CCENT Challenge 1 – Host to Host Communication

Examine the graphic below:



Snow_White sends a packet to Grimm. Grimm then responds with a packet to Snow_White. What is the source IP and source MAC address of this packet when it arrives at Dopey? Answer in the form of : IP address of Fa0/0 of Grumpy and MAC address of Fa0/3 of Happy.

Good luck – you will find the answer posted in the comments section of this blog.

Facebook Hit with “Watering Hole” Style Attack

In the CCNA Security discipline, we learn about many different security attacks. These include such common issues as Reconnaissance Attacks and the dreaded Distributed Denial of Service (DDoS) attacks. It is understandable that new day zero (brand new and unknown) attacks are always going to take place.

Want a real world example? Facebook just experienced some new day zero problems centered around a class of attack known as a Watering Hole attack. This is where a popular Web site used by an organization is attacked and is able to infect systems that visit that site. This is certainly a scary proposition, especially when you consider that Facebook computers that were infected were fully patched to protect against all known attacks.

Want to read the complete story? I hope you do – check it out here:

Wall Street Journal: Facebook – We Were Hacked But Don’t Panic

CCIE Security Lab Version 4 VPN Topic Checklist

As I start back in my CCIE Security studies, I am going to start with the Lab items for VPNs – here they are:

  • Understanding Cryptographic Protocols (ISAKMP, IKEv1 and IKEv2, ESP, Authentication Header, CA)
  • IPsec VPN Architecture on Cisco IOS Software and Cisco ASA Security Appliance
  • Configuring VPNs Using ISAKMP Profiles
  • Configuring VPNs Using IPsec Profiles
  • GRE over IPsec Using IPsec Profiles

Continue reading CCIE Security Lab Version 4 VPN Topic Checklist