Uploaded by gbhuwan72

AssessmentEvidence BhuwanGhimire 6335586 ICTNWK601 - Design and implement a security system

advertisement
2020
ICTNWK601 - Design and
implement a security
system | Bhuwanghimire
| 6335586
STUDENT ASSESMENT
BHUWAN GHIMIRE | 6335586
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Assessment Task 1 - Unit Knowledge Test (UKT)
Question 1: Answer the Following Questions:
A.
What do you understand from Access Control Lists? Write your response
in 50-100 words.
Access Control Lists "ACLs" are network traffic filters capable of monitoring incoming
or exit traffic. ACLs operate on a collection of rules that describe whether a packet can
be forwarded or blocked at the router interface. An ACL is the same as a Stateless
Firewall that limits, blocks or requires packets to flow from source to destination only.
ACLs are common in routers or firewalls but they can also be installed from hosts,
network devices , servers, etc. on any system running on the network.
B.
What are the steps involved in the configuration of the Access Control
Lists. Use Screenshots in your answer.
The steps involved in the configuration of the Access Control Lists
1. Build a MAC ACL with a name specified.
2. Build an ACL for the IP by entering a number.
3. Adds new ACL guidelines.
4. Configure the rules match requirements.
5. Apply the ACL to a single interface or more.
P a g e 1 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
C. What are the Four (4) steps involved in the troubleshooting of the Access
Control Lists? 1. Determine Which Interfaces have ACLs :Take a look at all
the configurations of the router first, to see if ACLs are still being applied to
problems with the network. Two Cisco IOS commands can aid in deciding that.
Commands
• show run
• show ip interfaces (Interface)
2. Determine can ACL statements have traffic effects: A kind of a dumb word,
ACLs still work on traffic. What I mean by this, though, is to decide the ACL that
affects the traffic in which we are experiencing or are investigating problems.
Below are a few commands for displaying the detail.
Commands
•
•
show access-lists
show ip access-lists
3. Analyze the ACLs to Match Traffic: Now that we've found the ACLs that suit
traffic we can take a closer look at now. What sort of traffic does UDP TCP or
ICMP send? Do we have any advanced ACLs that would shift the traffic? Recall
that ICMP is regarded as its own type and not TCP or UDP traffic.
4. Facts to Remeber about ACLs:
•
ACLs will be handled on a first match logic, meaning ACL 1 before ACL
2 and ACL 2 before ACL 3.
•
TCP or UDP shall be included in the ACL command if the port numbers
are tested
Using an explicit deny to display percentages in ACL counters
•
P a g e 2 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 2: What are the different Authentication Protocols? Explain two (2)
Authentication Protocols.Write your answer in 150-200 words.
The different authentication protocols are as:
A. PAP - Password Authentication Protocol.
B. Kerberos (protocol)
A.
Pap-password authentication protocol
PAP is an Authentication Protocol password used to validate users via PPP
connections. PAP authentication requires user name and password to access the
calling system. If the credentials suit the so-called device's local database or in
the remote AAA database then access is refused otherwise.
B.
Kerberos (protocol)
Kerberos is a protocol for Network authentication. This is designed using secretkey cryptography to provide good authentication for client / server applications.
The Massachusetts Institute of Technology pays for free implementation of this
protocol. Kerberos is also used in other consumer goods. MIT developed
Kerberos as a solution to these Network Security issues. The Kerberos protocol
uses strong cryptography to allow a client to prove their identity to a server (and
vice versa) over an insecure network connection. Once a client and server have
used Kerberos to prove their identity, all of their messages can also be encrypted
to ensure privacy and data integrity as they move.
Question 3: What are the four (4) most secured encryption techniques? Write 50100 words for each technique?
Four (4) most secured encryption techniques are as:
A.
Advanced Encryption Standard (AES): Advanced Encryption Standard is a
symmetric algorithm for the encryption of fixed data blocks (of 128 bits) at a time. The
keys that were used to decode the text can be 128-, 192-, or 256-bit. The 256-bit key
encrypts the data into 14 rounds, the 192-bit key in 12 rounds and the 128-bit key in 10
rounds.
B.
Rivest-Shamir-Adleman (RSA): Rivest-Shamir-Adleman is an asymmetric
encryption algorithm, which is centered on two large prime numbers factorizing the
product. Any one who knows these numbers will be able to decode successfully. RSA is
widely used in digital signatures but works slowly when large quantities of data require
encryption
C.
Triple Data Encryption Standard (TripleDES): Triple Data Encryption Standard
is a symmetrical encryption and modified DES method type which encrypts data blocks
using a 56bit key. TripleDES apply the DES cipher algorithm to any block of data three
times. TripleDES is also used for the protection of ATM PINs and UNIX passwords.
P a g e 3 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
D.
Twofish: Twofish is a license-free encryption method that encrypts 128-bit data
blocks. The successor to the Blowfish encryption method is considered to have
encrypted 64-bit message blocks. Twofish always encrypts data in 16 rounds,
regardless of the size of the key. Although it is slower than AES, the Twofish encryption
method continues to be used by a number of file and folder encryption software
solutions.
Question 4: Summarise the following terms:
A. Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a system that tracks network traffic for
suspicious behavior and issues warnings upon detecting such activity. This is a
software program that scans a device or network for malicious behavior or breaches
of policy. Any malicious venture or violation is usually recorded either to an
administrator or centrally collected using a program for security information and event
management (SIEM). A SIEM framework incorporates multi-source outputs and uses
warning filtering methods to differentiate malicious behavior from false positives.
