Microsoft counters report of Google's dumping Windows |
- Microsoft counters report of Google's dumping Windows
- Will Fed Intervention Curb or Protect Your Digital Freedom?
- Windows, Mac, or Linux: It's Not the OS, It's the User
- Intego updates Mac users on OSX/OpinionSpy Spyware threat
- Security firm discovers spyware in Mac software
- Configuring IPS Protection and IP Spoofing on Cisco ASA 5500 Firewalls
- Cisco CCNA Exams Expiring In November - Get Certified Now!
- Google faces privacy investigation in Canada
- Android rootkit is just a phone call away
- FTC pushes back identity theft rules deadline -- for fifth time
- Enterprise risk management: all systems go
- SaaS's Troubled Adolescence: 3 Signs of Immaturity
- The best CTOs of 2010
- Google Dropping Windows over Security? Good Luck
Microsoft counters report of Google's dumping Windows Posted: 02 Jun 2010 09:00 AM PDT |
Will Fed Intervention Curb or Protect Your Digital Freedom? Posted: 02 Jun 2010 09:00 AM PDT |
Windows, Mac, or Linux: It's Not the OS, It's the User Posted: 02 Jun 2010 09:00 AM PDT |
Intego updates Mac users on OSX/OpinionSpy Spyware threat Posted: 02 Jun 2010 09:00 AM PDT |
Security firm discovers spyware in Mac software Posted: 01 Jun 2010 09:00 AM PDT |
Configuring IPS Protection and IP Spoofing on Cisco ASA 5500 Firewalls Posted: 02 Jun 2010 06:53 AM PDT The Cisco ASA firewall appliance provides great security protection out-of-the box with its default configuration. However, to increase the security protection even further, there are several configuration enhancements that can be used to implement additional security features. Two of these features are IP Spoofing protection and basic Intrusion Prevention (IPS) support. IP Spoofing Protection IP spoofing attacks are those that change the actual source IP address of packets to obscure their true origin. This means that packets arriving at a particular interface (e.g inside) must have a valid source IP address that matches the correct source interface according to the firewall routing table. Normally the firewall only looks at the destination address of a packet in order to forward it accordingly. If you enable the IP Spoofing mechanism, the firewall checks also the source address of the packets. If for example our inside interface connects to internal network 192.168.1.0/24, this means that packets arriving at the inside firewall interface must have a source address in the range 192.168.1.0/24 otherwise they will be dropped (if IP Spoofing is configured). The IP Spoofing feature uses the Unicast Reverse Path Forwarding (Unicast RPF) mechanism, which dictates that for any traffic that you want to allow through the security appliance, the security appliance routing table must include a route back to the source address. To enable IP Spoofing protection, enter the following command: CiscoASA5500(config)# ip verify reverse-path interface "interface_name" For example, to enable IP spoofing on the inside interface, use the following command: CiscoASA5500(config)# ip verify reverse-path interface inside Basic IPS Protection Although the ASA Firewall supports full IPS functionality with an extra IPS hardware module (AIP-SSM), it supports also basic IPS protection which is built-in by default without using an extra hardware module. The built-in IPS feature supports a basic list of signatures and you can configure the security appliance to perform one or more actions on traffic that matches a signature. The command that implements the basic IPS feature is called "ip audit". There are two signature groups embedded in the firewall software: "Informational" and "Attack" signatures. You can define an IP audit policy for each signature group as following: For informational signatures: CiscoASA5500 (config)# ip audit name "name" info [action [alarm] [drop] [reset]] For attack signatures: CiscoASA5500 (config)# ip audit name "name" attack [action [alarm] [drop] [reset]] The keywords [alarm], [drop], [reset] define the actions to perform on a malicious packet that matches one of the signatures. [alarm] generates a system message showing that a packet matched a signature, [drop] drops the packet, and [reset] drops the packet and closes the connection. After defining an IP audit policy (IPS policy) as shown above, we need to attach the policy to a specific interface: CiscoASA5500(config)# ip audit interface "interface_name" " policy_name" Let's see an actual example: CiscoASA5500 (config)# ip audit name dropattacks attack action drop |
Cisco CCNA Exams Expiring In November - Get Certified Now! Posted: 02 Jun 2010 02:39 AM PDT Cisco CCNA candidates need to be aware that the current CCNA, Intro, and ICND exams are being retired as of November 6, 2007. This is actually great news for future CCNAs, since there is more than enough time to study for the 640-801 version of the CCNA exam, even if you haven't started studying yet! The current version of the exam, 640-801, is challenging enough as it is - but the new version of the exam, 640-802, is going to be even more challenging! Among the new topics covered on the 640-802 exam are Rapid Spanning Tree Protocol (RSTP), IP Version 6 (IPv6), router security, switch security, VPNs, and wireless routing. Why is Cisco making these changes? Cisco no longer wants the CCNA to be seen as an "entry level" certification, and I personally think that's a welcome change. I've been writing CCNA ebooks and teaching in-person and internet-based CCNA courses for years, and I've always refused to refer to the CCNA as "entry level". Cisco's new entry-level certification is the CCENT, Cisco Certified Entry Level Technician, and we'll talk about that certification in a future article. For now, it's important to realize that you have plenty of time to prepare for the current 640-801 exam. By doing so, you'll earn one of the most valuable certifications avaiable today. Cisco does a tremendous job in protecting the value of its certifications, and any time spend on earning the CCNA is time well-spent. The CCNA 640-802 exam will be available on August 1, but again, the current 640-802 exam will be available through November 5. If you want to get CCNA certified, now is definitely the time to get the job done - so get started, book your exam date today, and get CCNA certified! |
Google faces privacy investigation in Canada Posted: 02 Jun 2010 09:00 AM PDT |
Android rootkit is just a phone call away Posted: 02 Jun 2010 09:00 AM PDT |
FTC pushes back identity theft rules deadline -- for fifth time Posted: 01 Jun 2010 09:00 AM PDT |
Enterprise risk management: all systems go Posted: 01 Jun 2010 09:00 AM PDT When Bill Badertscher arrived at Georgetown University three years ago, campuswide security was handled in several departments with little coordination among teams. It was time for a change. Badertscher is Georgetown's senior engineer for facility and safety control systems and leader of a new IT team that focuses on the same areas. The goal is to address enterprise risk management (ERM) by redefining it to include nontraditional systems. Understanding that security is mission-critical has led the University Safety and Information Services departments to work together in unprecedented ways. |
SaaS's Troubled Adolescence: 3 Signs of Immaturity Posted: 01 Jun 2010 09:00 AM PDT |
Posted: 01 Jun 2010 09:00 AM PDT For many in IT, 2009 was a nuclear winter, with resources stripped away as companies struggled to survive. Yet many were tasked with using IT to increase the company's efficiency, enter the few new growth markets, or fix a fundamental problem that threatened the company's ability to stay in business. |
Google Dropping Windows over Security? Good Luck Posted: 01 Jun 2010 09:00 AM PDT Sources from within Google are claiming that the online search and advertising giant is implementing an official transition away from the Microsoft Windows operating system. According to the reports, the culture shift is intended to reduce security concerns. That makes a compelling headline--especially for a Microsoft rival developing its own operating system--but it doesn't make a very good security strategy. |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment