username, password,
expiry date, user roles
Implement RBAC on the ASA using ASDM
Setting
Privilege Level
Implement RBAC on the IOS device
aaa-new model
!
Configure aaa authentication login MGMT_ACCESS group tacacs+ local
aaa authorization exec MGMT_ACCESS group tacacs+ local
AAA aaa authorization commands 1 MGMT_ACCESS group tacacs+ local
requirements aaa authorization commands 15 MGMT_ACCESS group tacacs+ local
aaa accounting exec MGMT_ACCESS start-stop group tacacs+
Configure aaa accounting commands 1 MGMT_ACCESS start-stop group tacacs+
usernames aaa accounting commands 15 MGMT_ACCESS start-stop group tacacs+
!
and privilege
username admin_backup privilege 15 secret admin_backup123
levels username security_viewer_backup privilege 7 secret
security_viewer_backup123
Configure !
commands privilege exec level 7 show crypto ipsec sa
and exec privilege exec level 7 show crypto ikev2 sa
!
levels
tacacs server TACACS+
address ipv4 10.10.2.20
key cisco123
Implement Role Based CLI access on IOS devices
Enables root view enable view
NAT Rules
Firewall
Filtering FTP Commands: Layer 7 Policy Map (Cont.)
Inspections
Filtering FTP Commands: Service Policy Rule
Filtering FTP Commands: Service Policy Rule (Cont.)
Implement Device Manager for Layer 7 Inspection
Layer 3/4 Class Maps Layer 7 Class Maps
Match traffic based on protocols, ports, IP Work with layer 7 policy maps to implement
addresses, and other layer 3 or 4 attributes: advanced protocol inspection
ACL Match criteria is specific to one of the following
applications:
Any packet
DNS
Default inspection traffic
FTP IM
IP differentiated services
code point H.323 RTSP
HTTP SIP
TCP and UDP ports
IP precedence Enable you to specify a not operator for a match
condition
RTP port numbers
Can contain one or more match conditions
VPN tunnel group
Can use regular expressions as match criteria
Typically contain only one match condition
Are optional MPF components (match criteria can
Are mandatory MPF components be specified in a layer 7 policy map instead)
Cisco Security Devices GUIs and Secured CLI
ManagementPrep Resources
25% 2.0 Cisco Security Devices GUIs and Secured CLI Management
User Guide for Cisco Security Manager 4.3 -
http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_mana
ger/security_manager/4-3/user/guide/CSMUserGuide_wrapper.html
Cisco Router and Security Device Manager_Technical References -
http://www.cisco.com/c/en/us/support/cloud-systems-management/router-security-device-
manager/products-technical-reference-list.html
Cisco Prime Infrastructure 2.1 Release Notes -
http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-
1/release/notes/cpi_rn.html
Administering Cisco ISE -
http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_admin.htML
Cisco Security Devices GUIs and Secured CLI
ManagementType of Exam Questions/Answer
List few caveats for ASDM compatibility. - ASDM Launcher requires trusted
certificate, requires strong encryption license (3DES/AES) on ASA or workaround etc.
List some features of the Cisco Prime Security Manager. - Cisco Prime Security
Manager provides a range of features for the Cisco ASA 5500-X NGFW platform:
preloaded on-box single-device management, central management application for multi-
device management, traffic-pattern reports, Object import, behavior-based policy
management, event analysis, monitoring, license management etc.
What is the default service account in Cisco Security Manager 4.4? - casuser
Management Services on
Cisco Devices
Management Services on Cisco Devices
3.1 Configure NetFlow exporter on Cisco Routers,
Switches, and ASA
3.2 Implement SNMPv3
3.3 Implement logging on Cisco Routers, Overview
Switches, and ASA using Cisco best practices Licensing Requirements
3.4 Implement NTP with authentication on Cisco Prerequisites
Routers, Switches, and ASA Guidelines and Limitations
Configuring the Feature
3.5 Describe CDP, DNS, SCP, SFTP, and DHCP
Monitoring the Logs
Configure NetFlow exporter on Cisco IOS Device
Configuration Tasks:
1. Configure a Flexible NetFlow exporter.
2. Configure a Flexible NetFlow monitor.
3. Apply Flexible NetFlow monitors to routed interfaces.
.
Configure NetFlow exporter on Cisco IOS Device
flow exporter MYEXPORTER
Configure the Flexible NetFlow destination 172.16.200.12
exporter. transport udp 9996
export-protocol netflow-v9
!
Configure a Flexible NetFlow flow monitor MYMONITOR
monitor record netflow ipv4 original-input
exporter MYEXPORTER
Optionally set the source
!
address of the Netflow export ip flow-export source Loopback0
device !
Apply the configured Flexible interface GigabitEthernet 0/1
NetFlow monitor to a network ip flow monitor MYMONITOR input
interface
Create a
SNMPv3
group and
user for
use.
Implement SNMPv3 on the ASA (Cont.)
Allow the
SNMP clients
to poll or to
receive traps
from the ASA.
Implement SNMPv3 on the ASA (Cont.)
Select the
events to
notify on
through
SNMP traps
using ASDM.
Example link
up/down state.