B. Intrusion Prevention System (IPS)
An intrusion prevention system (IPS) is an instrument for network protection and
prevention of attacks. The concept behind prevention of intrusion is to create a
preventive approach to computer security in order to identify and respond to potential
threats quickly. Therefore, intrusion prevention systems are used to analyze network
traffic flows to detect malicious software and to stop exploits of insecurity.
P a g e 4 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 5: Explain the following
terms: A. Network Models:
A network model is a database model, built to represent objects and their
relationships as a scalable approach. The network model 's special attribute is
its schema, which is presented as a graph where relationship types are arcs
and entity types are nodes. Like other database models, the structure of the
network model is not limited to being a lattice or structure; the hierarchical tree
is replaced by a graph that allows for more simple node connections.
B Internet Protocol
The Internet Protocol ( IP) is a protocol, or collection of rules, for routing and
addressing data packets so they can pass through networks and get to the right
destination. Data via the Internet is broken down into smaller bits, called packages.
An IP address is allocated to any device or domain that connects to the Internet, and
as packets are directed to the IP address attached to them, data arrives where it is
required.
Question 6: Answer the following:
A. What are the different wireless regulations and standards?
The different wireless regulation and standards are:
IEEE 802.11: Initial one! This now-defunct standard was created in 1997 and backed
a blazing fast maximum connection speed of megabits per second ( Mbps) Devices
that use this have not been made for more than a decade, and do not operate with
the devices of today.
IEEE 802.11b: This standard, also developed in 1999, uses the more common
2.4GHz band, which can reach a maximum speed of 11Mbps. The protocol that kickstarted the adoption of Wi-Fi was 802.11b.
IEEE 802.11g: The 802.11 g standard, introduced in 2003, increased the maximum
data rate to 54Mbps while maintaining stable 2.4GHz band use. This contributed to
widespread adoption of the standard.
IEEE 802.11ax: First up is the ax specification for router and wireless devices. As
ax completes its rollout, \ will have access to 10Gbps theoretical network throughput
— around an upgrade of 30-40 per cent over the ac standard.
B. List Wireless Network Certifications.
The wireless network certification are as:
•
•
•
•
•
Cisco Certified Network Associate (CCNA) Wireless:
Cisco Certified Network Professional (CCNP) Wireless
Certified Wireless Network Administrator (CWNA)
Aruba Certified Mobility Associate (ACMA)
Certified Wireless Security Professional (CWSP)
P a g e 5 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 7: What are the steps involved implementations of the following:
A. Local Area Network – LAN
Steps involved in implementation of LAN are:
• Firstly, we require the proper equipment like: computer, router, Ethernet cable,
modem and other necessary devices.
• Secondly, connection of these devices is very essential. PC setup needed to
done at the very beginning to connect the router through Ethernet cable and from
the center area of the network we can find the setup wizard.
• Then Wi-Fi connection is very important to run the devices which can be done
with the help of the setup wizard.
• Each of the devices that is connected to the internet require internal connections
like passwords setup. This makes the internet connection successful.
Lastly, we need to connect all the other devices to the LAN and it is ready to be
used.
B. Wide Area Network –WAN
Steps involved to implement the WAN are as follows:
•
First of all, it is necessary to find the service provider in that particular area
and should install the equipment to create demarcation point.
•
Then connect the router to the WAN link. Although the service provider
provides the router but also we need separate router for the LAN.
•
Lastly, need to connect all the switches connection to the router which will
pile up all connection to the LAN and make connection with router.
P a g e 6 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 8: Answer the following questions:
A.
What are the five (5) malicious network attacks and their prevention
techniques? Write 50- 100 words for each.
Five network attacks are as follow:
•
•
•
•
•
Replay: Reply attack occur when an attacker copies a stream of messages
between two parties and reply stream to one or more of the parties Reply
attack is also known as a playback attack. Main function of the reply attack is
to help attacker to gain access to the information which would not have been
easily accessed.
Snooping: spoofing is the type of attack in which the attackers pretend to be
a trusted communicator and makes the user to share their confidential
information. This attack is mainly done by phone calls, emails, and
attachments.
Phishing attacks: Phishing is called a type of social engineering attack which
is mainly used to steal data including login details, credit card information etc.
it happens if the victim opens the instant text or messages from unknown
resources.
Trojans horse attack: Trojan horse is a malware software that is mostly used
by the hackers or cyber-thief to get access to the user’s system. Here victims
are usually tricked by some email attachments.
Man-in-middle attack: Man-in-the-middle is a kind of cyberattack where
conversation between two applicants happen, where the victim believes in
their direct communication but the attacker gains the information of the victim.
Prevention techniques are:
•
Use of Virtual Private Network to encrypt web traffic.
•
Make sure that softerware in the systems are updated regularly.
•
Installation of anti-viruses’ software to prevent \ system from viruses.
•
Use of strong authentication like strong login details and so on.
•
Using cloud is the safest way to keep organizational data secured.
P a g e 7 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
B.
What are the three (3) types of security to use as a methodical approach to
protect a network
infrastructure? Write your answer in 100-150 words.
