1104
Cisco Press 201 West 103rd Street Indianapolis, IN 46290 USA Cisco Press CCIE Practical Studies: Security (CCIE Self-Study) Dmitry Bokotey Andrew G. Mason Raymond Morrow CCIE.book Page i Monday, May 12, 2003 8:29 AM

CCIE Security

Embed Size (px)

DESCRIPTION

CCIE Security

Citation preview

  • Cisco Press201 West 103rd StreetIndianapolis, IN 46290 USA

    Cisco Press

    CCIE Practical Studies: Security (CCIE Self-Study)

    Dmitry BokoteyAndrew G. MasonRaymond Morrow

    CCIE.book Page i Monday, May 12, 2003 8:29 AM

  • ii

    CCIE Practical Studies: Security (CCIE Self-Study)

    Dmitry Bokotey, Andrew G. Mason, and Raymond MorrowCopyright 2003 Cisco PressPublished by:Cisco Press201 West 103rd StreetIndianapolis, IN 46290 USAAll rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review.Printed in the United States of America 1 2 3 4 5 6 7 8 9 0First Printing June 2003Library of Congress Cataloging-in-Publication Number: 2002105412ISBN: 1-58705-110-9

    Warning and Disclaimer

    This book is designed to provide information for CCIE Security candidates looking for hands-on study. Every effort has been made to make this book as complete and accurate as possible, but no warranty or tness is implied.The information is provided on an as is basis. The authors, Cisco Press, and Cisco Systems, Inc., shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it.The opinions expressed in this book belong to the authors and are not necessarily those of Cisco Systems, Inc.

    Trademark Acknowledgments

    All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

    Feedback Information

    At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members of the professional technical community.Reader feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through e-mail at [email protected]. Please make sure to include the book title and ISBN in your message.We greatly appreciate your assistance.

    CCIE.book Page ii Monday, May 12, 2003 8:29 AM

  • iii

    Publisher John WaitEditor-in-Chief John KaneExecutive Editor Brett BartowCisco Representative Anthony WolfendenCisco Press Program Manager Sonia Torres ChavezManager, Marketing Communications, Scott MillerCisco SystemsCisco Marketing Program Manager Edie QuirozProduction Manager Patrick KanouseDevelopment Editor Dayna IsleyProject Editor Marc FowlerCopy Editor Gayle Johnson

    Progressive Publishing AlternativesTechnical Editors Maurilio Gorito

    Randy IvenerMartin Walshaw

    Team Coordinator Tammi RossBook Designer Gina RexrodeCover Designer Louisa AdairComposition Octal Publishing, Inc.Indexer Tim Wright

    CCIE.book Page iii Monday, May 12, 2003 8:29 AM

  • iv

    About the Authors

    Dmitry Bokotey,

    CCIE No. 4460, holds a triple CCIE title in the elds of Routing and Switching, ISP Dial, and Secu-rity. He is a network consulting engineer with the U.S. Advanced Engineering Service IP/MPLS Core Technologies depart-ment of Cisco Systems. For the past ten years, he has designed and implemented diverse networking environments for various large enterprise and service provider customers. Over the course of his career, he has presented seminars about numerous advanced networking subjects. He is currently working on another Cisco Press book,

    CCNP Practical Stud-ies: Remote Access

    .

    Andrew G. Mason,

    CCIE No. 7144, CCDP, CSS1, CCNP: Security is the technical director of Boxing Orange (www.boxingorange.com), a UK-based Cisco VPN/Security partner specializing in the design and implementation of Cisco security solutions. He has 12 years of experience in the networking industry and has provided services for many large organizations worldwide.

    Raymond Morrow,

    CCIE No. 4146, CSS1, Cisco IP Telephony Design Specialist, is currently employed at Northrop Grumman. Previously, he was a principal consultant with Computer Solutions, a San Antonio, Texas-based Cisco Silver Partner with Security and VPN Partner specialization. He has 16 years of experience in the networking arena and designs and implements various networking projects to a diverse customer base. Currently he is studying for his CCIE Security Lab exam after having passed the CCIE Security Qualication exam. He is also working on another writing project

    CCNP Practical Studies: Remote Access

    for Cisco Press.

    About the Technical Reviewers

    Maurilio Gorito,

    CCIE No. 3807, is a triple CCIE, having certied in Routing & Switching in 1998, WAN Switching in 2001, and Security in 2003. Maurilio has more than 16 years of experience in networking including Cisco networks and SNA environments. It covers the planning, designing, implementation, and troubleshooting of large IP networks running IGRP, EIGRP, BGP, OSPF, QoS, and SNA worldwide, including Brazil and the U.S. He also has more than seven years of experience in teaching technical classes at schools and companies. Maurilio is currently a content engineer for Cisco Systems, Inc. He is part of the CCIE team responsible for helping in content development for CCIE lab exams, perform-ing content technical review for CCIE lab exams, contacting candidates as part of the CCIE customer service, and proc-toring CCIE Routing & Switching and CCIE Security lab exams at the CCIE Lab in San Jose, CA, U.S. He holds degree in Mathematics and Pedagogy.

    Randy Ivener,

    CCIE No. 10722, is a security specialist with Cisco Systems Advanced Services. He is a Certied Informa-tion Systems Security Professional and ASQ Certied Software Quality Engineer. He has spent several years as a net-work security consultant, helping companies understand and secure their networks. He has worked with many security products and technologies, including rewalls, VPNs, intrusion detection, and authentication systems. Before becoming immersed in security, he spent time in software development and as a training instructor. He graduated from the U.S. Naval Academy and holds a masters degree in business administration.

    Martin Walshaw,

    CCIE No. 5629, CISSP, CCNP, CCDP, is a Systems Engineer working for Cisco Systems in the Enter-prise Line of Business in South Africa. His areas of specialty include convergence, security, and content delivery net-working, which keeps him busy both night and day. During the last 15 years, Martin has dabbled in many aspects of the IT industry, ranging from programming in RPG III and Cobol to PC sales. When Martin is not working, he likes to spend all of his available time with his patient wife Val, and his sons Joshua and Callum. Without their patience, understand-ing, and support projects such as this would not be possible.

    CCIE.book Page iv Monday, May 12, 2003 8:29 AM

  • v

    Dedications

    Dmitry Bokotey:

    To my wife, Alina, for her never-ending patience and support, for being there from the start, and for never doubting any of my silly ideas.To my daughter, Alyssa, for bringing light and meaning to my existence every day.

    Andrew Mason:

    I would like to dedicate this book to my family. Helen, my beautiful wife, has yet again endured the late nights and busy weekends with nothing but support and belief in me. My two wonderful children, Rosie and Jack, keep me going and constantly remind me just what a lucky guy I am.

    Raymond Morrow:

    I would like to dedicate this book to the woman who means the world to me and whose smile can always brighten my day and to the best children a parent could possibly ask for.

    CCIE.book Page v Monday, May 12, 2003 8:29 AM

  • vi

    Acknowledgments

    Dmitry Bokotey:

    This book is a product of collective effort. I would like to thank my coauthors, Andrew Mason and Raymond Morrow, for introducing me to the world of publishing, for their willingness to synchronize and compromise, and for their professionalism and knowledge. Im forever grateful to my wife, Alina, for her help with writing and editing my chapters.I would also like to thank the team at Cisco Press, especially Brett Bartow, for believing in me and keeping all of us on track; all the technical reviewers; and Dayna Isley for their invaluable input in making this a better book.Big thanks to the Cisco Systems CCIE department, especially Kathe Saccenti, who helped me become a better engineer. Also, Im thankful for my Cisco Systems colleagues and managersRosa Elena Lorenzana and Sanjay Palsupport and respect.Finally, I want to thank my parents for letting me spend days and nights beside my computer, no matter how pointless they thought it was.

    Andrew Mason:

    This book was written by me and two authors whom I have never met and who live on the other side of the world. We immediately formed a team and worked together on this project. I would like to thank them both, Dmitry and Raymond, for their immaculate and professional work on this book. It has been a pleasure.I would like to thank Brett Bartow and Dayna Isley of Cisco Press for all their help and guidance. They add so much value to the whole process and ease the burden on the authors.Thanks also go out to Max Leitch and all the staff at Boxing Orange for their support and help along the way.

    Raymond Morrow:

    Writing this book is the completion of a lifelong dream. Without the support I have received from my family, friends, coauthors, and the dedicated staff at Cisco Press, I would never have been able to make this dream a reality. Without the encouragement of my wife, Liz, and the understanding of my children as to why I spent so much time in front of my computer, this book would have been only half-completed.This type of book, as well as the scope of the subject, would be practically impossible for one person to write, so I need to thank my coauthors, Dmitry Bokotey and Andrew Mason, for their willingness to compromise and collaborate on what has resulted in a project we can all be proud of. Of course, someone has to keep us all on track and in the proper direction, so a big thanks goes out to Brett Bartow, who knows when to give in and when not to, and to Dayna Isley for her wonderful suggestions, without which this book would have been one big jumble of words from three separate people.

