- General steps:
 - enable AAA authentication with the aaa new-model global command.
 - If using RADIUS or TACACS+, define the ip addresses & encryption keys used by servers by using the following commands.
 - radius-server host,
 - radius-server key,
 - tacacs-server host
 - tacacs-server key
 - Define the default set of authentication methodes used for all CLI access by using command
 - aaa authentication login default
 - Define the default set of authentication method used for enable-mode access by using command
 - aaa authentication enable default
 - For example by using above steps configure 2 RADIUS servers are configured.
 - One of the serveres uses ios default port 1645
 - Other one uses the reserved well known port 1812.
 
Saturday, May 26, 2012
Default Authentication Methodes
Friday, May 25, 2012
AAA: AUTHENTICATION
- AAA Refers to a variety of common security features.
 - AAA: Authentication, Authorization & Accounting
 - The strongest authentication method to protect CLI are:
 - TACACS+
 - RADIUS server
 - The Cisco Secure Access Control Server (ACS)
 - It is a cisco systems software product
 - It can be installed on unix, linux & several windows platforms.
 - It holds a set of usernames & passwords used for authentication
 - Routers & Switches send Usernames & passwords from users are sent to server in encrypted manner.
 
- RADIUSTACACS+Scope of Encryption: Packet payload or just the passwordPassword onlyEntire PayloadLayer 4 ProtocolUDPTCPWell-known Port/IOS default port used for authentication1812/164549/49Standard or CISCO ProprietaryRFC 2865Proprietary
 
Wednesday, May 23, 2012
SSH: SECURE SHELL PROTOCOL
- telnet traffic is sent in a clear text way, so it is not secure.
 - It is a client/server protocol that encrypt the traffic in and out through vty ports.
 - By default cisco router & switches act as SSH clients.
 - To make CISCO router & switches act as SSH servers they must be configured.
 - Authentications is required to connect clients.
 - This authentication can be username & password or authentication with a AAA server .
 - There are 2 versions in SSH
 - Version 2 more secure than the Version 1.
 - Cisco devices supports both versions.
 - Must specify which version u want use.
 - Configuring basic SSH Server requires following steps:
 - Check IOS support ssh or not.
 - Configure a host name (if already config leave it)
 - Config a domain name. (if already config leave it)
 - Config a client authentication method.
 - Router or Switch generate RSA keys that will be used to encrypt the session.
 - specify the SSH version, if u want to use version 2.
 - Disable telnet on the VTY lines.
 - Enable SSH on the VTY lines.
 
SECUIRITY
- 3 Modes to access the user mode is:
 - CONSOLE
 - AUX
 - TELNET
 - Simple user mode CLI password protection
 - line con 0
 - login
 - password cisco
 - line vty 0 15
 - login
 - password cisco
 - these passwords are stored as clear text in the configuration
 - these passwords are encrypted by service password-encryption command
 - service password-encryption
 - line console 0
 - password 7 "type pass here"
 - login
 - line vty 0 4
 - password 7 "type pass here"
 - login
 - after service password-encryption command is added to configuration, all clear text passwords in the running configuration are changed to an encrypted value.
 - Untill copy run start , passwords in startup config are not encrypted.
 - no service password-encryption command cannot automatically decrypt the encrypted passwords.
 - This type encryption is weak, using some public tools can easily decrypt the passwords.
 
Tuesday, May 15, 2012
PIM: Protocol Independent Multicast
- PIM is used for router to router communication.
 - PIM depend upon the unicast routing protocols for topology information.
 - Multicast groups can be either sparse or dense.
 - Multicast interfaces are configured as either sparse or dense or both.
 - PIMv2 hello message: 30sec
 - on PIM enabled interfaces.
 - PIMv2 hold time value: 90sec
 - PIMv2 uses protocol 103 & reserved multicast address 224.0.0.13
 - PIM mode only determine how traffic is send from an interface, not how it recieved.
 - DR Router: single router send IGMP host-query messages to host group membership
 - Highest ip number will be DR
 - Assert Forwarder:
 - one router will be elected & responsible for forwarding multicast traffic.
 - AS election:
 - admin distance to the source
 - lowest metric to the source
 - if tie, highest ip address
 