The three types of security to use as a methodical approach to protect a network
infrastructure are as follow:
•
•
•
Running network security audit: In this process any organization can
investigate their policies and can easily identify the threats that might lead to
the network breaches. This can be also run by internal cybersecurity teams.
This audits contains firewall configurations, security policies and risk
assessment.
Awareness training regarding cybersecurity: Every employee of the
organization should be trained regarding cyberattacks and threats. If they are
not trained then they might fall for attacks, end up downloading viruses and
may lose confidential information.
Patching software: Unpatched software may be dangerous for network
security. Ensure we are finding and fixing software in regular basis which will
make hackers job hard. After checking the software in system, make sure to
use strong security patches for them to defense the attack.
Question 9: What are the eight (8) famously used network management tools?
Write your response in 100-150 words.
The 8 netwok management tools are as:
1 Solar winds network performance monitor: This framework is built from the
ground up to make the monitoring process for network as painless as
possible.
2 Paessler PRTG : Until now, one of PRTG's biggest selling points has been its
versatility. It tracks everything from bandwidth to web sites, cloud providers,
servers, traffic and databases making it one of the most robust monitoring
tools on the network.
3 ManageEngine OpManager: ManageEngine OpManager targets at certain
Organization searching for a solution for catch-all control of the network.
Unlike PRTG, this device embodies all the key differentiators that a top-of-therange company would expect from it. Users can track the network in real-time
and view their live network behavior through a variety of dashboards and
graphs. To track performance metrics such as CPU, disk space and memory
usage, we can conduct physical and virtual server monitoring.
4 Zabbix: Zabbix is a network management system that incorporates hardware,
cloud services and KPI / SLA management to give the network access a full
P a g e 8 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
perspective. Some find this device to be a monitor of network performance but
it can also fulfill a variety of administrative functions.
5 Icinga: The multithreaded architecture helps to run thousands of checks per
second, without impacting computer 's output adversely. Icinga has plenty to
sell, in terms of warnings. If any problems are found on network, a notification
will be sent via e-mail or SMS. When we need a segmented network event
response may appoint additional users to receive those warnings.
6 Nagios XI: Nagios XI is another very well-known monitoring device
constructed with ease of use in mind. This will track network infrastructure and
carry out preparation of longterm capacities. The GUI can be modified to fit a
number of different views, making its use fairly straightforward.
7 WhatsUp Gold: Ipswitch’s WhatsUp Gold from pswitch has built a reputation
for itself as a strong and refined network management platform for mid- to
large-scale organisations. Its undeniably greatest appeal must be its rigorous
monitoring of application performance. This allows the user to track their
network down to the level of their computer.
8 NETCRUNCH: NetCrunch is excellent as performance management solution.
We can display the output of network in graph or dial format and the
processing time. These track the real-time success metrics. The software
GrafCrunch produces live dashboards of results. If this is not enough, we can
also view details about the network in widget format.
P a g e 9 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 10: What are the steps involved in the setup of a Virtual Private
Network- VPN in Windows 10?
The steps involved in the setup of a Virtual Private Network- VPN in Windows 10
A.
II.
III.
IV.
V.
VI.
VII.
Click Windows, then go to Settings > Network & Internet > VPN. Click on the
connection Add VPN.
For your VPN provider pick Windows (built-in) in the fields on the tab. Offer a
name for your VPN under the name Connection. Enter the name or address
of the server, type of VPN and type of sign-in detail.
For extra protection, add a user name and password (this is optional but
recommended). You can opt to have your sign-in information remembered by
the machine.
Click Save
Go back to Settings > Network & Internet > VPN to log in to your VPN. Tap
your name on your VPN.
You can select Advanced Options to edit the link properties at this stage,
clear your sign-in data, or set up a VPN proxy if you wish.
If you have set one, select Link, and enter a password.
Question 11: What do you understand from Routing Protocols and what are its
types? Write your answer in 100-150 words.
A routing protocol defines how prefer to communicate on a computer network to
relay information that enables them to pick routes between any two nodes. Routers
perform on the Internet the "traffic controlling" functions; data packets are transmitted
from router to router via the Internet networks before they reach their destination
device.
Types of routing protocols are as:
A. Distance-vector routing protocols: Routers running distance-vector routing
protocols transmit routing and accessibility information from all active interfaces
on a periodic basis. Through their active interfaces they also obtain the same
information from their neighbours. Distance-vector protocols use timers to relay
information on the routing. When their periodic timer has expired, they transmit
their routing information from all active interfaces, regardless of whether or not the
routing information has changed since the previous transmission.
B. Link-state routing protocols: The link-state routing protocols, unlike
distance-vector routing protocols, do not share routing and accessibility
information with others. Routers running connection-state protocols only share
routing information with neighbours. Linkstate protocols use a special protocol
known as the hello protocol to discover the neighbors.
P a g e 10 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 12: What are the network security threats and five (5) techniques that
can be used for their mitigation? Write 30-50 words for each mitigating
technique.
Network Security threats may be numerous, such as cyber attacks, data theft,
identity theft, equipment or computer theft, sabotage and extortion of computer.
Attacks by machines means attacks by malware, worms , trojan horses etc.
The five techniques that can be used for the mitigation are as:
1. Risk Acceptance: Risk tolerance comes down to "risking it." The risk is
coming to terms and there is nothing we are going to do to minimize it or change
it. Instead, it acknowledges the probability that it will happen, and accepts the
potential consequences.