    CCIE.book Page vi Monday, May 12, 2003 8:29 AM

  • vii

    Contents at a Glance

    Foreword xxvii

    Introduction xxviii

    Part I The CCIE Program and Your Lab Environment 3

    Chapter 1

    The CCIE Security Program 5

    Chapter 2

    Building a CCIE Mind-Set 13

    Chapter 3

    Building the Test Laboratory 21

    Part II Connectivity 29

    Chapter 4

    Layer 2 and Layer 3 Switching and LAN Connectivity 31

    Chapter 5

    Frame Relay Connectivity 83

    Chapter 6

    ISDN Connectivity 133

    Chapter 7

    ATM Connectivity 183

    Part III IP Routing 199

    Chapter 8

    RIP 201

    Chapter 9

    EIGRP 239

    Chapter 10

    OSPF 277

    Chapter 11

    IS-IS 321

    Chapter 12

    BGP 351

    Chapter 13

    Redistribution 397

    Part IV Security Practices 425

    Chapter 14

    Security Primer 427

    Chapter 15

    Basic Cisco IOS Software and Catalyst 3550 Series Security 441

    CCIE.book Page vii Monday, May 12, 2003 8:29 AM

  • viii

    Chapter 16

    Access Control Lists 477

    Chapter 17

    IP Services 523

    Part V Authentication and Virtual Private Networks 565

    Chapter 18

    AAA Services 567

    Chapter 19

    Virtual Private Networks 631

    Chapter 20

    Advanced Virtual Private Networks 715

    Chapter 21

    Virtual Private Dialup Networks 749

    Part VI Firewalls 773

    Chapter 22

    Cisco IOS Firewall 775

    Chapter 23

    Cisco PIX Firewall 813

    Part VII Intrusion Detection 857

    Chapter 24

    IDS on the Cisco PIX Firewall and IOS Software 859

    Chapter 25

    Internet Service Provider Security Services 879

    Part VIII Sample Lab Scenarios 899

    Chapter 26

    Sample Lab Scenarios 901

    Part IX Appendixes 955

    Appendix A

    Basic UNIX Security 957

    Appendix B

    Basic Windows Security 969

    Appendix C

    ISDN Error Codes and Debugging Reference 983

    Appendix D

    Password Recovery on Cisco IOS, CatalystOS, and PIX 995

    Appendix E

    Security-Related RFCs and Publications 1017

    Appendix F

    Answers to the Review Questions 1029

    CCIE.book Page viii Monday, May 12, 2003 8:29 AM

  • ix

    Table of Contents

    Foreword xxvii

    Introduction xxviii

    Part I The CCIE Program and Your Lab Environment 3

    Chapter 1

    The CCIE Security Program 5

    The Cisco CCIE Program 5

    The CCIE Security Exam 5Qualification Exam 6Lab Exam 9

    Summary 10

    Chapter 2

    Building a CCIE Mind-Set 13

    What It Takes to Become a CCIE 13

    Developing Proper Study Habits 14Good Study Habits 15Common Study Traps 16

    Lab Experience Versus Real-World Experience 18

    Summary 19

    Chapter 3

    Building the Test Laboratory 21

    Study Time on a Lab 21Work-Based Study Lab 22Home-Based Study Lab 22Remote Lab 23

    Planning Your Home Lab 23Sourcing the Lab Equipment 24Windows-based Products and UNIX 26

    Designing Your Practice Lab for This Book 26

    Summary 27

  • x

    Part II Connectivity 29

    Chapter 4

    Layer 2 and Layer 3 Switching and LAN Connectivity 31

    Catalyst Operating System 31

    Switching Overview 32Switching Technologies 32Transparent Bridging 33

    Spanning Tree Overview 34Bridge Protocol Data Unit 35Election Process 37Spanning-Tree Interface States 38Spanning-Tree Address Management 40STP and IEEE 802.1q Trunks 40VLAN-Bridge STP 41STP and Redundant Connectivity 41Accelerated Aging to Retain Connectivity 41RSTP and MSTP 42

    Layer 3 Switching Overview 42

    Virtual LAN Overview 42Assigning or Modifying VLANs 44Deleting VLANs 45Configuring Extended-Range VLANs 46

    VLAN Trunking Protocol Overview 46The VTP Domain 46VTP Modes 46VTP Passwords 47VTP Advertisements 47VTP Version 2 48VTP Pruning 49VTP Configuration Guidelines 50Displaying VTP 50

    Switch Interface Overview 51Access Ports 51Trunk Ports 51Routed Ports 52

    EtherChannel Overview 53Port-Channel Interfaces 54Understanding the Port Aggregation Protocol 54EtherChannel Load Balancing and Forwarding Methods 55

  • xi

    EtherChannel Configuration Guidelines 56Creating Layer 2 EtherChannels 57

    Optional Configuration Items 57BPDU Guard 57BPDU Filtering 58UplinkFast 58BackboneFast 59Loop Guard 59

    Switched Port Analyzer Overview 59SPAN Session 60Configuring SPAN 60

    Basic Catalyst 3550 Switch Configuration 63Case Study 4-1: Basic Network Connectivity 63Case Study 4-2: Configuring Interfaces 70Case Study 4-3: Configuring PortFast 72Case Study 4-4: Creating a Layer 2 EtherChannel 72Case Study 4-5: Creating Trunks 73Case Study 4-6: Configuring Layer 3 EtherChannels 74Case Study 4-7: EtherChannel Load Balancing 76Case Study 4-8: Configuring a Routed Port 77Case Study 4-9: Configuring SPAN 78

    Summary 80

    Review Questions 80FAQs 81

    Chapter 5

    Frame Relay Connectivity 83

    Frame Relay Overview 83

    Frame Relay Devices 85

    Frame Relay Topologies 86Star Topologies 86Fully Meshed Topologies 87Partially Meshed Topologies 87Frame Relay Subinterfaces 88

    Frame Relay Virtual Circuits 89Switched Virtual Circuits 90Permanent Virtual Circuits 91

    Frame Relay Signaling 91LMI Frame Format 92

  • xii

    LMI Timers 93LMI Autosense 95

    Network-to-Network Interface 95

    User-Network Interface 96

    Congestion-Control Mechanisms 96Frame Relay Discard Eligibility 98DLCI Priority Levels 98Frame Relay Error Checking 99Frame Relay ForeSight 99Frame Relay Congestion Notification Methods 100Frame Relay End-to-End Keepalives 100

    Configuring Frame Relay 102Case Study 5-1: Configuring Frame Relay 102Case Study 5-2: Configuring Frame Relay SVCs 109Case Study 5-3: Frame Relay Traffic Shaping 114

    Creating a Broadcast Queue for an Interface 119Transparent Bridging and Frame Relay 120

    Configuring a Backup Interface for a Subinterface 120

    TCP/IP Header Compression 121Configuring an Individual IP Map for TCP/IP Header Compression 121Configuring an Interface for TCP/IP Header Compression 122Disabling TCP/IP Header Compression 122

    Troubleshooting Frame Relay Connectivity 122The

    show frame-relay

    lmi Command 122The

    show frame-relay

    pvc Command 123The

    show frame-relay

    map Command 125The

    debug frame-relay

    lmi Command 125

    Summary 126

    Review Questions 127FAQs 128

    Chapter 6

    ISDN Connectivity 133

    ISDN Overview 133ISDN Standards Support 133ISDN Digital Channels 134ISDN Terminal Equipment and Network Termination Devices 134

  • xiii

    Reference Points 135ISDN Layers and Call Stages 136

    Point-to-Point Protocol (PPP) Overview 139Link Control Protocol (LCP) 139Network Control Protocol (NCP) 140

    Dial-on-Demand Routing (DDR) Overview 141Configuring ISDN 142

    Lesson 6-1: Beginning ISDN Configuration 142Lesson 6-2: Configuring DDR 144Lesson 6-3: Routing Over ISDN 149Lesson 6-4: Configuring the Interface and Backup Interface 157Lesson 6-5: Configuring PPP Options 160Lesson 6-6: Configuring Advanced Options 161Lesson 6-7: Monitoring and Troubleshooting ISDN 169

    Summary 178

    Review Questions 178FAQs 180

    Chapter 7

    ATM Connectivity 183

    ATM Overview 183

    Configuring ATM 184Lesson 7-1: RFC 2684: Multiprotocol Encapsulation over AAL5 185Lesson 7-2: RFC 2225: Classical IP and ARP over ATM 191

    Summary 195

    Review Questions 195FAQs 196

    Part III IP Routing 199

    Chapter 8

    RIP 201

    RIP Structure 201Routing Updates and Timers 201Routing Metric 202Split-Horizon Issues 202RIP and Default Routes 203RIPv1 Versus RIPv2 203

  • xiv

    Configuring RIP 203Case Study 8-1: Basic RIP Configuration 204Case Study 8-2: RIPv1 over Router to PIX 5.2 Connection 221Case Study 8-3: RIPv2 over Router to PIX 6.2 Connection with Authentication 225Lesson 8-1: Advanced RIP Configuration 233

    Summary 235

    Review Questions 235FAQs 236

    Chapter 9

    EIGRP 239

    An EIGRP Overview 240

    Configuring EIGRP 241Lesson 9-1: Configuring Simple EIGRP 241

    EIGRP Building Blocks 243Packet Formats 243EIGRP Tables 244Feasible Successors 250Route States 250Route Tagging 251IGRP and EIGRP Interoperability 251An Example of DUAL in Action 251

    Configuring EIGRP Options 253Lesson 9-2: Adding a WAN Connection 253Lesson 9-3: Logging Neighbor Adjacency Changes 255Lesson 9-4: Disabling Route Summarization 256Lesson 9-5: Configuring Manual Route Summarization 258Lesson 9-6: Configuring Default Routing 259Lesson 9-7: Controlling EIGRP Routes 261Lesson 9-8: Redistributing EIGRP with Route Controls 263Lesson 9-9: Configuring EIGRP Route Authentication 263Lesson 9-10: Configuring EIGRP Stub Routing 264Lesson 9-11: Configuring EIGRP Over GRE Tunnels 266Lesson 9-12: Disabling EIGRP Split Horizon 269

    Troubleshooting EIGRP 270

    Summary 272

    Review Questions 272FAQs 273

  • xv

    Chapter 10

    OSPF 277

    Configuring OSPF 278Case Study 10-1: Basic OSPF Configuration 279Case Study 10-2: OSPF and Route Summarization 306Case Study 10-3: OSPF Filtering 310Case Study 10-4: OSPF and Non-IP Traffic over GRE 312

    Monitoring and Maintaining OSPF 315Verifying OSPF ABR Type 3 LSA Filtering 316Displaying OSPF Update Packet Pacing 317

