Secure Access Control Flashcards

1
Q

Types of password protection

A

1) Enable secret password
2) Line password
3) Username password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password Hash Types

A

1) MD5 (default, weak, Type-5)
2) SHA-256 (Type-8)
3) Scrypt (strongest available, Type-9)
4) Vigenère cipher (line passworrd default, very weak, Type-7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command to configure enable secret password

A

Router(config)# enable algorithm-type scrypt secret BLAHBLAH
- default algorithm-type is md5
- global config mode
- verify with show run | i enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Line Password Only Configuration

A

Router(config)# line con 0
Router(config-line)# password BLAHBLAH
Router(config-line)# login
Router(config-line)# exec-timeout 5 0
Router(config)# service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Line Username/Password Configuration

A

Router(config)# username BLAHUSER password BLAHPASS
Router(config)# line con 0
Router(config-line)# login local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ip http authentication local

A
  • command to use the local creds for HTTP/S access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security password min-length BLAHLENGTH

A
  • (Global configuration) Ensure that all configured passwords are at least a specified length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

transport input ssh

A
  • (vty lines) Allows only inbound SSH connections instead of Telnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

login block-for BLAHSECONDS attempts BLAHTRIES within BLAHSECONDS

A
  • (Global configuration) Disables logins after a specific number of failed login attempts within a specific time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

login quiet-mode access-class BLAHACL

A
  • (Global configuration) Named or numbered ACL identifies permitted hosts to ensure that authorized devices can always connect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

login delay BLAHSECONDS

A
  • (Global configuration) Specifies a number of seconds the user must wait between unsuccessful login attempts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

service password-encryption

A
  • enables Type-7 encryption of cleartext passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AAA Framework

A

1) Authentication - Who are you?
2) Authorization - What are you allowed to do?
3) Accounting - What did you do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authetication Methods

A

1) Something you know - credentials
2) Something you have - certificates
3) Something you are - biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command to configure authentication

A

Router(config)# aaa authentication BLAHSERVICE { default | BLAHLIST } BLAHMETHOD1 [ BLAHMETHOD2 …]

  • service is either login, ppp, or dot1x
  • method can be local, enable, none or group for tacacs/radius servers
  • method2 is the fallback for method1, etc
  • none method means access is allowed without creds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Access Server (NAS)

A
  • a client that users contact to gain access to a protected resource
  • typically a router, switch, firewall, or access-point
17
Q

RADIUS Traits

A

1) RFC 2865, RFC 2866
2) UDP 1812 & 1813
3) combines authentication and authorization, and separates accounting
4) one-way, unidirectional, with a single challenge response
5) only encrypts password
6) network access

18
Q

TACACS+ Traits

A

1) Cisco proprietary
2) TCP 49
3) uses AAA model and separates three services
4) two-way, bidirectional, with simple challenge responses
5) encrypts entire packet body
6) device administration

19
Q

Network Access AAA Flow

A
  • usually RADIUS
    1) Access-Request - NAS to RADIUS, contains Username, Password, NAS Info
    2) Access-Challenge (Optional) - RADIUS to NAS, contains reauthentication parameters
    3) Access-Request (if Access-Challenge), NAS to RADIUS, contains Username, Password
    4) Access-Accept / Access-Reject - RADIUS to NAS, contains Reply Attributes (User Service)
    5) Accounting Request - NAS to Radius, contains Accounting Information
    6) Accounting Response - RADIUS to NAS, contains Acknowledgement (Accounting Info Received)
20
Q

Device Access AAA Flow

A
  • Communication between the NAS and TACACS+ server starts with an established TCP connection
    1) START - NAS to TACACS+, initiate authentication request
    2) GET USER - TACACS+ to NAS, Username:
    3) CONTINUE - NAS to TACACS+, Username = BLAHUSER
    4) GET PASS - TACACS+ to NAS, Password:
    5) CONTINUE - NAS to TACACS+, Password = BLAHPASS
    6) ACCEPT/REJECT - TACACS+ to NAS, final status
21
Q

Command to enable AAA

A

aaa new-model
- immediately applies to all lines and interfaces except line con 0
- to avoid being locked out, define a local username first

22
Q

RADIUS Config Steps

A

1) Configure RADIUS Server
2) Add RADIUS server to a group
3) Configure authentication to use the server group
4) Apply the authentication to lines

23
Q

Commands to configure RADIUS server

A

Router(config)# radius server BLAHRADSRV
Router(config-radius-server)# address ipv4 10.255.255.101 auth-port 1812 acct-port 1813
Router(config-radius-server)# key BLAHSECRET

24
Q

Command to associate RADIUS server with a group

A

Router(config)# aaa group server radius BLAHRADGRP
Router(config-sg-radius)# server name BLAHRADSRV

25
Q

Command to apply authentication to a line

A

Router(config)# line vty 0 4
Router(config-line)# login authentication BLAHMETHLIST

  • default method list is automatically applied everywhere except con0
26
Q

Commands to configure TACACS+ server

A

Router(config)# tacacs server BLAHTACSRV
Router(config-server-tacacs)# address ipv4 10.255.255.102
Router(config-server-tacacs)# port 49
Router(config-server-tacacs)# key BLAHKEY

27
Q

Command to associate TACACS+ server with a group

A

Router(config)# aaa group server tacacs+ BLAHTACGRP
Router(config-sg-radius)# server name BLAHTACSRV

28
Q

Commands to configure authorization

A

Router(config)# aaa authorization exec BLAHTACLIST group BLAHTACGRP local if-authenticated
Router(config)# aaa authorization commands 15 BLAHTACLIST group BLAHTACGRP local
Router(config)# aaa authorization config-commands

  • if-authenticated - if the user is authenticated, they will immediately be dropped into enable mode
29
Q

Commands to apply authorization to a line

A

Router(config)# line vty 0 4
Router(config-line)# authorization exec BLAHLIST
Router(config-line)# authorization commands 15 BLAHLIST

  • commands - the server must return permission for any command
  • config-commands - the server must return permission fro config commands
  • exec - the server must return permission for the uer to run a router EXEC session
30
Q

Command to apply authorization to console lines

A

aaa authorization console

31
Q

Command to create accounting method list

A

Router(config)# aaa accounting {system | exec | commands level} {default | list-name} {start-stop | stop-only | wait-start | none} method1 [method2…]

  • system - major router events such as reload are recorded
  • exec - user authentication into an EXEC is recorded, along with inof about user addr, time, and duration of the session
  • commands level - info about any command running at a specific privilege level is recorded along with the user who issued the command
  • start-stop - events are recorded when they start and stop
  • stop-only - events are recorded only when they stop
  • none - no events are recorded
32
Q

Command to apply accounting to a line

A

Router(config-line)# accounting {commands level | connection | exec} {default | list-name}