2. Risk Avoidance: If a risk is too large to consider from starting a project,
launching a product, moving company, etc., it might be easier to avoid it. Risk
avoidance in this case means failure to conduct the activity which causes the risk.
3. Risk Reduction: Businesses may prescribe an appropriate level of risk which
is called the residual level of risk. Risk management is the most common
technique, as there is generally a way of reducing risk at least. This includes
taking countermeasures to reduce the effect of the outcomes. For example, risk
transfer, like that of purchasing insurance, is one type of risk reduction.
4. Risk Mitigation: If evaluating risks, it's best not to prevent or embrace those
risks. Risk reduction in this instance is being discussed. Risk reduction applies to
threat management procedures and methods. By assessing risk and its
probability, will assign administrative capital.
5. Risk Transfer: As already stated, the transfer of risk includes transferring the
risk to another third party or agency. Risk transfers may be outsourced, passed to
an insurance provider or turned over to a new company as is occurring when
leasing properties. Risk shifts do not necessarily contribute to lower costs.
Alternatively a transfer of risk is the better choice if it can be used to reduce
potential harm.
P a g e 11 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 13: Answer the following questions:
A.Explain the ten (10) commands of CISCO Command Line Interface to
configure and test different network elements? Write your 30-50 words for
each command.
Ten commands of CISCO Command Line Interface to
configure and test different network elements are as follow:
1. Show running-configuration: Show running-configuration shows the router,
switch and firewalls recent configuration. We can change this configuration if
any changes are made to router.
2. show interface: it provides the following output;
•
Interface status
•
Protocol status
•
Utilization
•
Errors
•
MTU
3. show ip interface: It shows the ip interface briefly and provide the useful
information about the configuration and the status of the IP protocol. They are
providing capable quick information of the interface.
4. no shutdown: No shutdown enables the interface which is mostly used in the
interface configuration mode. It is very useful for troubleshooting.
5. Show ip route: This command is used to show the routers routing table. We
can use the parameters like sh ip ro, s hip ro ospf and so on.
6. show version: This command provides the details of the router configuration
register. We can use this command as ‘sh ver’.
7. debug: Debug command will allow us to know if any router is added or
removed from the network. It can be a dangerous process as it has control
over all others.
8. config terminal: This command takes us to the global configuration mode
where we can change the global parameters.
9. Enable: In the very beginning if we want to enter the privileged mode, we
enter enable command.
10. Interface: This command is required to change the parameter in the interface
mode like; IP address.
P a g e 12 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
B.List five (5) software tools to secure network routers.
The five software tools to secure network routers are as:
a. PRTG
b. Nagios
c. Solar Winds Network Insights
d. Icings
e. Zenoss
Question 14: Answer the following questions:
A.What is the importance and functions of the Authentication, Authorisation
and Accounting?
The importance and functions of the Authentication, Authorization and
Accounting are given as below:
•
AAA will help us to implement identify management if we get the proper
understanding of Authentication, Authorization and Accounting.
•
AAA helps in keeping the records of the user in the network system and
monitors their activity.
AAA identify the right access and grant the access if they have correct
username, passwords and also their unique login details is required.
•
•
•
AAA provides strict security in granting access to the network system.
Proper accounting in AAA enables network and system to review and
monitor the access attempting and granting
B.What do you understand from authorisation and accounting (AAA)
protocols? Write 100150 words?
Authorization: Authorization in AAA is simply responsible for the users
logging in the system and gaining access. Authorization policies determine
what kind of activities, resources and the service can user get or are
permitted. User can only be permitted to their sources only if they contain
their proper login in detail and identity.
Accounting: Accounting in AAA is totally about the monitoring the
resources that the user is permitted in network access. This also can
include the amount of time in the system or the sending and receiving of the
data packets. Mainly accounting focus after the billing, analysis, utilization of
the resources and for the data flow planning. It is highly used in the
business operation where more logging session are attempted.
P a g e 13 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
C.Compare the common features of Terminal Access Controller AccessControl System Plus
(TACACS+) and Remote Authentication Dial In User Service (RADIUS)
authentication.Write 150-200 words for each.
Some of the features of RADIUS and TACAS+ are given below:
The process is start by Network Access Device (NAD – client of TACACS+ or RADIUS).
NAD contact the TACACS+ or RADIUS server and transmit the request for
authentication (username and password) to the server. First, NAD obtain username
prompt and transmit the username to the server and then again the server is contact by
NAD to obtain password prompt and then the password is send to the server.
The server replies with access-accept message if the credentials are valid otherwise
send an access-reject message to the client. Further authorisation and accounting is
different in both protocols as authentication and authorisation is combined in RADIUS.
Question 15: What are steps involved in the configuration, verification and
troubleshooting the
following:
A.Switch with virtual local area networks (VLANs) and inter-switching
communications
Step 1: Enable the routing on the switch using the 'ip routing' command
Step 2: note the VLAN that are routing
Step 3: Use the command "show vlan" to verify VLANs that exists in VLAN
database Step 4: Determine the ip address that we want to assign to VLAN
Step 5: Configure the VLAN interfaces with the IP address. Step 6:
configure interface to Default router
Step 7: Configure the default route for the switch.
Step 8: configure end devices to use VLAN interface as their default gateway.
For the verification of the switch configuration following can be used:
•
•
show ip route
show ip interface brief
For the troubleshooting following can be done:
a.