    Summary 317

    Review Questions 317FAQs 318

    Chapter 11

    IS-IS 321

    Integrated IS-IS Overview 321

    Configuring IS-IS 322Case Study 11-1: Configuring IS-IS for IP 322

    IS-IS Building Blocks 328

    The IS-IS State Machine 330The Receive Process 330The Update Process 331The Decision Process 331The Forward Process 331

    Pseudonodes 331

    IS-IS Addressing 333The Simplified NSAP Format 333Addressing Requirements 334

    Limiting LSP Flooding 335Blocking Flooding on Specific Interfaces 335Configuring Mesh Groups 336

    Generating a Default Route 336

    Route Redistribution 337

    Setting IS-IS Optional Parameters 338Setting the Advertised Hello Interval 339Setting the Advertised CSNP Interval 339

  • xvi

    Setting the Retransmission Interval 339Setting the LSP Transmission Interval 339

    Configuring IS-IS Authentication 340Case Study 11-2: IS-IS Authentication 340Authentication Problems 345

    Using

    show

    and

    debug

    Commands 346Monitoring IS-IS 346Debugging IS-IS 346

    Summary 348

    Review Questions 348FAQs 349

    Chapter 12

    BGP 351

    Understanding BGP Concepts 351Autonomous Systems 351BGP Functionality 352EBGP and IBGP 352BGP Updates 353

    Configuring BGP 353Case Study 12-1: Single-Homed Autonomous System Setup 354Case Study 12-2: Transit Autonomous System Setup 363Case Study 12-3: BGP Confederations 372Case Study 12-4: BGP Over a Firewall with a Private Autonomous System 377Case Study 12-5: BGP Through a Firewall with Prepend 386

    Summary 394

    Review Questions 394FAQ 395

    Chapter 13

    Redistribution 397

    Metrics 397

    Administrative Distance 398

    Classless and Classful Capabilities 398

    Avoiding Problems Due to Redistribution 399

    Configuring Redistribution of Routing Information 399Redistributing Connected Networks into OSPF 402Lesson 13-1: Redistributing OSPF into Border Gateway Protocol 402

  • xvii

    Lesson 13-2: Redistributing OSPF Not-So-Stubby Area External Routes into BGP 405Lesson 13-3: Redistributing Routes Between OSPF and RIP Version 1 407Lesson 13-4: Redistributing Between Two EIGRP Autonomous Systems 408Lesson 13-5: Redistributing Routes Between EIGRP and IGRP in Two Different Autonomous Systems 409Lesson 13-6: Redistributing Routes Between EIGRP and IGRP in the Same Autonomous System 411Redistributing Routes to and from Other Protocols from EIGRP 412Lesson 13-7: Redistributing Static Routes to Interfaces with EIGRP 412Lesson 13-8: Redistributing Directly Connected Networks 413Lesson 13-9: Filtering Routing Information 416

    Summary 421

    Review Questions 422FAQs 423

    Part IV Security Practices 425

    Chapter 14

    Security Primer 427

    Important Security Acronyms 428

    White Hats Versus Black Hats 432

    Cisco Security Implementations 432Cisco IOS Security Overview 433CatalystOS Security Overview 434

    VPN Overview 435

    AAA Overview 436

    IDS Fundamentals 436

    Summary 437

    Review Questions 437FAQs 438

    Chapter 15

    Basic Cisco IOS Software and Catalyst 3550 Series Security 441

    Cisco IOS Software Security 441Network Time Protocol Security 441HTTP Server Security 442Password Management 442

  • xviii

    Access Lists 443Secure Shell 443

    Basic IOS Security Configuration 443Lesson 15-1: Configuring Passwords, Privileges, and Logins 444Lesson 15-2: Disabling Services 451Lesson 15-3: Setting up a Secure HTTP Server 456Case Study 15-1: Secure NTP Configuration 458Case Study 15-2: Configuring SSH 464

    Catalyst 3550 Security 467Lesson 15-4: Port-Based Traffic Control 467

    Summary 472

    Review Questions 473FAQs 474

    Chapter 16

    Access Control Lists 477

    Overview of Access Control Lists 477Where to Configure an ACL 478When to Configure an ACL 479

    ACLs on the IOS Router and the Catalyst 3550 Switch 480Basic ACLs 480Advanced ACLs 482

    Time-of-Day ACLs 483

    Lock-and-Key ACLs 484Why You Should Use Lock-and-Key 485When You Should Use Lock-and-Key 485Source-Address Spoofing and Lock-and-Key 485Lock-and-Key Configuration Tips 485Verifying Lock-and-Key Configuration 487Maintaining Lock-and-Key 487Manually Deleting Dynamic Access List Entries 487

    Reflexive ACLs 488Reflexive ACL Benefits and Restrictions 489Reflexive ACL Design Considerations 489

    Router ACLs 490

    Port ACLs 490VLAN Maps 491Using VLAN Maps with Router ACLs 491

  • xix

    Fragmented and Unfragmented Traffic 493

    Logging ACLs 494

    Defining ACLs 495The Implied Deny All Traffic ACE Statement 495ACE Entry Order 496Applying ACLs to Interfaces 496Lesson 16-1: Configuring an ACL 498Lesson 16-2: Creating a Numbered Standard IP ACL 502Lesson 16-3: Creating a Numbered Extended IP ACL 502Lesson 16-4: Creating a Named Standard IP ACL 503Lesson 16-5: Creating a Named Extended IP ACL 503Lesson 16-6: Implementing Time of Day and ACLs 504Lesson 16-7: Configuring Lock-and-Key 506Lesson 16-8: Configuring Reflexive ACLs 507Lesson 16-9: Logging ACLs 511Lesson 16-10: Configuring a Named MAC Extended ACL 512Creating a VLAN Map 513Lesson 16-11: Using ACLs with VLAN Maps 513

    Maintaining ACLs 514Displaying ACL Resource Usage 515Troubleshooting Configuration Issues 516ACL Configuration Size 517

    Unsupported Features on the Catalyst 3550 Switch 518

    Summary 519

    Review Questions 519FAQs 520

    Chapter 17

    IP Services 523

    Managing IP Connections 523ICMP Unreachable Messages 524ICMP Redirect Messages 524ICMP Mask Reply Messages 525IP Path MTU Discovery 525

    MTU Packet Size 526IP Source Routing 526Simplex Ethernet Interfaces 527DRP Server Agents 527

    Filtering IP Packets Using Access Lists 527

  • xx

    Hot Standby Router Protocol Overview 528HSRP and ICMP Redirects 528

    IP Accounting Overview 530IP MAC Accounting 530IP Precedence Accounting 531

    Configuring TCP Performance Parameters 531Compressing TCP Packet Headers 532Setting the TCP Connection Attempt Time 533Using TCP Path MTU Discovery 533Using TCP Selective Acknowledgment 534Using TCP Time Stamps 534Setting the TCP Maximum Read Size 534Setting the TCP Window Size 535Setting the TCP Outgoing Queue Size 535

    Configuring the MultiNode Load Balancing Forwarding Agent 535Configuring the MNLB Forwarding Agent 536

    Network Address Translation Overview 537When to Use NAT 539

    Configuring IP Services 539Lesson 17-1: Configuring ICMP Redirects 539Lesson 17-2: Configuring the DRP Server Agent 540Lesson 17-3: Configuring HSRP 541Lesson 17-4: Configuring IP Accounting 548Lesson 17-5: Configuring NAT 549

    Monitoring and Maintaining IP Services 555Verifying HSRP Support for MPLS VPNs 556Displaying System and Network Statistics 556Clearing Caches, Tables, and Databases 557Monitoring and Maintaining the DRP Server Agent 558Clearing the Access List Counters 558Monitoring the MNLB Forwarding Agent 558Monitoring and Maintaining HSRP Support for ICMP Redirect Messages 558Monitoring and Maintaining NAT 559

    Summary 559

    Review Questions 560FAQs 561

  • xxi

    Part V Authentication and Virtual Private Networks 565

    Chapter 18

    AAA Services 567

    TACACS+ Versus RADIUS 567Underlying Protocols 567Packet Encryption 568Authentication, Authorization, and Accounting Processes 568Router Management 568Interoperability 568Traffic 569

    Configuring AAA 569Case Study 18-1: Simplified AAA Configuration Using RADIUS 569Case Study 18-2: Configuring AAA on a PIX Firewall 581Case Study 18-3: Configuring VPN Client Remote Access 593Case Study 18-4: Authentication Proxy with TACACS+ 610Case Study 18-5: Privilege Levels with TACACS+ 617Case Study 18-6: Configuring PPP Callback with TACACS+ 621

    Summary 627

    Review Questions 627FAQs 628

    Chapter 19

    Virtual Private Networks 631

    Virtual Private Network (VPN) Overview 631Site-to-Site VPNs 631Remote-Access VPNs 633

    IPSec Overview 633Authentication Header (AH) 634Encapsulating Security Payload (ESP) 635IPSec Protocol Suite 636

    Tunnel and Transport Modes 639

    IPSec Operation 640Defining Interesting Traffic 641IKE Phase 1 641IKE Phase 2 642IPSec Encrypted Tunnel 643Tunnel Termination 643

  • xxii

    Configuring IPSec in Cisco IOS Software and PIX Firewalls 643Case Study 19-1: Configuring a Basic IOS-to-IOS IPSec VPN 644Case Study 19-2: Configuring a Basic PIX-to-PIX IPSec VPN 671

    Certificate Authority (CA) Support 695Configuring CA 696IOS-to-IOS VPN Using CA 696PIX-to-PIX VPN Using CA 703

    Summary 710

    Review Questions 711FAQs 712

    Chapter 20

    Advanced Virtual Private Networks 715

    Issues with Conventional IPSec VPNs 715Solving IPSec Issues with GREs 716Solving IPSec Issues with DMVPNs 716

    Configuring Advanced VPNs 718Case Study 20-1: Using Dynamic Routing Over IPSec-Protected VPNs 718Case Study 20-2: Configuring DMVPN 732

