Wireless DOS attacks
While the Security of Wireless networks are improving, they are still very susceptible to DOS attacks and I doubt that will change anytime in the near future. RF jamming and
Information Security Notes
While the Security of Wireless networks are improving, they are still very susceptible to DOS attacks and I doubt that will change anytime in the near future. RF jamming and
An attacker is attempting to Telnet a specific host secured behind a firewall rule tht only allows inbound connections on TCP port 25. Send 2 packets, the first packet with
All switches in the VTP domain must run the same version of vtp. Enabling VTP pruning on a server will enable the feature fro the entire management domain.
ASA/PIX Active/Active failover can be used to load-balance, On a per-context basis only.
Fig1 represents 3 security contexts all sharing a common VLAN(500) a single IP subnet corresponds to that VLAN. This is equivalent to connecting three security appliances using an ethernet switch.
To increase security, MD5 authentication is added to an OSPF virtual link Company security policies dictate that all passwords must be changed after 90 days. If a second MD5 key
Continue reading…MD5 authentication is added to an OSPF virtual link
Telnet and SSH are access methods the CS-Mars can use to get configuration information from an Adaptive Security Appliance (ASA).
Anomly Detection is an example of a security technlogy that could be enabled by Netflow
rate-Limiting support for multiple virtual firewalls Transparent firewall
The RADIUS Vendor Specific Attribute type is decimal 26. Vendor Specific Attribute MUST include the Legend field. In Cisco’s vendor Specific attribute implementation, vendr-ID of 1 is commonly reffered to
The ACS server used in the NAC framework, to authenticate devices based on quarantine information
Algorithms TKIP added to the 802.11 specification: Key Mixing Anti-replay sequnce counter Message integrity check
would an attacker figure out the initial sequence number: 1) Attacker sends SYN packet to server using a spoofed source IP address ot a trusted host 2)Server sens SYN, ACK
The size of a point-to-point GRE header 4 bytes, and protocol number 47 at IP layer
MPPE encryption Not required for PPTP
the IOS easy VPN server config: To connect the remote VPN client will use a groupname of test The remote vpn client will be assigned an internal IP address from
Using the emb_lim option in the static command, is one way to configure the security appliance to protect against DoS attacks
IP as-path access-list 1 deny_65104$ IP as-path access-list 1 permit AS-Path ACL is used to deny all the prefixes that originate in AS 65104 and permit all other prefixe
cisco IOS the 1536-bit Deffie-Hellman prime modulus equivalent to Group 5