Performed ICMP pings in order to verify we have Layer 2
connectivity.
b.
Start the ICMP ping from the end device connected to the
Catalyst 3350 to its corresponding VLAN interface.
c.
Imitate the ICMP ping from the end device of one VLAN to other
interface VLAN on another VLAN to verify the switch routes
between the VLANs.
d.
End device of one VLAN to end device of another VLAN should
be
ping
P a g e 14 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
e.
If unable to connect to the internet or other cooperate network,
verify the IP address and subnet mask on the switches are
correctly configured.
B.Router
Step 1: enter the global configuration mode using ‘configuration
terminal’ command
Step 2: use command 'router rip' to enter the configuration
mode and to enable RIP on the router
Step 3: specify the use of RIP version
Step 4: specify the list of networks on which RIP can be applied using
network address by command ‘network ip-address’.
Step 5: Disable ‘no-autosummary’
Step 6: exit the configuration mode
Verification: For the verification process use the command 'show ip route' and look
for the routes.
Troubleshooting:
a.
b.
c.
d.
e.
check by rebooting the router
Check if there is any overheating
check for connections
verify the wireless channels
try resetting the router
Question 16: Answer the following questions:
A.
What are the five (5) steps involved in the configuration of SSH Router
for secure management.
The steps involved in the configuration of the SSH router for secure management
are as:
1. Configuring the host name using following commands; yourname#configure
terminal Enter configuration commands, one per line.
End with CNTL/Z. yourname
(config)#hostname LabRouter
LabRouter(config)#
2. Using 'ip domain-name' command where we can put any domain name.
3. Use 'crypto key generate rsa' command to encrypt the SSH packets
4. Configure vty lines for SSH and identify the databse used to provide
authentication to the device.
5. Creating the account on local routerusing command ‘username xxxxx privilege
15 secret xxxx’
P a g e 15 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
B.
Explain the configuration of the Cisco Router to send log messages to
Remote Syslog Server?
Network having any size can will be manageable if all the log messages are
centralized to the syslog server. It will improve the network and also reduces the
time response which is taken to solve the problems. But while sending the router log
messages to a remote server it will allows the long archiving of the messages then
the actual routers limitation storage. Those messages which are stored by the syslog
have permanence whereas the router does not have it. And if the router is again
reloaded then all the messages that log contains will be erased. For sending the
message to the syslog server at 192.168.51.5, should use the command “conf t
logging 192.168.51.4”.to accept the messages from the router, remote server must
be configured
Question 17: Answer the following questions:
A.What are seven (7) Layer 2 attacks? Write 30-50 words for each.
The seven layer 2 attacks are as:
Seven layer 2 attacks are as follow:
a. Address resolution protocol (ARP) attack: ARP are used by
internet protocol to map the ip network address. It is very important
to translate the host and to determine the hardware address of
another host.
b. Spinning tree protocol (STP) manipulation attack: they usually
occur in LAN-switched networks because in layer 2 LAN works
without STP. Without STP layer 2 LAN simply do not function.
c. Media access control (MAC) spoofing: In MAC spoofing attack,
the attacker tried to sniffs the valid MAC address and also they
behave as one of the trusted MAC addresses. Eventually they
access they copy of the data through default gateway.
d. Cisco discovery protocol (CDP) reconnaissance: CDP contains
information regarding the network device and when this information
granted by the attacker they can directly attack network. It is usually
like a denial of service attack.
e. VLAN hopping: VLAN hopping consist of two different types (switch
spoofing and double tagging) but they both have the same aim of
sending the traffic from one VLAN to the another one.
f.
Dynamic host configuration protocol (DHCP) spoofing: DHCP
spoofing is an attack where attackers pretend to be the trusted
resources and attempt to get access to personal information.
Whereas, DHCP is important because if we lose it might be difficult.
g. Conant addressable memory (CAM) table overflows: CAM table
overflow is the attacks that normally occur when the attacker
connects to the single or multiple ports. After reaching the limits of
P a g e 16 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
MAC address the traffic from the unknown MAC address start to
flood.
B. Summarise the prevention of any two (2) layer 2 attacks. Write your
response in 100150 for the answers.
Prevention VLAN hopping and DHCP spoofing are as:
a. To prevent the VLAN hopping there are several different methods. After
disabling the dynamic trucking protocol, the ports will not be negotiated to
trunks automatically. Secondly, avoid putting any hosts on the default VLAN.
b. To prevent DHCP spoofing we can create anti-spoofing by copying the DHCP
message to the control plane and by using the information contains in the
packets.
Question 18: Summarise the following:
A. Weaknesses of software and hardware Firewalls technologies
Weakness of software and hardware firewalls technologies are as:
•
•
•
Can slow down system applications because it is built on the device itself and
needs more disk space and memory.
Can also prove expensive as such a firewall has to be bought separately for
each device on the network.
Removing from the device may be unwieldy
Weakness of hardware firewall are as:
•
•
•
•
Outgoing traffic as secure and could fail if a malware tries to link from within to
the internet.
We may be more configurable.
They 're vastly more expensive.
With its additional cabling, it takes up more physical space.
B.Importance of Demilitarised Zone based firewalls for the security of
interfaces Write 100-150 words for each.