    Summary 745

    Review Questions 746FAQs 747

    Chapter 21

    Virtual Private Dialup Networks 749

    L2F and L2TP Overview 749

    VPDN Process Overview 749

    PPTP Overview 751

    Configuring VPDNs 752Case Study 21-1: Configuring the VPDN to Work with Local AAA 752Case Study 21-2: Configuring TACACS+ Authentication and Authorization for VPDN 761Case Study 21-3: Configuring the PIX Firewall to Use PPTP 766Lesson 21-1: Configuring the Default VPDN Group Template 768

    Summary 769

    Review Questions 770FAQs 771

  • xxiii

    Part VI Firewalls 773

    Chapter 22

    Cisco IOS Firewall 775

    Creating a Customized Firewall 776

    Configuring TCP Intercept 776Lesson 22-1: Configuring TCP Intercept 778

    CBAC Overview 781Traffic Filtering 781Traffic Inspection 782Alerts and Audit Trails 782Intrusion Detection 783CBAC Limitations and Restrictions 783CBAC Operation 784When and Where to Configure CBAC 790CBAC-Supported Protocols 790Using IPSec with CBAC 791Lesson 22-2: Configuring CBAC 791Monitoring and Maintaining CBAC 798Turning Off CBAC 802Case Study 22-1: Configuring CBAC on Two Interfaces 802

    Port-to-Application Mapping (PAM) 806How PAM Works 806When to Use PAM 808Lesson 22-3: Configuring PAM 808Monitoring and Maintaining PAM 810

    Summary 810

    Review Questions 810FAQs 811

    Chapter 23

    Cisco PIX Firewall 813

    Security Levels and Address Translation 813

    TCP and UDP 814

    Configuring a Cisco PIX Firewall 814Lesson 23-1: Configuring the PIX Firewall Basics 815Lesson 23-2: Configuring Network Protection and Controlling Its Access and Use 824Lesson 23-3: Supporting Specific Protocols and Applications 834Lesson 23-4: Monitoring the PIX Firewall 838

  • xxiv

    Lesson 23-5: Using the PIX Firewall as a DHCP Server 844Lesson 23-6: New Features in PIX Firewall Version 6.2 846

    Summary 854

    Review Questions 854FAQs 855

    Part VII Intrusion Detection 857

    Chapter 24

    IDS on the Cisco PIX Firewall and IOS Software 859

    Cisco IOS Software Intrusion Detection 859

    Cisco PIX Firewall Intrusion Detection 860

    Cisco IOS Software and PIX IDS Signatures 861

    Configuring Cisco IDS 867Case Study 24-1: Configuring the Cisco IOS Software IDS 867Case Study 24-2: Configuring the Cisco Secure PIX Firewall IDS 870

    Summary 874

    Review Questions 874FAQs 876

    Chapter 25

    Internet Service Provider Security Services 879

    Preventing Denial-of-Service Attacks 879Committed Access Rate (CAR) 879Reverse Path Forwarding (RPF) 880

    Layer 2 VPN (L2VPN) 880802.1Q 881Layer 2 Protocol Tunneling 881

    Configuring ISP Services 881Case Study 25-1: DoS Prevention Through Rate Limiting 882Case Study 25-2: DoS Prevention Through RPF 886Case Study 25-3: Configuring L2VPN 887

    Summary 895

    Review Questions 895FAQs 896

  • xxv

    Part VIII Sample Lab Scenarios 899

    Chapter 26

    Sample Lab Scenarios 901

    Practice Lab Format 901

    How the Master Lab Compares to the CCIE Security Lab Exam 902

    CCIE Practice Lab 1: Building Layer 2 903Equipment List 903Prestaging: Configuring the Frame Relay Switch 904Prestaging: Configuring the First Backbone Router, R9-BB1 905Prestaging: Configuring the Second Backbone Router, R7-BB2 907Lab Rules 909Timed Portion 909

    CCIE Practice Lab 2: Routing 911Equipment List 911Lab Rules 912Timed Portion 913

    CCIE Practice Lab 3: Configuring Protocol Redistribution and Dial Backup 915Equipment List 915Lab Rules 915Timed Portion 916

    CCIE Practice Lab 4: Configuring Basic Security 917Equipment List 917Lab Rules 919Timed Portion 919

    CCIE Practice Lab 5: Dial and Application Security 921Equipment List 921Lab Rules 921Timed Portion 922

    CCIE Practice Lab 6: Configuring Advanced Security Features 926Equipment List 926Lab Rules 926Timed Portion 927

    CCIE Practice Lab 7: Service Provider 931Equipment List 931Lab Rules 932Timed Portion 932

    CCIE Practice Lab 8: All-Inclusive Master Lab 933Equipment List 933

  • xxvi

    Prestaging: Configuring the Frame Relay Switch 934Prestaging: Configuring the First Backbone Router, R7-BB1 936Prestaging: Configuring the Second Backbone Router, R7-BB2 937Prestaging: Configuring the Reverse Telnet Router 940Lab Rules 941Timed Portion 942

    Summary 952

    Part IX Appendixes 955

    Appendix A

    Basic UNIX Security 957

    Appendix B

    Basic Windows Security 969

    Appendix C

    ISDN Error Codes and Debugging Reference 983

    Appendix D

    Password Recovery on Cisco IOS, CatalystOS, and PIX 995

    Appendix E

    Security-Related RFCs and Publications 1017

    Appendix F

    Answers to the Review Questions 1029

  • xxvii

    ForewordWe are beyond the revolution that can be called networking. Most employees have become sophisticated in applications that deploy networking, and words that link actions with i or e are assumed to be tools that are done in conjunction with some type of Internet function. Those who ride on the wake of this movement as networking specialists are con-fronted with ne-tuning and, in some cases, reengineering network resources, with greater attention paid to security. Now that the networking industry has achieved tremendous popularity, we perceive security breaches as having the potential to impact huge numbers of users. The effort to secure networks now far outweighs any perceived trade-offs in network-ing efciency. A networking person who possesses the in-depth knowledge and expertise to implement security practices is highly desirable.It makes sense that the CCIE Program would follow suit and add a CCIE-level certication to help employers identify and qualify this type of expertise. However, the idea of a Security Track for CCIE is not new. Rather, it has been the opinion of the CCIE department that this direction is long overdue. We have many people inside and outside Cisco Systems to thank for helping us make this track a reality.The CCIE Security Track started to emerge almost three years ago with the introduction of the CCIE Security written exam. The number of folks attempting this test has steadily grown to the point where it is second in popularity only to the Routing and Switching written exam. As with all CCIE labs, it took many months of careful watch, survey, and rewrites to position a lab that would take the practices most commonly deployed by industry experts and our TAC engineers and build a practical addition to the already-popular written test. It is important to remember that although the written exam is required to qualify a candidate for a CCIE lab, the lab tests for the skills required to build a lab infrastructure before deploying the more-security-specic functions. Because the CCIE program makes every attempt to meet what employers seek in an internetworking expert, those pursuing a CCIE Security should bear this in mind in their preparation for the CCIE Security Track.This book is geared toward networking professionals who intend to include practice in their study toward the CCIE Security. From my years as a proctor, I cannot emphasize enough the importance of mastering the concepts behind deploying functions in any network. It is never enough to prepare for a lab without the hands-on practice that helps you drill deep in pursuit of that level of understanding. The more scenarios a candidate can access, the more easily he or she can interpret lab problems. Working through lab activities and practicing with show and debug commands will better prepare the exam candidate to implement and troubleshoot solutions efciently and successfully.Anyone who can combine reading with hands-on practice has a very good chance of obtaining his or her CCIE certication. But it is important to remember that obtaining a CCIE certication should not be the only goal. The CCIE program strives to identify a level of expertise that is recognized by the networking industry. The ability to achieve expertise is marked not only by a badge from Cisco. Ultimately, it is the knowledge of the technology and the ability to perform successful secure network implementations by subscribing to a higher level of preparation and skill. That is the nal reward for taking the road to CCIE Security lab preparation.Kathe Saccenti, CCIE #2099Life Cycle Manager, CCIE Routing/Switching and co-developer of the CCIE Security examCisco Systems, Inc.

    CCIE.book Page xxvii Monday, May 12, 2003 8:29 AM

  • xxviii

    IntroductionIn todays ever-changing world of networking technology, as our dependence on this technology to accomplish our everyday tasks increases, securing your network has never been as important as it is right now. Through the use of hard-ware and software such as rewalls, virtual private networks (VPNs), and Intrusion Detection Systems (IDSs), many corporations are stepping up to the challenges presented by script kiddies and black hat hackers in todays electronic world and are searching for individuals they can trust to secure their electronic environment.Cisco Systems, Inc., has developed a specialization track for its popular Cisco Certied Internetworking Expert (CCIE) program specically designed with the security professional in mind. The CCIE Security track is a prestigious certica-tion designed to identify security professionals who have demonstrated their unique abilities in the continuously changing world of network security. CCIE Security candidates are tested through a written qualication examination of common and obscure security best practices and a demanding one-day hands-on lab exam that requires them to demonstrate their ability to put the theory of security to work in a network environment.This book is designed to help prepare CCIE Security candidates for the requirements of the one-day lab exam by providing many practice labs. These practice labs are also designed to help security professionals in their everyday job requirements. Because the CCIE Security exam includes routing and switching coverage as well as security concepts and practices, this book begins with a review of networking fundamentals and then builds on this foundation with the more-advanced requirements of modern technology.

    AudienceCCIE Practical Studies: Security is intended for network and security administrators and engineers who are studying for the CCIE Security lab examination.The secondary audience for this book could be other technical staff in the industry who are interested in learning how to congure a specic security technology and who are looking for clear examples of how to achieve this.This book is intended to help you measure the technical competency required to sit and pass the CCIE Security lab examination. The content in this book assumes that you have passed the CCIE Security written examination and are preparing for the CCIE Security lab examination. If you are preparing for the written examination, it is advisable to refer to certication-related books for the Cisco Certied Network Associate (CCNA) and the Cisco Certied Security Pro-fessional (CCSP) to cover the more fundamental concepts of the technologies.

