Cisco

  • Cisco ASA 5500-X: Reimaging Essentials for FTD functions

    If your Cisco ASA is currently running FirePOWER Services as a separate module and you want to deploy Firepower Threat Defense (FTD), you must reimage your ASA with the unified FTD image. This blog discusses the steps required to reimage and troubleshoot any Cisco ASA 5500-X Series hardware.

  • Cisco Firepower Threat Defense (FTD)

    Now is the time to learn about the Cisco FTD. Before we dig into the software components and hardware platforms, let’s try to identify the difference between the FirePOWER Services and Firepower Threat Defense (FTD).

  • Cisco IOS: функция сокращения ввода команд

    Функция завершения командной строки делает интерфейс Cisco IOS намного более дружественным. Она экономит время на ввод команд и помогает в ситуациях, когда вы не можете вспомнить синтаксис команды. В предыдущем примере мы использовали команду configure terminal:

  • Cisco: Securing the Control Plane of Infrastructure security

    The control plane is where a Cisco switch or router learns about its environment, using various protocols to talk to neighboring devices. The protocols operating on the control plane of a router are different from those of a switch. Therefore, the types of attacks and the intended results are also different, but they can be generalized into two broad sets:

    • Overwhelming the control plane: This is a DoS attack in which an attempt is made to overwhelm the CPU by sending a large number of control packets. When the CPU is busy handling this flood, it isn’t able to process normal traffic.
    • Corrupting control plane data: In this type of attack, malicious control plane protocol packets are used to inject rogue information to affect the actual flow of data. Typically, STP, VTP, and routing protocols are used in the control plane to create routing tables, forwarding tables, and other tables. An attacker managing to inject incorrect information in these tables can result in a DoS attack or, worse, the data can be redirected to a rogue device for a MITM attack.
  • Cisco: securing the Management Plane of Infrastructure security

    Any function related to management of a device resides in the management plane. The primary means of managing Cisco routers and switches are the console and the vty. Both of these provide access to the command-line interface (CLI). In most cases, even when a GUI interface for management is available, it uses the CLI to issue commands to the device. Apart from direct access to the CLI, SNMP can be used for information gathering and change configuration.

  • Configuring SSH in Cisco: step by step manual

    Problem:

    Configure SSH in Cisco. Make SSH the default environment for terminal lines.

  • History and evolution of Cisco Firepower solutions

    Cisco acquired Sourcefire in 2013. At that time, Sourcefire was one of the top leaders in the cybersecurity industry for its intrusion detection system (IDS), intrusion prevention system (IPS), and next-generation firewall (NGFW) solutions. The Sourcefire IPS was based on Snort, an open source network intrusion detection and prevention system. In fact, Martin Roesch, the creator of Snort, founded Sourcefire in 2001.

  • Infrastructure security and segmentation: the Three Planes

    We did not leave the world of security for the astral planes, and neither did we switch to the flying kind. The planes we discuss here are the three that exist on a network device: the management, control, and data planes.

  • Integrated Security Technologies and Solutions - Volume I

    Title: Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, First edition

    Author:Jamie Sanbower, Mason Harris, Vivek Santuka, Aaron Woland
    Publisher: Cisco Press

    Year: 2018
    Pages: 590
    Language: english
    Format: EPUB
    ISBN: 9780134807577, 978-1-58714-706-7

  • Integrated Security Technologies and Solutions - Volume I

    Название: Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, First edition

    Автор:Jamie Sanbower, Mason Harris, Vivek Santuka, Aaron Woland
    Издательство: Cisco Press

    Год: 2018
    Страниц: 590
    Язык: english
    Формат: EPUB (изначально электронная книга)
    ISBN: 9780134807577, 978-1-58714-706-7

  • Integrating Security Solutions basic principles

    The threats that current-day networks face are advanced, persistent, and evolving continuously. To protect against them, network and security solutions are becoming more complex. Complexity leads to inefficiency and increased cost. A typical large organization uses multiple security products from multiple vendors. Some organizations use up to 70 different products to secure their networks. Each of these products has different information in different management consoles. In the event of an attack, you have to look at multiple consoles and correlate information manually to even determine that you are under attack.