DMZ's are a key part of network security for individual users as well as big
organisations. These provide the computer network with an extra layer of protection
by limiting remote access to internal servers and information which can be very
damaging if breached. DMZs are intended to operate as a kind of buffer zone
between the private network and the public internet. Deploying the DMZ between
two firewalls involves filtering all inbound network packets using a firewall or other
security system before they appear on the servers that the company hosts in the
DMZ.
P a g e 17 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 19: Answer the following questions:
A.What are the different types of IDPS technologies? Write your answer in 100150 words. The different types of IDPS technologies are;
•
Network-based-network based technologies helps to monitors the
traffic in the particular network segment and also analyses the network
and application protocol.
•
Host-base- Host based technologies normally monitors the
characteristics of a single host and the events that occur within that
host.
•
Network behavior Analysis-Network behavior analysis helps to
examines, detect and stop the unusual network traffic flow in the normal
operations. They also support offline analysis.
•
Wireless- Wireless technologies usually monitors the radio spectrum. It
helps to monitor the network traffic and also analyze it to detect the
suspicious activities that occur in the wireless network protocols
themselves.
B. Compare the host based and network based IDPS? Write your response in
100-150 words.
The compare between the host based and network based IDPS is given below;
•
Network behavior Analysis- they usually monitor’s the network traffic and
give alerts to the threats that generates unusual traffic flow. They also
capture all the data that passes throughout the network and monitor them.
•
Host-base- they usually verify if the attack in the network was successful
or not and also they monitor the user’s activity. They also are capable of
identifying the root of the attacks inside the host.
P a g e 18 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Question 20: Summarise the following:
A.Functions of Internet Key Exchange (IKE) protocol? Write your answer in
100-150 words. The function of Internet key Exchange (IKE) protocols are as below:
•
IKE help to ensure the security for the virtual private network negotiation
and remote host or the network access.
•
•
IKE establishes the secure authentication communication channel.
IKE allows the dynamic authentication of peers and due to which during
the IPsec sessions the encryption can be changed.
•
IKE allows the certification authority.
B. Steps to configure site to site Virtual Private Networks - VPN?
Step 1- logging in to the web-based utility and choose VPN> Site-to-SITE VPN>
basic VPN setup.
Step 2- In case of New Connection Name field, enter a name for the VPN tunnel
that can contain letters, numbers and hyphens only.
Step 3- In Pre-Shared Key field, enter the pre-shared key or password, that will
be the exchanged between the two routers. The password must be between
8 and 49 characters.
Step 4- select the given option In the Protocol drop-down i.e ESP, AH.
Step 5- select Remote Endpoint from the drop-down menu where the options
are; IP Address, FQDN.
Step 6- Enter the remote WAN IP address or FQDN in the Remote WAN IP
Address field.
Step 7- Verify the source IP address in the Local WAN IP Address field is correct.
Step 8- Enter the Private Network (LAN) address of the remote endpoint in the
Remote LAN IP Address field. This is the IP address of the internal
network at the remote site.
Step 9- Verify the private network (LAN) subnet mask of the remote endpoint in
the Remote LAN Subnet Mask field.
Step 10- Enter the private network (LAN) Ip address of the local network in the
Local LAN IP Address field. This is the IP address of the internal network on
the device.
Step 11- Verify the private network (LAN) subnet mask of the local
endpoint in the Local LAN Subnet Mask field. Step 12- Click Save
P a g e 19 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Assessment Task 2 – Unit Project (UP)
Minutes of Meeting
The meeting was organised between the stakeholders (General Manager, Finance Manager,
IT Manager (Bhuwan Ghimire) and system Administrator .The meeting was about to an hour
(10:00-11:00). The following was discussed in the meeting:
 10:00- 10:10- Initially, we discussed the design and implementation of
new network security perimeters for the first 10 minutes
 10:00- 10:20- And instead we addressed ransomware and security techniques to
eliminate it over the next 10 minutes.
 10:20- 10:30- And then in the third process we spoke about a good password system,
how to safeguard the password and how to keep it safe.
 10:30- 10:40-- After that we addressed different antivirus techniques for defending our
device.
 10:40- 10:45- So this came the firewall issue, the one that might be better for an
organisation.
 10:45- 10:50- At this stage, therefore, the participants discussed the main principles
relating to network security.

10:50- 11:00- Eventually, for 10 minutes, all stakeholders made decisions on other
technology options, including applications such as AAA, TACAS+ and RADIUS.
Meeting Objective:
The meeting's main objective was to elaborate the requirements for the design given and how
to implement the security system in the design of the organisation.
Attendees:
Bhuwan Ghimire (IT Manager)
Basanta aryal (System administrator)
Sabita aryal (General Manager)
Ritu aryal (Finance manager)
P a g e 20 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Venue:
SABT
55 High Street Strathfield NSW 2135
Date:
5th June 2020
No
Points Discussed
Actions Suggested
Target Date
1
Designing and implementation of
network security perimeters
This would all be done 10 June 2020
under
a
This
manager's control
2
Malwares
and
mitigation Malwares like
strategies to prevent them
following:
8 June 2020
Trojans, Virus,
Worms, Keyloggers,
Spyware and logic
bombs, Rootkits
Techniques for
Mitigation:
Securing the VPN,
managing the fixes
and applications,
Bolster Access
Control, correct
firewall setup
3
Principles of network security
Follow the principles, 11 June 2020
and ensure that they
are not compromised.