    Book FeaturesThis book is primarily designed to help the CCIE candidate prepare for the CCIE Security lab. It offers an organized, step-by-step build-out of a complete security lab environment for you to complete in the nal chapter at your own pace. In each chapter, you will nd Case Studies and Lessons in which you practice the techniques and methodologies neces-sary to complete the nal security lab. Case Studies usually involve topologies that consist of more than one device. Although the Case Studies are designed to enforce the chapters topics, they involve all the required congurations, such as IP addressing and routing protocols, to make the scenario work in a networking environment. Lessons are used in place of Case Studies when a Case Study is unnecessary or is impossible to provide. These Case Studies and Lessons are presented in a way that tests your ability to solve and complete the process before the answers are revealed. It is strongly advised that you work through all the Case Studies and Lessons, because each builds on the previous steps. The nal lab results in a complete network security solution.

    CCIE.book Page xxviii Monday, May 12, 2003 8:29 AM

  • xxix

    This book focuses on the conguration skills necessary to congure network and security technologies at a level similar to what you will nd on the CCIE Security lab examination. The book briey reviews the theory behind each technology, but this book should not replace detailed reference books that are specic to each technology.Each chapter ends with a section of review questions that help you assess whether you are ready to move on to the next chapter. Each chapter also has a FAQ section that gives you a glimpse of where the material might t into your network-ing environment.

    Command Syntax ConventionsThe conventions used to present command syntax in this book are the same conventions used in the IOS Command Reference. The Command Reference describes these conventions as follows:

    Vertical bars ( | ) separate alternative, mutually exclusive elements. Square brackets ([ ]) indicate an optional element. Braces ({ }) indicate a required choice. Braces within brackets ([{ }]) indicate a required choice within an optional element. Bold indicates commands and keywords that are entered literally as shown. In conguration examples and output

    (not general command syntax), bold indicates commands that are manually input by the user (such as a show command).

    Italic indicates arguments for which you supply actual values.

    CCIE.book Page xxix Monday, May 12, 2003 8:29 AM

  • xxx

    Device Icons Used in the Figures

    What Is CoveredThe book is organized into 26 chapters and 6 appendixes:

    Chapter 1, The CCIE Security ProgramThis chapter provides an overview of the CCIE certication program, with special emphasis on the Security track.

    Chapter 2, Building a CCIE Mind-SetThis chapter covers the attitude and psychology that are required to start the CCIE studies. This chapter also covers motivation and the importance of a structured study plan. This is something that is always overlooked in other books and something that a lot of people nd challenging.

    Cisco uses the following standard icons to represent different networking devices. You will encounter several of these icons within this book.

    Cisco Works WorkstationPC

    Laptop Web Browser

    Web Server

    Route/Switch Processor

    Hub NetRangerIntrusion Detection

    SystemCisco 7500

    Series Router

    AccessServer

    CiscoSecureScanner Cisco

    Directory ServerCisco

    CallManagerLocal Director IP/TVBroadcast

    Server

    SwitchRouter PIX FirewallMultilayer Switch

    Content Switch

    File Server PrinterPhone

    Fax VPN Concentrator

    Bridge

    ATM Switch

    ISDN/Frame Relay switch

    Gateway

    Network Cloud

    Concentrator

    CCIE.book Page xxx Monday, May 12, 2003 8:29 AM

  • xxxi

    Chapter 3, Building the Test LaboratoryThis chapter covers the required lab equipment for the CCIE Security exam. It covers the required routers, switches, and security devices. It also outlines the best equipment to use and ways to reduce the labs cost. The lab you build at this point is used throughout the book.

    Chapter 4, Layer 2 and Layer 3 Switching and LAN ConnectivityThis chapter looks at the conguration of the Catalyst 3550 switch. It also covers addressing virtual LANs (VLANs) and applying the correct IP addresses to the LAN interfaces on the lab routers.

    Chapter 5, Frame Relay ConnectivityThis chapter looks at the conguration of Frame Relay and the aspects that relate to the CCIE Security lab.

    Chapter 6, ISDN ConnectivityThis chapter looks at the conguration of ISDN. It covers the basic conguration and then focuses on security aspects such as authentication and callback.

    Chapter 7, ATM ConnectivityThis chapter looks at the conguration of ATM. ATM concepts are covered, as well as the conguration steps necessary to congure classical IP over ATM.

    Chapter 8, RIPThis chapter provides a brief overview of RIP. You will build some conguration examples showing basic RIP and then add associated security features such as authentication.

    Chapter 9, EIGRPThis chapter provides a brief overview of EIGRP. You congure simple EIGRP, congure EIGRP options, and troubleshoot your EIGRP conguration.

    Chapter 10, OSPFThis chapter provides a brief overview of OSPF. You will build some conguration examples showing basic OSPF and then add the associated security features.

    Chapter 11, IS-ISThis chapter provides a brief overview of IS-IS and examples of conguring, monitoring, and debugging IS-IS.

    Chapter 12, BGPThis chapter provides a brief overview of BGP and includes conguration examples showing basic BGP and associated security features.

    Chapter 13, RedistributionThis chapter provides an overview of redistribution and shows scenario-based examples of various redistribution tasks.

    Chapter 14, Security PrimerThis chapter provides an overview of security technologies. It includes an overview of Cisco IOS security and technologies such as VPNs, AAA, and IDS.

    Chapter 15, Basic Cisco IOS Software and Catalyst 3550 Series SecurityThis chapter covers basic security such as password management, access lists, and Secure Shell (SSH).

    Chapter 16, Access Control ListsThis chapter looks at the options available with access lists, including lock and key, reexive ACLs, and extended ACLs.

    Chapter 17, IP ServicesThis chapter looks at services offered by IP, such as conguring the Director Response Protocol (DRP) server agent, logging, conguring Hot Standby Router Protocol (HSRP), and IP accounting.

    Chapter 18, AAA ServicesThis chapter covers the conguration of AAA services. It looks at conguring the RADIUS and TACACS+ protocols.

    Chapter 19, Virtual Private NetworksThis chapter covers VPNs. It mainly focuses on IPSec and gives examples of both the PIX and IOS routers.

    CCIE.book Page xxxi Monday, May 12, 2003 8:29 AM

  • xxxii

    Chapter 20, Advanced Virtual Private NetworksThis chapter covers Dynamic Multipoint VPNs (DMVPNs). It looks at multipoint GRE, IPSec proles, dynamic address spoke routers, and dynamic tunnel creation between the hub and spoke routers.

    Chapter 21, Virtual Private Dialup NetworksThis chapter covers the basics and conguration of VPDNs, including conguring VPDNs with authentication and conguring the default VPDN group template.

    Chapter 22, Cisco IOS FirewallThis chapter covers the Cisco IOS Firewall, along with conguring TCP intercept, Context-Based Access Control (CBAC), and Port-to-Application Mapping (PAM).

    Chapter 23, Cisco PIX FirewallThis chapter covers conguring and monitoring Cisco PIX Firewalls.

    Chapter 24, IDS on the Cisco PIX Firewall and IOS SoftwareThis chapter looks at PIX and IOS IDSwhen to implement them and the drawbacks of each.

    Chapter 25, Internet Service Provider Security ServicesThis chapter covers security aspects pertaining to the service provider industry, including techniques for preventing denial-of-service (DoS) attacks and conguring L2VPN.

    Chapter 26, Sample Lab ScenariosEight sample lab scenarios are provided in this chapter. These scenarios are based on technologies used throughout the book. These scenarios emulate the type of scenarios you can expect to nd on the CCIE Security lab exam.

    Appendix A, Basic UNIX SecurityThis appendix covers basic UNIX security and the commands you might require on the CCIE Security lab exam.

    Appendix B, Basic Windows SecurityThis appendix covers basic Windows security and the technologies you might need to know for the CCIE Security lab exam.

    Appendix C, ISDN Error Codes and Debugging ReferenceThis informative appendix provides the ISDN error codes you can use as a reference when debugging ISDN problems.

    Appendix D, Password Recovery on Cisco IOS, CatalystOS, and PIXPassword recovery is a very important skill to have. This appendix covers the various password-recovery methods used on Cisco IOS, CatalystOS, and the PIX Firewall.

    Appendix E, Security-Related RFCs and PublicationsThis appendix covers security-related RFCs and publications that can help you in your studies and ambitions to become a fully qualied Security CCIE.

    Appendix F, Answers to the Review QuestionsThis appendix includes the answers to the review questions that appear at the end of each chapter.

    CCIE.book Page xxxii Monday, May 12, 2003 8:29 AM

  • CCIE.book Page xxxiii Monday, May 12, 2003 8:29 AM

  • CCIE.book Page 2 Monday, May 12, 2003 8:29 AM

  • PA R T IThe CCIE Program and Your Lab EnvironmentChapter 1 The CCIE Security Program

    Chapter 2 Building a CCIE Mind-Set

    Chapter 3 Building the Test Laboratory

    CCIE.book Page 3 Monday, May 12, 2003 8:29 AM

  • This chapter covers the following topics:

    The Cisco CCIE program

    The CCIE Security exam

    CCIE.book Page 4 Monday, May 12, 2003 8:29 AM

  • C H A P T E R 1

    The CCIE Security ProgramThis chapter provides an overview of the CCIE Security program. You will start by looking at the whole CCIE program and then concentrate on the development of the CCIE Security exam. You will look at the requirements to pass the CCIE Security exam, and you will learn about online resources that provide more-detailed information on this certication track.

    The Cisco CCIE ProgramThe Cisco Certied Internetworking Expert (CCIE) program is recognized worldwide as the ultimate vendor-based certication in the internetworking eld. The CCIE program has earned this reputation based on the grueling study requirements to pass the exam, along with the skill level and quality of the chosen few who obtain the coveted CCIE #.