Saturday, May 12, 2012
IGMP: Internet Group Management Protocol
- IGMP is automatically enabled when PIM enabled.
 - IGMP enables the communication between multicast routers and their hosts.
 - Multicast routers uses the IGMP to send ip packets to what multicast groups on what interfaces.
 - Host Membership query:
 - Routers use the queries to discover the presence of multicast group member on a subnet.
 - general membership query is sent to the group address 0.0.0.0.
 - group specific query is sent to the group address that is required.
 - Host Membership Reports:
 - Hosts replies to queries.
 
RESERVED MULTICAST ADDRESSES
- 224.0.0.1 - All multicast hosts
 - 224.0.0.2 - All multicast routers
 - 224.0.0.4 - DVMRP routers
 - 224.0.0.5 - OSPF routers
 - 224.0.0.6 - OSPF DR routers
 - 224.0.0.9 - RIPv2 routers
 - 224.0.0.10 - EIGRP routers
 - 224.0.0.13 - PIM routers
 - 224.0.0.22 - IGMPv3
 - 224.0.0.25 - RGMP
 - 224.0.0.39 - Auto-RP announce (RP)
 - 224.0.0.40 - Auto-RP Discovery (MA)
 
MULTICASTING
- multicast is udp based
 - source address is always unicast address & never be multicast address.
 - commands used are:
 - sh ip mroute // show the multicast routing table
 - sh ip multicast interface // shows multicast details for the interface
 - clear ip mroute * // clear routes from the multicast routing table
 - ip multicast-routing // globally enables multicast routing on router
 - ip multicast-routing distributed // globally enables multicast routing on a 3560
 
DIFFERENCE BETWEEN PIM-DM & DVMRP
- DVMRP uses its own dinstance vector protocol.
 - update routes for every 60 seconds
 - maximum 32 hops only
 - dvmrp uses probe messages to find neighbors
 
DVMRP
- cisco ios does not support a full implementation of DVRMP
 - but it support connectivety to a dvmrp network.
 - cisco routers enough know about dvmrp to successfully forward multicast packets to and receive pakets from a dvmrp neighbour.
 - dvmrp routes are propagate into & through PIM cloud.
 - these dvmrp routes are maintained in a seperating routing table on each cisco router.
 
Friday, May 11, 2012
Overview of Multicast Routing Protocol
- Routers can forward multicast packet by using
 - dens-mode multicast routing protocol or
 - sparse-mode multicast routing protocl
 
Wednesday, May 9, 2012
MULTICAST CONTROL PLANE
- control plan used to
 - who sent the traffic & to what groups
 - who receiving traffic & for what groups
 - how traffic should be forwarded when it received
 - control plane built with a combination of
 - Host to router communication (IGMP)
 - Router to Router communication (PIM & MSDP)
 
MULTICAST ADDRESSING
- IPv4 multicast uses class D addresses
 - 22.0.0.0/4 (224.0.0.0 - 239.255.255.255)
 - divided into public multicast & some reserved ranges
 - Reserved Ranges are:
 - LINK-LOCAL ADDRESSES
 - 22.0.0.0/24 (224.0.0.0 - 224.0.0.255
 - SOURCE SPECIFIC MULTICAST
 - 232.0.0.0 - 232.255.255.255
 - ADMINISTRATIVELY SCOPED
 - 239.0.0.0 - 239.255.255.255
 
Saturday, May 5, 2012
Friday, May 4, 2012
- Different routing protocols could be used between PE & CE.
 - The PE-CE routing protocols run independently at every site.
 - Redistribution of prefixes between MP-BGP routes PE-CE routing protocol.
 - when using rip:
 - when redistribute the MP-BGP routes into RIP. use
 - redistribute bgp N metric metric {X|transperent}
 - here N is AS number.
 - X is the metric assigned to the RIP routes.
 - if you are using the keyword transperent the rip metric will be recovered from RIP metric learned at the remote site.
 
Subscribe to:
Comments (Atom)