-Think also of the
privacy, quality and
reliability of the
Info.
4
Solutions for security
Do good research for 12 June 2020
a company such as
AAA, TACAS+ on
P a g e 21 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
network
solutions.
-Only
approaches
follow
the
market norm.
Signature of attendee 1:
Bhuwan Ghimire
Signature of attendee 3: Sabita aryal
security
using
that
latest
Signature of attendee 2:
Basanta aryal
Signature of attendee 4:Ritu aryal
Template 1: Report on Layer 2 Security attacks
Purpose:
The company called ALEXA Finance Pvt. Limited is a business which provides financial
services. This business has an excellent reputation in Melbourne city and metropolitan
surroundings. The business operates the personal and financial commercial services. This
company's main office is in The CBD Melbourne and has two sub-branches in the Geelong
and Ballarat regional areas. The method utilised by the company MYOB and ERP which is
supported by the unified structure of management.
ALEXA has processed all the data in the headquarters to provide their clients with the best
support. Therefore, it is very necessary to protect the customer's financial records, because
it has vital consumer details, Group management is also well informed of the quality of all
the data generated. As a consequence, with all the routers , servers, scanners , printers,
wi-fi connexion points, switches, IP phones connecting to an secure network, this
organisation has a well-equipped IT department with the newest equipment with
innovations. By using the LAN connexions, the entire network of the organisation provides
access for centralised data to all employees of the company. Whereas the regional office
sub-branches are linked and accessible by in-house designed technology and the controlled
VPN to the data.
Department:
 IT Department
 Operations
 Finance Department
Stakeholders:
Bhuwan Ghimire (IT Manager)
P a g e 22 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Basanta aryal (System administrator)
Sabita aryal (General Manager)
Ritu aryal (Finance manager)
Supervised by:
 Bhuwan Ghimire (IT Manager)
Switch Security Attacks – Layer 2 Security
Vlan hopping attack:
VLAN hopping is a process by which an end host is able to inject L2 frames into a switched
network that are forwarded on a VLAN foreign to the forwarding host.
Switch spofing: In the switch spoofing attack, the intenders who tries to access the
network, the intruder first aims to link the rogue switch in the network and then configures
the trunk in the network through the switch. If the attacker succeeds in linking the rogue
switch, all traffic from the individual VLANs goes via the Rogue switch, where the attacker
will exploit and abuse the data
Double tagging: Some basics of VLANs are required to understand the Double Tagging
concept. The Virtual LANs used to provide the security on the LAN system by isolating traffic
in the lanes. As the traffic was sending across switches through the trunks, all the VLAN
traffic was marked with an IEEE802.1q. The attacker will nest the flow, which is marked
IP address spoofing:
This form of attack includes the replaces the IP address of the source of the IP packet with
another node. This strategy helps enable an intruder to transmit the multiple packets across
the whole network without going through the Firewall intercepted packet filtering
programme. It then allows an unwanted access to be granted.
Preventing Layer 2 security threats
The additional functionality such as DHCP snooping may be used in the system's catalyst
family for support guard against DHCP starvation violence. DHCP snooping is an important
security feature which helps philtre all unauthorised DHCP messages and also keeps the
P a g e 23 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
binding table for DHCP snooping. THE Binding Table contains MAC address details, Lease
Date, IP address,
We can prevent them by developing software properly and having one or more Security
Countermeasures that guard against each threat/attack(s).
A good place to start is to understand and guard against:
1. SQL injection attacks
2. CSRF - Cross Site Request Forgery
3. XSS - Cross site scripting
If we have a good separation between user interface and business logic then a lot of the
security countermeasures can be coded in the business services API layer. This lessens
the need for front-end developers to understand these security threats.
Therefore, as a result, it's nice to see we have certain tools enabled that can be used to
deter protection attacks on Layer 2. It is, thus, one of the complex features that helps to
define and restrict the station's MAC addresses, which enables access to the same physical
network. Packets do not forward a port outside the defined address group using their source
address
P a g e 24 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Assessment Task 3 - Unit Project (UP)
Activity 1 - (Implementation of Network Security Systems)
Topology
P a g e 25 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
IP Addressing Table
Interface
IP Address
Subnet Mask
Default
Gateway
Switch
Port
G0/1
192.168.1.1
255.255.255.0
N/A
S1 F0/5
S0/0/0
(DCE)
10.1.1.1
255.255.255.252
N/A
N/A
S0/0/0
10.1.1.2
255.255.255.252
N/A
N/A
S0/0/1
(DCE)
10.2.2.2
255.255.255.252
N/A
N/A
G0/1
192.168.3.1
255.255.255.0
N/A
S3 F0/5
S0/0/1
10.2.2.1
255.255.255.252
N/A
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
S1 F0/6
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
S3 F0/18
Device
R1
R2
R3
On router R1
P a g e 26 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Ping from R1 to R3.
If the pings are not successful, troubleshoot the basic device configurations before
continuing.
b. Ping from PC-A, on the R1 LAN, to PC-C, on the R3 LAN.
P a g e 27 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
On the R3 LAN
If the pings are not successful, troubleshoot the basic device configurations before
continuing.
P a g e 28 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Setting Login method for line console o
P a g e 29 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
new password of ciscoconpass for the console.
P a g e 30 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
a new user account with a secret password.
P a g e 31 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Setting ip address for interfaces and their clock rate.