    Todays business arena is placing more and more emphasis on internetworking and connectivity. The dawn of the Internet in the late 1990s spawned a massive growth in the demand for certied individuals. Combine this with the much-publicized skills gap, and it was not long before everyone jumped on the bandwagon. This explosion in interest in the certication industry had a negative effect on some of the paper-based certications, but the CCIE stood alone as the pinnacle of networking certications.

    Cisco introduced the CCIE program in 1993 as an expert-level certication to help organi-zations identify highly skilled technical engineers in the internetworking industry. Today, the CCIE program sets the professional benchmark for internetworking expertise.

    Currently, there are four CCIE offerings:

    Routing and Switching

    Security

    Communication and Services

    Voice

    The CCIE Security ExamOne byproduct of the impressive growth of the Internet and internetworking is the require-ment for skilled security engineers. Every day we hear about some new virus, Trojan horse, or worm that infects corporate networks. You probably have had rsthand experience com-bating a computer virus or attack. Security problems are now so prominent that they make

    CCIE.book Page 5 Monday, May 12, 2003 8:29 AM

  • 6 Chapter 1: The CCIE Security Program

    headlines, partly due to the fear factor and the obvious massive cost to industry. This situation has led to the need for highly qualied security engineers.

    The CCIE Security program is a relatively new CCIE qualication that has been offered since early 2001. Many people consider it an ideal second CCIE to undertake after the most common Routing and Switching CCIE, although more and more people are focusing solely on the Security CCIE.

    The CCIE Security exam focuses on TCP/IP, differing from the multiprotocol Routing and Switching exam. This makes it an ideal choice for students who are newer to the eld of internetworking. They do not have to learn about protocols they might never use, because these protocols are in worldwide decline due to the adoption of newer, more efcient technologies. You are tested on IP, its inherent security, and its routing protocols, as well as other IP-based security devices such as rewalls, VPNs, and Intrusion Detection Systems.

    The CCIE Security exam also delves into Windows and UNIX operating system security. The IP sections of the CCIE Security exam have distinct similarities to the CCIE Routing and Switching exam. You have to attain an expert level on IP routing issues for the CCIE Security exam in the same way you have to for the CCIE Routing and Switching exam. There are no other desktop protocols apart from TCP/IP on the CCIE Security exam. You only have to learn about TCP/IP and the routing aspects and protocols related to it.

    The obvious addition to the CCIE Security exam is the extensive focus on IP security-related topics. The exam covers rewalls, VPNs, and Intrusion Detection Systems. It also has more emphasis on the security conguration of base-level Cisco IOS Software and routing protocols. The next section lists the security protocols covered on the CCIE Security exam.

    To pass the CCIE Security exam, you have to pass a 100-question computer-delivered quali-cation test and a one-day lab exam. It is the one-day lab exam that really separates the CCIE from all other vendor-based certications.

    Qualification ExamThe CCIE Security qualication exam consists of 100 questions covering a wide range of topics. The exam has to be completed within 120 minutes.

    Cisco has produced a blueprint for the CCIE Security qualication exam that outlines areas of study. The exam is based on potential questions from the eight sections on the blueprint, which are as follows:

    1 Security Protocols

    2 Operating Systems

    3 Application Protocols

    4 General Networking

    CCIE.book Page 6 Monday, May 12, 2003 8:29 AM

  • The CCIE Security Exam 7

    5 Security Technologies

    6 Cisco Security Applications

    7 Security General

    8 Cisco General

    These main sections are broken down into more detail, as described next. It is important to study every topic mentioned in the blueprint when preparing to take the CCIE Security qualication exam. Remember to periodically check Ciscos website (www.cisco.com/en/US/learning/ or www.cisco.com/warp/public/625/ccie/) to see if any changes have been made to this blueprint:

    1 Security Protocols

    Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System Plus (TACACS+) Kerberos Virtual Private Dial-up Networks (VPDN/Virtual Proles) Data Encryption Standard (DES) Triple DES (DES3) IP Secure (IPSec) Internet Key Exchange (IKE) Certicate Enrollment Protocol (CEP) Point to Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP)

    2 Operating Systems

    UNIX Windows (NT/95/98/2000)

    3 Application Protocols

    Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) File Transfer Protocol (FTP) Hypertext Transfer Protocol (HTTP) Secure Socket Layer (SSL) Simple Mail Transfer Protocol (SMTP) Network Time Protocol (NTP) Secure Shell (SSH)

    CCIE.book Page 7 Monday, May 12, 2003 8:29 AM

  • 8 Chapter 1: The CCIE Security Program

    Lightweight Directory Access Protocol (LDAP) Active Directory

    4 General Networking

    Networking Basics TCP/IP Switching and Bridging (including VLANs, Spanning Tree, and so on) Routed Protocols Routing Protocols (including RIP, EIGRP, OSPF, and BGP) Point-to-Point Protocol (PPP) IP Multicast Integrated Services Digital Network (ISDN) Async Access Devices (such as the Cisco AS 5300 series)

    5 Security Technologies

    Concepts Packet Filtering Proxies Port Address Translation (PAT) Network Address Translation (NAT) Firewalls Active Audit Content Filters Public Key Infrastructure (PKI) Authentication Technologies Virtual Private Networks (VPNs)

    6 Cisco Security Applications

    Cisco Secure UNIX Cisco Secure NT Cisco Secure PIX Firewall Cisco Secure Policy Manager (formerly Cisco Security Manager) Cisco Secure Intrusion Detection System (formerly NetRanger) Cisco Secure Scanner (formerly NetSonar) IOS Firewall Feature Set

    CCIE.book Page 8 Monday, May 12, 2003 8:29 AM

  • The CCIE Security Exam 9

    7 Security General

    Policies Standards Bodies Incident Response Teams Vulnerability Discussions Attacks and Common Exploits Intrusion Detection

    8 Cisco General

    IOS SpecicsThe CCIE Security qualication exam is delivered by either Prometric or VUE. You can schedule the exam online at either www.2test.com or www.vue.com. The code for the exam is 350-018. Visit Ciscos website to learn more about registering for exams: www.cisco.com/en/US/learning/le3/le11/learning_certication_resources_home.html.

    After you have passed the qualication exam, you can schedule your lab exam. You have 18 months after passing the CCIE Security qualication exam to schedule and sit for the lab exam. If you do not take the lab exam in this time period, you must retake the CCIE Security qualication exam.

    Lab ExamThe CCIE lab exam was traditionally a two-day lab held at locations throughout the world. On October 1, 2001, Cisco changed the format to a new one-day lab after extensive research into how the CCIE was delivered and the industrys changing needs.

    In the one-day CCIE Security lab exam, you are presented with a complex design to implement from the physical layer up. You are not required to congure any end-user systems, but you are responsible for any device residing in the internetwork, including routers, switches, and re-walls. Network specics, point values, and testing criteria used to assess the correctness of the individual congurations are provided.

    Each conguration scenario and problem has a preassigned point value. You must obtain a minimum mark of 80% to pass.

    The CCIE lab exam is what the CCIE is all about. Over the years there have been many articles and reports on the level of knowledge, skill, and determination required to get through the CCIE lab exam. The pass mark is still very low, and the number of people who pass on their rst attempt is also very low. It is an unusual exam because it is hands-on and timed, and it places you under an enormous amount of pressure. Knowing the technical aspects is only 80% of the battle. You must also have a strong positive mental attitude and be able to relax under pressure. Many CCIEs fail the lab exam due to little mistakes that escalate into major problems that then

    CCIE.book Page 9 Monday, May 12, 2003 8:29 AM

  • 10 Chapter 1: The CCIE Security Program

    lead to a failure in one section of the lab. Because the lab is fairly progressive, if you fail to get the Layer 2 issues working, you cannot congure the Layer 3 aspects, and you are headed for certain failure.

    Luckily, Cisco produces a list of lab equipment, services, and applications covered on the lab. You should use these to build your own test lab, as described in more detail in Chapter 3, Building the Test Laboratory.

    Use the following lab equipment, services, and applications list provided by Cisco to practice for the lab exam:

    2600 series routers

    3600 series routers

    Catalyst 3550 series switches

    PIX running PIX software version 6.1

    Certicate Authority Support

    Cisco Secure Access Control System

    Cisco Secure Intrusion Detection System

    The focus of the Security lab exam is conguring routers and switches, not servers. Because of this, some of the services and applications might be precongured. Other services and applica-tions not listed here might be provided fully congured with a task in which you interact with theses services and applications.

    SummaryThis opening chapter looked at the development of the CCIE Security exam and what you need to obtain this prestigious certication. This chapter started by covering the CCIE program in general and then looked at the CCIE Security exam. You then learned about the qualication exam and lab exam requirements, including the Security blueprint that you can refer to for both the qualication and lab exams. This chapter also provided a list of the lab equipment, services, and applications you need for the lab exam.

    The best resource for up-to-date information about the Security CCIE exam or the CCIE program in general is the CCIE home page, which you can nd at www.cisco.com/go/ccie.

    CCIE.book Page 10 Monday, May 12, 2003 8:29 AM

  • CCIE.book Page 11 Monday, May 12, 2003 8:29 AM

  • This chapter covers the following topics:

    What it takes to become a CCIE

    Developing proper study habits

    Lab experience versus real-world experience

    CCIE.book Page 12 Monday, May 12, 2003 8:29 AM

  • C H A P T E R 2

    Building a CCIE Mind-SetChapter 1, The CCIE Security Program, provided an overview of the Cisco Certied Internetworking Expert (CCIE) program and, more specically, the CCIE Security program. Now that you understand what the CCIE is, this chapter looks at the personal attitudes and attributes you need to study for and pass the CCIE Security qualication and lab exams. The CCIE is a very difcult certication. You need a certain mental attitude to commit yourself to the arduous study that is required.

