Security

Basic info about ccna security!!!

CCNA Security (640-554 IINS – Implementing Cisco IOS Network Security)
The Cisco CCNA Security certification title is an entry level network security certification offered by Cisco Systems.
The Cisco CCNA Security certification provides a stepping stone for IT Security professionals who want to enhance their CCNA-level skills can fill the huge demand for network security professionals.
The Cisco CCNA Security certification curriculum provides an introduction to the core security concepts. The Cisco CCNA Security certification also provides the tools and skills needed for an IT security beginner for installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices.
CCNA Security (640-554 IINS – Implementing Cisco IOS Network Security) covers the following topics.
The candidates who wish to attend CCNA Security training and examination should have a thorough knowledge in Basic Networking, TCP/IP, CCNA and basics of Network Security. Please visit the below links to study Basic Networking,TCP/IP, CCNA and basics of Network Security
Common Security Threats
• Describe common security threats

Security and Cisco Routers
• Implement security on Cisco routers
• Describe securing the control, data, and management plane
• Describe Cisco Security Manager
• Describe IPv4 to IPv6 transition

AAA on Cisco Devices
• Implement AAA (authentication, authorization, and accounting)
• Describe TACACS+
• Describe RADIUS
• Describe AAA
• Verify AAA functionality

IOS ACLs
• Describe standard, extended, and named IP IOS access control lists (ACLs) to filter packets
• Describe considerations when building ACLs
• Implement IP ACLs to mitigate threats in a network

Secure Network Management and Reporting
• Describe secure network management
• Implement secure network management

Common Layer 2 Attacks
• Describe Layer 2 security using Cisco switches
• Describe VLAN security
• Implement VLANs and trunking
• Implement spanning tree

Cisco Firewall Technologies
• Describe operational strengths and weaknesses of the different firewall technologies
• Describe stateful firewalls
• Describe the types of NAT used in firewall technologies
• Implement zone-based policy firewall using CCP
• Implement the Cisco Adaptive Security Appliance (ASA)
• Implement Network Address Translation (NAT) and Port Address Translation (PAT)

Cisco IPS
• Describe Cisco Intrusion Prevention System (IPS) deployment considerations
• Describe IPS technologies
• Configure Cisco IOS IPS using CCP

VPN Technologies
• Describe the different methods used in cryptography
• Describe VPN technologies
• Describe the building blocks of IPSec
• Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
• Verify VPN operations
• Implement Secure Sockets Layer (SSL) VPN using ASA device manager

Security

Yahoo 5xx SMTP error codes

5xx SMTP error codes

5xx SMTP errors indicate an email could not be delivered due to a permanent problem. You should not retry sending email flagged with a 5xx error. Message delivery can be permanently deferred because:

  • You’re trying to send a message to an invalid email address.
  • Spamhaus has your IP address listed on a Block List.
  • Your SMTP connection was rejected.
  • Your message failed authentication checks against your sending domain’s DomainKeys or DKIM policy.
  • The message contains characteristics that Yahoo Mail won’t accept for policy reasons.

Our recommendations

If you’re not the administrator of the mail server in question

Contact your mail server’s administrator to discuss the error.

If you’re a message content author or mailing policy administrator

If you’re seeing this same error consistently over a 48-hour period and you’ve deployed significant changes attempting to resolve the error, we encourage you to review our recommended best practices when sending to Yahoo Mail.

  • List managers should have a policy for removing email addresses that generate errors/bounces.
  • We review IPs submitted for delivery issues and, based on our review, we may modify your reputation in our systems if needed.
    • Fill out a new sender application if your email is being deferred by Yahoo. This doesn’t guarantee inbox delivery.
    • Even if you have a good reputation, users can vote your email as spam and affect your overall reputation.
    • Examine your outbound queues to ensure that spammers aren’t abusing your mail server.
    • If you’re using a shared IP address, mail traffic from other domains could be negatively affecting your IP sending reputation. This traffic can result from things outside the sender’s control.
  • Consider the following when you review outgoing messages for objectionable content or practices:
    • IP address reputation.
    • URL reputation.
    • Domain reputation.
    • Sender reputation.
    • DomainKeys Identified Mail (DKIM) signatures.
    • Domain-based Message Authentication, Reporting & Conformance (DMARC) authentication.