P a g e 32 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
PC-A> telnet 192.168.1.1
P a g e 33 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Configuring line vty 0 4
.
P a g e 34 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
P a g e 35 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
P a g e 36 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Activity 2: (Configuration of Firewall, implementation of VPN):
Network topology:
On Internet router
Router>en
Router#conf t
Router(config)#hostname Internet
Internet(config)#int s0/3/0
Internet(config-if)#clock rate 64000
Internet(config-if)#ip add 10.1.1.1 255.255.255.252
P a g e 37 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Internet(config-if)#desc connection to Mumbai
Internet(config-if)#no shut
Internet(config-if)#int s0/1/0
Internet(config-if)#clock rate 64000
Internet(config-if)#ip add 20.1.1.1 255.255.255.252
Internet(config-if)#desc connection to Paris
Internet(config-if)#no shut
Internet(config-if)#
Internet(config-if)#exit
Internet(config)#exit
Internet#
Internet#copy run start
On Mumbai router
Router>en
Router#conf t
Router(config)#hostname Mumbai
Mumbai(config)#int s0
Mumbai(config-if)#ip add 10.1.1.2 255.255.255.252
Mumbai(config-if)#desc connection to Internet
Mumbai(config-if)#no shut
Mumbai(config-if)#int f0
Mumbai(config-if)#ip add 192.168.10.1 255.255.255.0
Mumbai(config-if)#desc connection to LAN
Mumbai(config-if)#no shut
Mumbai(config-if)#exit
Mumbai(config)#ip route 0.0.0.0 0.0.0.0 10.1.1.1 name to_isp
Mumbai(config)#
On Paris Router
Router>en
Router#conf t
Router(config)#hostname Paris
Paris(config)#int s0
Paris(config-if)#ip add 20.1.1.2 255.255.255.252
Paris(config-if)#desc connection to Internet
Paris(config-if)#no shut
Paris(config-if)#int f0
Paris(config-if)#ip add 192.168.20.1 255.255.255.0
Paris(config-if)#desc connection to LAN
Paris(config-if)#no shut
Paris(config-if)#exit
Paris(config)#ip route 0.0.0.0 0.0.0.0 20.1.1.1 name to_isp
Paris(config)#
P a g e 38 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Next, is VPN configuration on the Mumbai router. First of all, set up an access-list to
match the traffics to be allowed through the VPN tunnel.
Mumbai(config)#ip access-list extended VPN
Mumbai(config-ext-nacl)#permit ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
Mumbai(config-ext-nacl)#exit
Mumbai(config)#
Now, configure IPsec VPN to use the access-list named VPN. Authentication mode is
preshare key (TimiGate). The key must be the same on both routers. See below.
Mumbai(config)#crypto isakmp policy 1
Mumbai(config-isakmp)#authentication pre-share
Mumbai(config-isakmp)#crypto isakmp key TimiGate address 20.1.1.2 (The public IP
address of Paris router)
Mumbai(config-isakmp)#exit
Mumbai(config)#crypto ipsec transform-set TGSET esp-aes esp-sha-hmac
Mumbai(config)#crypto map TGMAP 1 ipsec-isakmp
Mumbai(config-crypto-map)#set peer 20.1.1.2
Mumbai(config-crypto-map)#set transform-set TGSET
Mumbai(config-crypto-map)#match address VPN
Finally, on the Mumbai router, we MUST apply the crypto map to the interface
connecting to the ISP.
Mumbai(config)#int s0/1/0
Mumbai(config-if)#crypto map TGMAP
Now, repeat the process on the Paris router, making sure the IP address of the peer
router matches the public IP address configured on the Paris router. Remember, this
IP must be reachable from the Mumbai router. First, the ACL.
Paris(config)#ip access-list extended VPN
Paris(config-ext-nacl)#permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255
Paris(config-ext-nacl)#exit
P a g e 39 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
Paris(config)#
Next, the VPN configuration proper.
Paris(config)#crypto isakmp policy 1
Paris(config-isakmp)#authentication pre-share
Paris(config-isakmp)#crypto isakmp key TimiGate address 10.1.1.2 (The public IP
address of Paris router)
Paris(config-isakmp)#exit
Paris(config)#crypto ipsec transform-set TGSET esp-aes esp-sha-hmac
Paris(config)#crypto map TGMAP 1 ipsec-isakmp
Paris(config-crypto-map)#set peer 10.1.1.2
Paris(config-crypto-map)#set transform-set TGSET
Paris(config-crypto-map)#match address VPN
Finally, apply the crypto-map to the WAN interface.
Paris(config)#int s0/1/1
Paris(config-if)#crypto map TGMAP
What to note:
The IPsec VPN configuration will be in four phases.
1.Configuration of the access-list to match allowed traffics.
2.Configuration of the authentication phase which in this case makes use of preshare key named TimiGate.
3.Configuration of the encryption phase which in this case uses esp-aes esp-shahmac
4.The placement of the crypto-map on the connecting interface. This must be the
interface with the public IP used in the VPN configuration.
Verification:
P a g e 40 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
To see the status of IPSEC authentication, use the command #sh crypto ipsec sa
command. See output below
For Mumbai
For Paris
P a g e 41 | 42
ICTNWK601 - DESIGN AND IMPLEMENT A SECURITY SYSTEM | BHUWANGHIMIRE | 6335586
P a g e 42 | 42
Download