Implement logging on Cisco Routers, Switches, and
ASA
Logging of device and network events can be used for:
Device failure notifications
Network telemetry and forensics
Security audit
Support for the following logging destinations:
Console
Telnet or SSH administrative sessions (Terminal)
The internal in-memory buffer
Remote syslog servers
Implement logging on Cisco Routers, Switches, and
ASA
logging on
!
Logging on Cisco IOS logging buffered informational
!
Software logging trap debugging logging host 192.168.20.51
Globally enable
logging on the ASA
Possible message
severity levels are:
0. Emergencies 4. Warning
1. Alert 5. Notification
2. Critical 6. Informational
3. Error 7. Debugging:
Commands Description
Show NTP show ntp associations [Detail] Displays the status of NTP associations
verification
show ntp status Displays the status of NTP
Status on Cisco IOS
Management Services on Cisco DevicesType of
Exam Questions/Answers
Which command Enables random mode and specifies a sampling rate for the
NetFlow sampler? - mode random one-out-of sampling-rate
Example: Router(config-sampler)# mode random one-out-of 100
Name three security features provided in SNMPv3? - Message integrity,
Authentication, and Encryption
Which commands can disable logging to the console sessions and terminal
lines? - no logging console, no logging monitor
What is the severity level of the following partial event message? Jan 5 2011
09:27:16 FIREWALL : %ASA-6-725002: Device completed ... -
Informational
Troubleshooting,
Monitoring and Reporting
Tools
Troubleshooting, Monitoring and Reporting Tools
4.1 Monitor firewall using analysis of packet tracer, packet capture,
and syslog
Analyze packet tracer on the firewall using CLI/ASDM
Configure and analyze packet capture using CLI/ASDM
Analyze syslog events generated from ASA
Use ASDM Packet Tracer to analyze packets.
Packet Tracer is a
tool that can verify
how rules will
affect traffic
passing through
the firewall.
Optionally this can
also be done CLI.
Packet Tracer
A wizard can
be used to
capture traffic
to the ASDM
GUI.
Optionally this
can also be
done CLI.
Troubleshooting, Monitoring and Reporting Tools
Prep Resources
Embedded Packet Capture for Cisco IOS and IOS-XE Configuration
Example - http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-
embedded-packet-capture/116045-productconfig-epc-00.html
Cisco Packet Tracer - https://www.netacad.com/web/about-us/cisco-packet-tracer
Monitoring the Logs -
http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-
general-cli/monitor-syslog.html#pgfId-1806075
Troubleshooting, Monitoring and Reporting Tools
Type of Exam Questions/Answers
Which of the following represent ASA functions that can be tested
with Packet Tracer? - Routing table lookup, Network Address Translation
entries, Host connection limits, Access list results..
What are optional parameters of the packet-tracer command? - packet-
tracer input [src_int] protocol src_addr src_port dest_addr
dest_port [detailed] [xml]
Which command shows the current logging rate-limit setting? - show
running-config logging rate-limit
Threat Defense Architectures
Threat Defense Architectures
5.1 Design a Firewall Solution
High-availability
Basic concepts of security zoning
Transparent & Routed Modes
Security Contexts
IPv6 and IPv4 Threat Comparison and Best Practice Evaluation (v1.0)
http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf
Partner-Srv Partner-ISR
Cisco SIO
Internet
Internet-RTR
Branch-ISR ScanSafe
Branch-Srv
HQ-ASA
Outside
HQ-ESA DMZ-Srv DMZ
Site-to-site
Management
Inside HQ-ISR
IPS/CX SW Module
HQ-ISE HQ-CDA Admin PC
HQ-WSA
L3-Sw HQ-Srv
Start Here
Cisco dot com Resources
No CCO login required to download
the command references and
configuration guides.
No need to read these documents
cover to cover, but they are essential
as reference material during exam
preparation.
Overview or Information About
section very helpful for each of the
many topics and features covered on
the exams.
Firewall Configuration Guides (46)
http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-
firewalls/products-installation-and-configuration-guides-list.html
Read these
guides
Initial Configuration
AAA
Allow and Block the
Traffic Through the
Security Appliance
NAT and Access Lists
ASDM
Search, Search, and Search Again!
Many YouTube VODs out on the Internet contain good insight into Cisco ISE
technologies. Search beyond CCNP material, for example: ASA
FirewallASA NAT 9.1
Not every document out on the Internet is 100% correct, so verify your findings,
then share!!!
Cisco Configuration documents are a good resource.
These documents provide valuable information into the theory behind different
ASA configuration challenges and the solutions.
Key resource: for day-to-day work related problems and exam writers
Cisco Learning Network Study Portal
Cisco Learning Network Content Legend
Complete Your Online Session Evaluation
Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner
will receive a $750 Amazon
gift card.
Complete your session surveys
though the Cisco Live mobile
app or your computer on
Cisco Live Connect.
Dont forget: Cisco Live sessions will be available
for viewing on-demand after the event at
CiscoLive.com/Online
Continue Your Education
Demos in the Cisco campus
Walk-in Self-Paced Labs
Table Topics
Meet the Engineer 1:1 meetings
Related sessions
Thank you