Learn how to improve your sender reputation

  • Review the best practices for bulk mail senders and postmasters.
  • If you’re a bulk email provider, apply for new sender status.
  • If sending from a Yahoo Mail account, learn about sending limits.
  • Review our guidelines for prioritizing email and sender reputation.
  • Review our SMTP error table.
  • Failed DKIM or DomainKeys authentication
  • Review our Terms for information on policies.

 Good to know: Yahoo is unable to disclose specific information regarding our filtering practices.

553 SMTP error codes

553 5.7.1 [BLXX] Connections not accepted from IP addresses on Spamhaus [XXX]

If you’re seeing one of the error messages below, don’t retry sending your message using the same IP address. We suggest you contact Spamhaus. Once your IP is delisted by Spamhaus, Yahoo Mail will automatically unblock your IP within 48 hours.

553 5.7.1 [BL21] Connections not accepted from IP addresses on Spamhaus PBL

Dynamic or residential IP addresses as determined by Spamhaus PBL (Error: 553 5.7.1 [BL21])

The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer’s use. The PBL helps networks enforce their Acceptable Use Policy for dynamic and non-MTA customer IP ranges.

553 5.7.1 [BL22] Connections not accepted from IP addresses on Spamhaus SBL

IP addresses listed as spam sources on the Spamhaus SBL (Error: 553 5.7.1 [BL22])

The Spamhaus Block List (“SBL”) Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.

553 5.7.1 [BL23] Connections not accepted from IP addresses on Spamhaus XBL

IP addresses listed as a possible open proxy or spam-sending Trojan Horse on Spamhaus XBL(Error: 553 5.7.1 [BL23])

The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies (HTTP, socks, AnalogX, wingate, etc), worms/viruses with built-in spam engines, and other types of trojan-horse exploits.

553 VS99-IP1 deferred

This error means your SMTP connection was rejected. Contact your administrator to resolve this issue.

553 Mail from x.x.x.x not allowed – [numeric code]

554 SMTP error codes

554 5.7.1 [MW01] Message content not accepted for policy reasons

This error message indicates that your email wasn’t accepted because there is a URL in the message that Yahoo Mail won’t accept for policy reasons. For instance, messages with links to viruses or other types of malicious software.

554 5.7.5 (AU01) Message not accepted for policy reasons

This error message indicates that your email wasn’t accepted because it failed authentication checks against your sending domain’s DomainKeys or DKIM policy. Learn more about what causes this error message.

554 5.7.9: Message not accepted for policy reasons

Yahoo Mail couldn’t verify the message came from a legitimate email sender. Learn more about this error and the steps needed to resolve the problem.

554 delivery error: dd This user doesn’t have a yahoo.com account ({recipients’userid}@yahoo.com)

The email didn’t go through because the recipient’s user ID doesn’t exist. You shouldn’t retry the message, and remove the email address from your list. It will never complete successfully.

554 Message not allowed – [numeric code]

The [numeric code] shows a specific diagnostic code (e.g. “298”, “299”, “320”) in your SMTP logs, and is related to:

  • The date in the message body differs by more than 2 days from the current date.
  • The message contains characteristics that Yahoo Mail won’t accept for policy reasons.
    – For example, messages with malicious content or manipulated header information, such as:

    • A falsified origination point.
    • An altered sending date.
    • A forged email address.
    • A URL in the email that is marked as malicious.

 

Security

Networking Protocols Basics…

An Introduction to Networking Terminology, Interfaces, and Protocols

 

Introduction

A basic understanding of networking is important for anyone managing a server. Not only is it essential for getting your services online and running smoothly, it also gives you the insight to diagnose problems.

This document will provide a basic overview of some common networking concepts. We will discuss basic terminology, common protocols, and the responsibilities and characteristics of the different layers of networking.

This guide is operating system agnostic, but should be very helpful when implementing features and services that utilize networking on your server.

