Chapter Review

Chapter Review

The Cisco IOS Firewall Intrusion Detection System has been a feature of a growing list of Cisco router platforms running the firewall feature set since version 12.0(5). The IDS features are currently available on the Cisco uBR900, 1720, 2600, 3600, 7100, 7200, and 7500 series routers, as well as the RSM for Catalyst 5000 switches.

The IOS-based IDS features extend the Cisco Secure IDS appliance and host-based software features to include the router-based firewalls. The IDS features can be especially useful in locations where a router is being deployed to provide additional security between network segments, such as between the organization and a partner site. The key advantage of an IDS-enabled device is the capability to take preconfigured steps to thwart an attack, rather than simply report it.

The most recent Cisco IOS Firewall IDS uses 59 attack signatures representing a broad cross section of intrusion detection signatures that identify severe breaches of security, as well as the most common network attacks and information-gathering scans.

Four basic steps configure the IDS features if the network is using the Cisco Secure Director (NetRanger). Those steps include initializing Cisco IOS Firewall IDS (required), initializing the Post Office (required), configuring and applying audit rules (required), and verifying the configuration (optional).

The MCNS exam objectives only include the first, third, and fourth steps because the IDS Director is covered in the IDS exam. In the configuring audit rules step, it’s possible to disable certain signatures because they’re unneeded or create false positive responses. You can also exempt some hosts from the auditing process reflecting their trusted status or to avoid false positive responses.

Questions

1.?

Which of the following is not a method of categorizing IDS systems covered in this chapter?

  1. Misuse detection vs. anomaly detection

  2. Network-based vs. host-based systems

  3. Open vs. proprietary

  4. Passive system vs. reactive system

 C. Open vs. proprietary is not a category used.

2.?

True or False. The Cisco IOS Firewall feature set is implemented on all Cisco router series.

  1. True

  2. False

 B. False. This is implemented only on the Cisco 800, uBR900, 1400, 1600, 1700, 2500, 2600, 3600, 7100, 7200, and 7500, and RSM series routers

3.?

Which of the following IOS features is always found with the IDS features on the new IOS?

  1. VPN features

  2. Firewall feature set

  3. AAA

  4. Java blocking

 B. Firewall feature set is always with IDS in the IOS.

4.?

Which of the following is not an action the IOS IDS can be configured to do?

  1. Drop

  2. Shut down

  3. Alarm

  4. Reset

 B. Shut down

5.?

Cisco IDS is based on matching traffic patterns to which of the following?

  1. Virus profiles

  2. Autographs

  3. Signatures

  4. Traffic baselines

 C. Signatures

6.?

Which of the four basic steps to configure the IDS features isn’t required?

  1. Initializing the Post Office

  2. Initializing Cisco IOS Firewall IDS

  3. Verifying the configuration

  4. Configuring and applying audit rules

 C. Verifying the configuration

7.?

Which two of the following are the commands to initialize Cisco IOS IDS on a router?

  1. Rtr1(config)#ip audit notify {nr-director | log}

  2. Rtr1(config)#ip audit smtp spam recipients

  3. Rtr1(config)#logging on

  4. Rtr1(config)#ip audit po max-events number_events

 B. and D.  Rtr1(config)#ip audit smtp spam  recipients and   Rtr1(config)#ip audit po max-events  number_events

8.?

Which of the following signature keywords means “information-gathering activity, such as a port sweep”?

  1. Attack

  2. Atomic

  3. Info

  4. Compound

  5. Apply Inspection Rules and ACLs

 C.  Info

9.?

Which of the following signature keywords means “simple patterns, such as an attempt to access a specific port on a specific host”?

  1. Attack

  2. Atomic

  3. Info

  4. Compound

 B.  Atomic

10.?

According to the text, how many IDS signatures are supported in the IOS version of IDS?

  1. 39

  2. 59

  3. 79

  4. The number changes with daily updates.

 B. 59

11.?

With the ip audit info and ip audit attack commands, how many actions can be applied?

  1. 1

  2. 2

  3. 3

  4. Depends on where it’s applied

 C. 3: Alarm, Drop, and Reset

12.?

Which command will disable the IDS signature 1001?

  1. Rtr1(config-if)#ip audit signature 1001 disable

  2. Rtr1(config)#ip audit signature 1001 disable

  3. Rtr1(config-if)#ip audit signature disable 1001

  4. Rtr1(config)#ip audit signature disable 1001

 C. Rtr1(config)#ip audit signature 1001 disable

13.?

In the command Rtr1(config)#ip audit name Attack.7 list 25, what does the 25 represent?

  1. The IDS signature

  2. The first 25 matching packets

  3. An ACL number

  4. The hold-time for attack packets

 C. An ACL number

14.?

What does the ip audit audit-name command do?

  1. Creates an IDS audit specification

  2. Is used to disable an IDS signature

  3. Applies an IDS audit specification to an interface

  4. No such command

 C. Applies an IDS audit specification to an interface

15.?

Which is not a valid IDS show command?

  1. show ip audit transactions

  2. show ip audit statistics

  3. show ip audit configuration

  4. show ip audit interface

 A. show ip audit transactions is not a real command

Answers

1.?

C. Open vs. proprietary is not a category used.

2.?

B. False. This is implemented only on the Cisco 800, uBR900, 1400, 1600, 1700, 2500, 2600, 3600, 7100, 7200, and 7500, and RSM series routers

3.?

B. Firewall feature set is always with IDS in the IOS.

4.?

B. Shut down

5.?

C. Signatures

6.?

C. Verifying the configuration

7.?

B. and D. Rtr1(config)#ip audit smtp spam recipients and Rtr1(config)#ip audit po max-events number_events

8.?

C. Info

9.?

B. Atomic

10.?

B. 59

11.?

C. 3: Alarm, Drop, and Reset

12.?

C. Rtr1(config)#ip audit signature 1001 disable

13.?

C. An ACL number

14.?

C. Applies an IDS audit specification to an interface

15.?

A. show ip audit transactions is not a real command




Part III: Virtual Private Networks (VPNs)