  • Network Security: Know Thy Enemy & Self - Cisco approach

    These were the first two—and only—characters transferred between University of California, Los Angeles (UCLA) and Stanford Research Institute (SRI) when the very first ARPANET link was established between these two locations in 1969. It was an attempt to send the LOGIN command, but the system crashed. Who would have guessed that this was the birth of one of the most important tools of modern times: the Internet? Nevertheless, ARPANET continued to evolve and grow into an international network. By early 1990, especially with the invention of the World Wide Web (WWW) by Tim Berners-Lee, the Internet became an integral part of our lives. Initially ARPANET and then the Internet were designed to be government and government-body networks. The focus of early development was primarily inter-connectivity and reliability. Security was not top-of-mind for what was to be a closed network. Hence, most of the protocols the Internet is made up of do not have security built in.

  • Payment Card Industry Data Security Standard & Cisco Security Tec

    The Payment Card Industry Data Security Standard (PCI DSS) is a standard for security mandated by most of the major credit card companies, including Visa, MasterCard, American Express, Discover, and JCB. This standard applies to any organization that processes, stores, or transmits credit card information. This is not a standard required by federal law but rather mandated by the credit card companies and administered by the Payment Card Industry Security Standards Council. Some states, however, directly reference either PCI DSS or an equivalent standard in their laws.

  • Regulatory Compliance and corresponding Cisco security solutions

    While frameworks can be used to create a security policy, an organization must also take into consideration the regulatory compliance and laws that apply to the industries and locations in which it operates. Such laws are made to protect the industry and its consumers and offer specific guidelines to ensure security of information.

  • Security Models review: Cisco SAFE, Bell–LaPadula, Biba

    So far in my blog, we have discussed how to assess risks and create a security policy, taking into consideration regulatory requirements. Creating a security policy is just the first step in securing your organization. A security policy only indicates the requirements of the business and its management. It needs to be implemented to be of any use!

    How do you effectively implement a security policy? The answer is by using security models. While it is not necessary to use a defined model, using one will make the implementation and auditing more effective and uniform. A security model helps convert requirements of a policy into a set of rules and regulations.

  • Версии операционной системы Cisco IOS

    Cisco Internetwork Operating System (IOS) - это программное обеспечение для управления маршрутизаторами и коммутаторами Cisco. Это то, что обеспечи­вает интерактивность при конфигурировании устройств Cisco. На текущий я использую систему IOS версии 15, и все написанное верно именно для этой версии. Если вы создаете свою сеть на оборудовании, бывшем в употреблении, целесообразно использовать версию программного обеспече­ния постарше.

  • Краткий курс по операционной системе Cisco IOS

    Если вы уже используете графический пользовательский интерфейс (GUI) для системного администрирования, то администрирование сети Cisco не вызовет затруднений. Но, несмотря на то что сотрудники компании Cisco приложили мало усилий к разработке конфигурационных утилит «в один щелчок», ин­терфейс командной строки (command-line interface, CLI) остается доступным и сохраняет свою значимость. Это мощный и эффективный инструмент, если вы хорошо понимаете, как работают команды, которые вводите. Интерфейс командной строки черно-белый, в отличие от графического интерфейса с его красочными кнопками и удобными для пользователя уведомлениями.

  • Режимы работы с CISCO IOS: пользовательский и привилегированный

    В Cisco IOS предусмотрено два основных режима работы: пользовательский (user mode) и привилегированный (privileged mode). При первом подключении маршрутизатор работает в пользовательском режим. В документации Cisco он упоминается как пользовательский режим исполнения (user exec mode), но в своем блоге для простоты я не буду добавлять слово «исполнения». Вы узнаете пользовательский режим по следующему приглашению:

  • Что такое сети Cisco? Основные понятия и термины

    Любая организация проводит основные объемы трафика через устройства двух типов: коммутаторы и маршрутизаторы. Cisco - наиболее популярный бренд, производящий надежные коммутаторы и маршрутизаторы, поэтому многие компании приняли его как стандарт для подобного рода устройств. Для прочего сетевого оборудования, например брандмауэра или точки беспроводного доступа, кто-то предпочитает Cisco, кто-то выбирает что-нибудь другое или использует бренды совместно. Но если сеть построена с использованием маршрутизаторов и коммутаторов Cisco, то это сеть Cisco.