    What It Takes to Become a CCIEThe road to becoming a CCIE is long and winding, with a lot of large hills along the way. You need to have a certain mind-set to undertake such a journey. As you travel down the road, you need to adapt to and embrace the challenges that lie ahead.

    As you read about in Chapter 1, you must pass two exams to attain the security CCIE qualication: the qualication exam and the lab exam. Each of these requires a slightly different approach. The qualication exam is a prerequisite for the lab exam, so your initial focus needs to be on passing the qualication exam, which contains quite a bit of theory. After passing the qualication exam, you use this theory to build the foundations for the practical lab exam.

    The suggested way to prepare for the CCIE Security exam is to study for and pass the CCNA, CCNP, and CCSP before going for the CCIE Security qualication exam. You can learn more about these certications at the following locations on Ciscos website:

    www.cisco.com/go/ccna

    www.cisco.com/go/ccnp

    www.cisco.com/go/ccsp

    the following link needs to be verified closer to the pub date. It is not yet active.

    CCIE.book Page 13 Monday, May 12, 2003 8:29 AM

  • 14 Chapter 2: Building a CCIE Mind-Set

    Short-Term Goals Versus Long-Term GoalsIn addition to the technical aspects of passing the Cisco certication exams, you must keep up your motivation and desire to study for and pass the CCIE Security qualication exam.For most candidates, the CCIE Security qualication is a very difcult exam that covers a vast array of technologies. Passing the CCIE Security qualication exam can be considered a long-term goal because of the time you must take to attain the level of knowledge required. Long-term goals are very important, but it can be hard to stay motivated. When a long-term goal appears too large, we tend to divert our focus from it.One way to overcome the problem with long-term goals is to split the process into more-manageable chunks, or short-term goals, that lead toward the long-term goal. Passing the CCNA, CCNP, and CCSP can each be thought of as an achievable short-term goal that leads toward the long-term goal of passing the CCIE Security qualication exam. This is especially true of the CCSP certication. Studying for the CCSP helps you pass the CCIE Security qualication, because there is a lot of overlap in topics between the CCSP exams and the CCIE Security qualication exam.Breaking long-term goals into more-manageable chunks helps you stay focused. Each single exam success can be thought of a step toward your long-term goal.

    It is fair to state that the written portion of the CCIE Security exam is considerably easier than the lab portion of the exam.

    To pass the CCIE Security lab exam, the most important thing you must do is get as much hands-on experience conguring Cisco routers, switches, and security devices as possible. The importance of hands-on practice for the lab exam cannot be stressed enough.

    Chapter 1 covered the hardware equipment list that is used for the CCIE Security lab exam. It is important to obtain a study lab and prepare for the lab exam by getting as much hands-on practice as possible. This topic is covered in depth in Chapter 3, Building the Test Laboratory.

    Developing Proper Study HabitsNumerous books that have been written on the subject of study habits are generic in nature. The study habits required to pass the qualication and lab exams of the Security CCIE are much like those required for obtaining a high school diploma or college degree. This section looks at good study habits to get into, along with common study traps you might encounter.

    CCIE.book Page 14 Monday, May 12, 2003 8:29 AM

  • Developing Proper Study Habits 15

    Good Study HabitsGood study habits are something that is acquired. First and foremost, you must want to study. Without this interest or desire, its hard to keep up your momentum and motivation. The following pointers help you develop good study habits:

    Formulate a study planOne of the most important parts of study is to formulate a plan. Winston Churchill stated, If you fail to plan, you plan to fail. This is very true of study. Create a written plan that breaks down the technology areas, and stick with it.

    Concentrate on difficult tasks firstOne bad habit that is very easy to get into is to put off difcult tasks and concentrate on topics you know or nd interesting. When formulat-ing your study plan, try to cover the difcult tasks rst. This gives you more time to under-stand the difcult tasks. You also might nd that you gain condence after completing and mastering the tasks you found difcult.

    Create a good study environmentIt is very important to create the correct environment to study in. Studying for the CCIE is a long task, and concentration is the key to mastering the very advanced topics you have to learn. Make sure that your study environment is clean, tidy, and free from environmental stresses. It is also very important to ensure that you can study without interruptions. Interruptions break your train of thought, and it can take a considerable amount of wasted time to regain your thought and momentum.

    Take regular breaks while studyingResearch shows that taking regular breaks while studying improves your capacity to learn and helps your retention of the material. A good habit to get into is to have a 10-minute break every hour. During this time, try to get some fresh air and relax. Ten minutes every hour is only a loose suggestion. If you are in the middle of learning about IPSec, for example, and you are making good progress, it is sometimes better to cover the topic and then take a well-deserved break.

    Know when to change your study patternNetwork security can be a tedious and not-always-interesting subject to study. You have to realize when you are becoming bored with your current study patterns or topics. At this point, it is a good idea to change your tactics and study something different. For example, if you have spent three days going over OSPF theory, it might be good idea to give it a rest and perform a hands-on task that proves BGP theories.

    Know when to call it a dayThere will come a time when, because of either mental or physical fatigue, your study will no longer be productive. You have to recognize when you reach this point and when to call it a day. There is no use studying into the early hours of the morning if you are not retaining the material you are studying. You would benet from getting a good nights sleep and starting again the following morning with a clear mind.

    CCIE.book Page 15 Monday, May 12, 2003 8:29 AM

  • 16 Chapter 2: Building a CCIE Mind-Set

    Review and take notesOne excellent way to study is to take notes throughout your studying. These notes should focus on the topics you are covering, and they should be a synopsis of your thoughts on the subject matter. If there are areas you are weak in, be sure to write down your ndings after you have mastered the areas. You can use these notes throughout your studying.

    Get a study partnerIt is excellent if you can team up with a colleague or another person in your area who is also studying for the CCIE Security exam. You can work through solutions together and bounce ideas off each other. You can pool equipment to build a better study lab. Also, your study partner might understand some areas better than you do and might be able to coach you in these areas.

    This is by no means an exhaustive list of study habits, but they are all suggestions that make your study for the CCIE Security exam more focused.

    Common Study TrapsAs well as the good habits outlined in the preceding section, there are also some very easy traps to fall into while studying or planning to study. These traps are pretty common. You probably have experienced some of them:

    I dont know where to begin.Take control of your study time and plan. Make a list of all the things you have to do. Break your workload into manageable chunks. Prioritize to schedule your time realistically. Interrupt your study time with planned study breaks. Begin studying early, with an hour or two per day, and slowly build as the exam approaches.

    Ive got so much to study and so little time.The most important point here is to plan. Formulate your study plan, and write it down. Prioritize your study topics. Have them correspond to the published exam blueprint from Cisco.com. There is no point in wasting time studying something that is not on the qualication or lab exam. Time is a nite resource. Ensure that you use your time to the best possible effect.

    This stuff is so dry, I cant stay awake reading it.Get actively involved with the text as you read. Ask yourself, What is important to remember about this section? Take notes or underline key concepts. Discuss the material with others, either in person or over the Internet. Try to get a local study partner. Stay on the offensive, especially with material you dont nd interesting, rather than reading passively and missing important points. Another strategy is to practice the theory you are learning and implement it in hands-on practice.

    I read it. I understand it. But I just cant get it to sink in.We remember best the things that are most meaningful to us. As you are reading, try to elaborate upon new information with your own examples. Try to integrate what youre studying with what you

    CCIE.book Page 16 Monday, May 12, 2003 8:29 AM

  • Developing Proper Study Habits 17

    already know. You will be able to remember new material better if you can link it to something thats already meaningful to you. Here are some techniques:

    ChunkingChunking can be described as breaking up complicated lists of information into smaller chunks that are easier to remember. For example, suppose you wanted to remember the colors in the visible spectrumred, orange, yellow, green, blue, indigo, violet; you would have to memorize seven chunks of information in order. But if you take the rst letter of each color, you can spell the name Roy G. Biv and reduce the information one chunk.

    MnemonicsAny memory-assisting technique that helps you associate new information with something familiar is a mnemonic. For example, to remember a formula or equation, you could use letters of the alphabet to represent certain numbers. Then you can change an abstract formula into a more meaningful word or phrase so you can remember it better. Sound-alike associations can be very effective too, especially when youre trying to learn a new language. The key is to create your own links; then you wont forget them. For example, to remember the OSI layers, you can use the phrase All people seem to need data processing to remember the seven layers. The rst letters of the words in the phrase are the same as the rst letters in the OSI layerapplication, presentation, session, transport, network, data link, physical.

    I guess I understand it.The best way to check if you understand a concept is to test yourself. Make up questions about key sections in your notes or reading. Examine the relationships between concepts and sections. Often, by simply changing section headings, you can generate many effective questions.

    Theres too much to remember.You recall information better if it is represented in an organized framework that makes retrieval more systematic. Many techniques can help you organize new information:

    Write chapter outlines or summaries; emphasize relationships between sections.

    Group information into categories or hierarchies where possible.

    Draw up a matrix, or information map, to organize and interrelate material. For example, if you were trying to understand the causes of World War I, you could make a chart listing all the major countries involved across the top, and then list the important issues and events down the side. Next, in the boxes in between, you could describe the impact each issue had on each country to help you understand these complex historical developments.

    I knew it a minute ago.After reading a section, try to recall the information contained in it. Try answering the questions you made up for that section. If you cannot recall enough, reread the portions you had trouble remembering. The more time you spend studying, the more you tend to recall. Even after the point at which you perfectly recall

    CCIE.book Page 17 Monday, May 12, 2003 8:29 AM

  • 18 Chapter 2: Building a CCIE Mind-Set

    information, further study makes the material less likely to be forgotten entirely. In other words, you cant overstudy. However, how you organize and integrate new information is still more important than how much time you spend studying.

    I like to study in bed.Recall is better when your study context (your physical location, as well as your mental, emotional, and physical state) are similar to the test context. The greater the similarity between the study setting and the test setting, the greater the likelihood that during the test you will recall the material you studied. Bed is not the best place to study.