 

Networking Glossary

Before we begin discussing networking with any depth, we must define some common terms that you will see throughout this guide, and in other guides and documentation regarding networking.

These terms will be expanded upon in the appropriate sections that follow:

  • Connection: In networking, a connection refers to pieces of related information that are transfered through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at the end of the data transfer.
  • Packet: A packet is, generally speaking, the most basic unit that is transfered over a network. When communicating over a network, packets are the envelopes that carry your data (in pieces) from one end point to the other.

Packets have a header portion that contains information about the packet including the source and destination, timestamps, network hops, etc. The main portion of a packet contains the actual data being transfered. It is sometimes called the body or the payload.

  • Network Interface: A network interface can refer to any kind of software interface to networking hardware. For instance, if you have two network cards in your computer, you can control and configure each network interface associated with them individually.

A network interface may be associated with a physical device, or it may be a representation of a virtual interface. The “loopback” device, which is a virtual interface to the local machine, is an example of this.

  • LAN: LAN stands for “local area network”. It refers to a network or a portion of a network that is not publicly accessible to the greater internet. A home or office network is an example of a LAN.
  • WAN: WAN stands for “wide area network”. It means a network that is much more extensive than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in general, it is usually meant to mean the internet, as a whole.

If an interface is said to be connected to the WAN, it is generally assumed that it is reachable through the internet.

  • Protocol: A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.

Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP.

  • Port: A port is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it allows your server to be able to communicate using more than one application.
  • Firewall: A firewall is a program that decides whether traffic coming into a server or going out should be allowed. A firewall usually works by creating rules for which type of traffic is acceptable on which ports. Generally, firewalls block ports that are not used by a specific application on a server.
  • NAT: NAT stands for network address translation. It is a way to translate requests that are incoming into a routing server to the relevant devices or servers that it knows about in the LAN. This is usually implemented in physical LANs as a way to route requests through one IP address to the necessary backend servers.
  • VPN: VPN stands for virtual private network. It is a means of connecting separate LANs through the internet, while maintaining privacy. This is used as a means of connecting remote systems as if they were on a local network, often for security reasons.

There are many other terms that you may come across, and this list cannot afford to be exhaustive. We will explain other terms as we need them. At this point, you should understand some basic, high-level concepts that will enable us to better discuss the topics to come.

 

Network Layers

While networking is often discussed in terms of topology in a horizontal way, between hosts, its implementation is layered in a vertical fashion throughout a computer or network.

What this means is that there are multiple technologies and protocols that are built on top of each other in order for communication to function more easily. Each successive, higher layer abstracts the raw data a little bit more, and makes it simpler to use for applications and users.

It also allows you to leverage lower layers in new ways without having to invest the time and energy to develop the protocols and applications that handle those types of traffic.

The language that we use to talk about each of the layering scheme varies significantly depending on which model you use. Regardless of the model used to discuss the layers, the path of data is the same.

As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest level, actual transmission to another machine takes place. At this point, the data travels back up through the layers of the other computer.

Each layer has the ability to add its own “wrapper” around the data that it receives from the adjacent layer, which will help the layers that come after decide what to do with the data when it is passed off.

OSI Model

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect.

This model defines seven separate layers. The layers in this model are:

  • Application: The application layer is the layer that the users and user-applications most often interact with. Network communication is discussed in terms of availability of resources, partners to communicate with, and data synchronization.
  • Presentation: The presentation layer is responsible for mapping resources and creating context. It is used to translate lower level networking data into data that applications expect to see.
  • Session: The session layer is a connection handler. It creates, maintains, and destroys connections between nodes in a persistent way.
  • Transport: The transport layer is responsible for handing the layers above it a reliable connection. In this context, reliable refers to the ability to verify that a piece of data was received intact at the other end of the connection.

This layer can resend information that has been dropped or corrupted and can acknowledge the receipt of data to remote computers.

  • Network: The network layer is used to route data between different nodes on the network. It uses addresses to be able to tell which computer to send information to. This layer can also break apart larger messages into smaller chunks to be reassembled on the opposite end.
  • Data Link: This layer is implemented as a method of establishing and maintaining reliable links between different nodes or devices on a network using existing physical connections.
  • Physical: The physical layer is responsible for handling the actual physical devices that are used to make a connection. This layer involves the bare software that manages physical connections as well as the hardware itself (like Ethernet).

As you can see, there are many different layers that can be discussed based on their proximity to bare hardware and the functionality that they provide.

TCP/IP Model

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model:

  • Application: In this model, the application layer is responsible for creating and transmitting user data between applications. The applications can be on remote systems, and should appear to operate as if locally to the end user.

The communication is said to take place between peers.

  • Transport: The transport layer is responsible for communication between processes. This level of networking utilizes ports to address different services. It can build up unreliable or reliable connections depending on the type of protocol used.
  • Internet: The internet layer is used to transport data from node to node in a network. This layer is aware of the endpoints of the connections, but does not worry about the actual connection needed to get from one place to another. IP addresses are defined in this layer as a way of reaching remote systems in an addressable manner.
  • Link: The link layer implements the actual topology of the local network that allows the internet layer to present an addressable interface. It establishes connections between neighboring nodes to send data.

As you can see, the TCP/IP model, is a bit more abstract and fluid. This made it easier to implement and allowed it to become the dominant way that networking layers are categorized.

 

Interfaces

Interfaces are networking communication points for your computer. Each interface is associated with a physical or virtual networking device.

Typically, your server will have one configurable network interface for each Ethernet or wireless internet card you have.

In addition, it will define a virtual network interface called the “loopback” or localhost interface. This is used as an interface to connect applications and processes on a single computer to other applications and processes. You can see this referenced as the “lo” interface in many tools.

Many times, administrators configure one interface to service traffic to the internet and another interface for a LAN or private network.

In DigitalOcean, in datacenters with private networking enabled, your VPS will have two networking interfaces (in addition to the local interface). The “eth0” interface will be configured to handle traffic from the internet, while the “eth1” interface will operate to communicate with the private network.

 

Protocols

Networking works by piggybacking a number of different protocols on top of each other. In this way, one piece of data can be transmitted using multiple protocols encapsulated within one another.

We will talk about some of the more common protocols that you may come across and attempt to explain the difference, as well as give context as to what part of the process they are involved with.

We will start with protocols implemented on the lower networking layers and work our way up to protocols with higher abstraction.

Media Access Control

Media access control is a communications protocol that is used to distinguish specific devices. Each device is supposed to get a unique MAC address during the manufacturing process that differentiates it from every other device on the internet.

Addressing hardware by the MAC address allows you to reference a device by a unique value even when the software on top may change the name for that specific device during operation.

Media access control is one of the only protocols from the link layer that you are likely to interact with on a regular basis.

IP

The IP protocol is one of the fundamental protocols that allow the internet to work. IP addresses are unique on each network and they allow machines to address each other across a network. It is implemented on the internet layer in the IP/TCP model.

Networks can be linked together, but traffic must be routed when crossing network boundaries. This protocol assumes an unreliable network and multiple paths to the same destination that it can dynamically change between.

There are a number of different implementations of the protocol. The most common implementation today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4 addresses available and improvements in the protocols capabilities.

ICMP

ICMP stands for internet control message protocol. It is used to send messages between devices to indicate the availability or error conditions. These packets are used in a variety of network diagnostic tools, such as ping and traceroute.

Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem. Basically, they are used as a feedback mechanism for network communications.

TCP

TCP stands for transmission control protocol. It is implemented in the transport layer of the IP/TCP model and is used to establish reliable connections.

TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end of the connection using the methods available on the lower layers. On the other end, it can check for errors, request certain pieces to be resent, and reassemble the information into one logical piece to send to the application layer.

The protocol builds up a connection prior to data transfer using a system called a three-way handshake. This is a way for the two ends of the communication to acknowledge the request and agree upon a method of ensuring data reliability.

After the data has been sent, the connection is torn down using a similar four-way handshake.

TCP is the protocol of choice for many of the most popular uses for the internet, including WWW, FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.

UDP

UDP stands for user datagram protocol. It is a popular companion protocol to TCP and is also implemented in the transport layer.