    Cramming before a test helps me keep the topics fresh in my mind.Start studying now. Keep studying as you go along. Begin with an hour or two a day a few months before the exam, and then increase your study time as the exam approaches. Your recall increases as your study time gets spread out over time.

    Im going to stay up all night until I understand this.Avoid mental exhaustion. Take short breaks often when studying. Before the test, have a rested mind. When you take a study break, and just before you go to sleep at night, dont think about academics. Relax and unwind, mentally and physically. Otherwise, your break wont refresh you, and youll nd yourself lying awake at night. Its more important than ever to take care of yourself before an exam! Eat well, sleep, and get enough exercise. A healthy brain retains more information and also functions better.

    Lab Experience Versus Real-World ExperienceThe CCIE Security lab exam can be broken into two main areasconguration and trouble-shooting. In the previous two-day CCIE lab, the afternoon of the second day was dedicated to troubleshooting; the lab proctor would introduce errors into the network. In the one-day exam, troubleshooting is an integral part of the lab exam; errors can be found throughout the lab. This section discusses how you can prepare for both the conguration and troubleshooting aspects of the lab exam.

    It is easy to study for the conguration parts of the CCIE lab exam. You can obtain various scenarios to practice conguring the required tasks on the equipment. The Cisco website has numerous conguration and design guides that show you step by step how to congure tasks such as site-to-site IPSec VPNs using a Certicate Authority.

    Troubleshooting, on the other hand, is harder to learn. You have to really understand how the protocol or technology works to perform advanced debugging. When working with your own network, its common to make mistakes during conguration, so some troubleshooting is required. This is good experience, but you have the advantage of knowing the network and technology you are implementing.

    CCIE.book Page 18 Monday, May 12, 2003 8:29 AM

  • Summary 19

    Real-world experience from troubleshooting large corporate networks is an excellent way to boost your troubleshooting knowledge. Troubleshooting requires exibility, skill, and a methodology you perfect over time.

    To summarize, you can learn conguration skills from a book. Although you can also learn troubleshooting methods from a book, the best way to learn them is through troubleshooting real problems in real networks.

    SummaryThis chapter looked at what you must do to achieve the CCIE Security certication. The CCIE is one of the most prestigious networking qualications, and it does not come easy. The lab exam is renowned as being a tough exam to pass with very low success rates, especially on the rst attempt.

    This chapter started by looking at what it takes to become a CCIE, including the qualication exam and the feared lab exam. You then looked into developing proper study habits for the lab exam. This section covered good study habits and also common study traps.

    The CCIE Security exam includes conguration and troubleshooting. The nal section of this chapter looked at how to attain conguration and troubleshooting knowledge through real-world on-the-job experience as opposed to just gaining experience from lab practice.In closing, as stated throughout this chapter, the CCIE Security is a very tough exam to study for. The breadth of material that you have to master is very daunting and can put a lot of people off studying for the exam. If you are starting out on the CCIE Security journey, you should set out a game plan with attainable short-term goals. One excellent way to achieve this is to go through the Cisco Career Certications, such as the CCNA and CCNP, and then move on to the CCSP, which covers much of the material that is on the CCIE Security blueprint.

    CCIE.book Page 19 Monday, May 12, 2003 8:29 AM

  • This chapter covers the following topics:

    Study time on a lab

    Planning your home lab

    Designing your practice lab for this book

    CCIE.book Page 20 Monday, May 12, 2003 8:29 AM

  • C H A P T E R 3

    Building the Test LaboratoryThe one thing that makes the CCIE such a sought-after certication is that it is highly respected in the networking community. Unlike other certications that solely rely on computer-based testing, the CCIE certication includes a one-day hands-on laboratory exam in addition to a computer-based written exam. Computer-based exams are generally easy to prepare for, and the questions come from a limited pool. Therefore, someone could pass the written section of the CCIE purely from reading textbooks. The CCIE lab exam, however, requires an expert level of conguration expertise. The only way to attain this level of expertise is through daily hands-on practice with the equipment.

    To practice for the CCIE Security lab exam, you require access to routers, switches, rewalls, and some software applications. This chapter looks at the equipment required to build a lab adequate for you to pass the CCIE Security lab exam. Also in this chapter, you design the lab that is referenced throughout this book. You will go through the various components that are used and see a topology diagram of the lab.

    For a list of the equipment used in the CCIE Security lab, refer to Chapter 1, The CCIE Security Program, or visit the Cisco website at www.cisco.com/en/US/learning/ and navigate to the CCIE Security page.

    Study Time on a LabFrom a recent survey, it is estimated that the average CCIE (Routing and Switching) spends a minimum of 350 hours of practical study on a lab. The basic requirement to pass the CCIE Security exam is hands-on practice in a lab environment. Passing the CCIE Security exam without extensive hands-on experience is nearly impossible.

    If you havent already, start an action plan for getting hands-on practice using a study lab. Three options are available to you:

    Use a study lab at your place of work.

    Buy the required equipment to create a study lab at home.

    Use the services of a remote lab provider.

    CCIE.book Page 21 Monday, May 12, 2003 8:29 AM

  • 22 Chapter 3: Building the Test Laboratory

    Work-Based Study LabIf you are employed, it is highly probable that your employer is very interested in your attaining the CCIE designation due to the prestigious and nancial benets it can bring to the business. Cisco runs a rst-class partner program. One of the requirements to proceed to Silver or Gold partner status is that you must have a minimum number of qualied CCIEs on staff.

    So it is not out of the question for your employer to consider providing you with a lab to practice, because there are mutual benets. However, in the real world, it is uncommon for all but the largest companies to have the type of equipment required to pass the CCIE Security lab spare and available to use. Even if equipment is available, you have to share it with other employees, or you might have only limited access to it. Your employer might not be happy with your spending time during the day studying, presuming that the study lab would be based at your place of work. These factors can prove difcult, unless you want to spend your nights and weekends in the ofce studying instead of studying in the comfort of your home.

    To give yourself a chance of passing the lab, you need to be able to study on your own terms and use the study lab when your schedule dictates, and from wherever you choose. The work-based study lab is an adequate solution that should never be turned down, but the type of lab covered in the next section, the home lab, is considered the best way to study.

    Home-Based Study LabNetworking equipment is expensive. Most organizations do not have spare equipment available to let you build an adequate test lab. Combined with the fact that most organizations do not allow such equipment to be taken home, this motivates many CCIE candidates to create a home lab. You can then use this home lab to practice and master the technologies required to pass the Security CCIE lab exam.

    The benets of having a home lab are obvious. This is a lab that you own and are free to use whenever you choose. You can build and break labs to your hearts content.

    The obvious issue with building a home lab is the cost. The CCIE Security lab exam has more equipment and applications than the CCIE Routing and Switching exam, and these extra components do not come cheap.

    One point to consider when designing a home-based study lab is remote access to the lab. For instance, it would be good for you to be able to practice on your home lab from your place of work, such as during breaks. You can accomplish this by connecting a terminal server to the Internet, thus making the lab available to you when you are at work. Another good investment is a remote power device. This allows you to power up, power down, and power-cycle the lab equipment as you wish. This means that you dont have to leave the lab equipment turned on all day, and you can also reboot the equipment in the case of a hardware crash.

    If building a home lab is something you would like to pursue, read the Planning Your Home Lab section in this chapter.

    CCIE.book Page 22 Monday, May 12, 2003 8:29 AM

  • Planning Your Home Lab 23

    Remote LabThe alternative to building a costly home lab is to use a remote lab. A remote lab is a lab full of the required Cisco equipment to study for the CCIE Security lab exam that is located on the premises of the company that is offering the remote lab service.

    Remote lab offerings can be a great way to get hands-on experience for the CCIE Security lab exam. Various companies offer time on their lab equipment for a fee. The amount of lab gear, the topology and features, the lab exercises, and of course the cost are all part of your decision about whether these labs are right for you.

    The features of the lab pods vary between remote lab offerings. A typical remote lab gives you some level of access to the devices in the lab. All labs provide simple console access to routers and switches. Some offer PCs, with the ability to remotely control the PCs over the Internet, even allowing you to boot them remotely. Power management is also important, in case you need to recover passwords, or if the OS on the PC gets the blue screen of death. Often, all devices are cabled to the same LAN switch, so with conguration, you can form any LAN topology you need. In some cases, a router might be included in the pod for the purpose of acting as a Frame Relay switch; in other cases, a separate router, not controlled by the user, is cabled and congured as a Frame Relay switch. The real goal of the remote lab is to give you total control of everything that can be done without moving a cable.

    A remote lab pod helps, but you need some lab exercises to perform on the pods. Some remote labs offer CCIE Security lab exercises as part of the rental fee. Others do not let you simply buy time on the lab. You buy a lab exercise, and you get the amount of time that the remote lab company thinks you need to work on the lab. In other cases, you can just buy lab time and perform any of the labs offered by the remote lab company while working at your own pace.

    Which should you usea home lab or a remote lab?

    Well, you could actually benet from both. The home lab has some obvious advantages. How-ever, remote labs tend to have a more complete set of devices. If you can afford to duplicate the lab pods in this book in your home lab, that would be better than using remote labs. Short of duplicating the lab topology in this book, it makes sense to do the core practice on your home lab and get specic practice with labs that require a larger topology on remote labs.

    Planning Your Home LabIn the preceding section you looked at the three main lab offerings that are available to people who want to study for and pass the CCIE Security lab exam. In this section, you look at planning a home-based study lab.

    CCIE.book Page 23 Monday, May 12, 2003 8:29 AM

  • 24 Chapter 3: Building the Test Laboratory

    Sourcing the Lab EquipmentBuilding a home lab can be a very costly exercise. The CCIE Security lab consists of roughly seven routers, two PIX Firewalls, and a single 3550 Catalyst switch. You also need at least one PC/server running ACS, CA, and the IDS management platform.

    You also need to consider sourcing backbone routers. These backbone routers are used to inject routing information into