The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does not verify that data has been received on the other end of the connection. This might sound like a bad thing, and for many purposes, it is. However, it is also extremely important for some functions.

Because it is not required to wait for confirmation that the data was received and forced to resend data, UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires off the data to that host and doesn’t care if it is accepted or not.

Because it is a simple transaction, it is useful for simple communications like querying for network resources. It also doesn’t maintain a state, which makes it great for transmitting data from one machine to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot afford delays.

HTTP

HTTP stands for hypertext transfer protocol. It is a protocol defined in the application layer that forms the basis for communication on the web.

HTTP defines a number of functions that tell the remote system what you are requesting. For instance, GET, POST, and DELETE all interact with the requested data in a different way.

FTP

FTP stands for file transfer protocol. It is also in the application layer and provides a way of transferring complete files from one host to another.

It is inherently insecure, so it is not recommended for any externally facing network unless it is implemented as a public, download-only resource.

DNS

DNS stands for domain name system. It is an application layer protocol used to provide a human-friendly naming mechanism for internet resources. It is what ties a domain name to an IP address and allows you to access sites by name in your browser.

SSH

SSH stands for secure shell. It is an encrypted protocol implemented in the application layer that can be used to communicate with a remote server in a secure way. Many additional technologies are built around this protocol because of its end-to-end encryption and ubiquity.

There are many other protocols that we haven’t covered that are equally important. However, this should give you a good overview of some of the fundamental technologies that make the internet and networking possible.

Security

SMTP error code table for Yahoo

SMTP error code table

If you’ve received an SMTP error code when sending email to a Yahoo Mail account, here’s information about the most commonly seen SMTP codes and their causes. For more details about each specific error code, review our 4xx SMTP and 5xx SMTP error code articles.

 Good to know – Yahoo is unable to disclose specific information regarding our filtering practices.

SMTP Error Diagnostic Error Message Reason
 421 421 Message temporarily deferred – [numeric code] The message content contained objectionable content, we’re seeing unusual traffic from your servers, or emails from your mail server are generating complaints from Yahoo Mail users.
 421 421 4.7.0 [TS01] Messages from x.x.x.x temporarily deferred due to user complaints – 4.16.55 We’re seeing unusual traffic patterns from your server.Submit your sending IPs for review.
 421 421 4.7.0 [TS02] Messages from x.x.x.x temporarily deferred due to user complaints – 4.16.55 We’re seeing unusual traffic patterns from your server or your mailings are generating complaints from Yahoo Mail users. Submit your sending IPs for review.
 421 421 4.7.1 [TS03] Messages from x.x.x.x permanently deferred. Retrying will NOT succeed We’re seeing a high volume of e-mails from your server that are indicative of unsolicited mailings. Submit your sending IPs for review.
 451 451 Resources temporarily not available – Please try again later [numeric code] This error indicates that our servers were busy and temporarily unable to process your transaction at the time of connection.
 451 451 VS1-IP Excessive unknown recipients – possible Open Relay (#4.1.8) Your mail server is configured as an open relay or proxy. Review our guidelines for avoiding deprioritization.
 451 451 VS1-MF Excessive unknown recipients – possible Open Relay (#4.4.5) The senders MAIL FROM address has been sending to excessive bouncing accounts (non-active, don’t exist). Review your mailing lists, and remove any addresses that generate bounces.
 553 553 5.7.1 [BLXX] Connections not accepted from IP addresses on Spamhaus PBL The sending IP is listed on a Spamhaus blacklist. You can check your status on Spamhaus’ site.
 554 554 Message not allowed – [numeric code] Your emails have become deprioritized due to the message content triggering our filters. We ask that you review the email’s header and message content for potentially objectionable content.
 554 Delivery error: dd This user doesn’t have a yahoo.com account (******@yahoo.com) [-5] – mta1126.mail.gq1.yahoo.com [BODY] The Yahoo account that you’re trying to send to doesn’t exist. We recommend that you contact the recipient directly to confirm their correct email address.
 554 554 5.7.9 Message not accepted for policy reasons Your message wasn’t delivered because Yahoo was unable to verify that it came from a legitimate email sender.