CCNA_Security_02-bupt

CCNA_Security_02-bupt - 1 CCNA Security Chapter 2: Securing...

Info iconThis preview shows pages 1–16. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 CCNA Security Chapter 2: Securing Network Chapter 2: Securing Network Devices Devices 2 Lesson Objectives Secure the administrative access using the CLI and SDM. Configure administrative roles using privilege levels and role-based CLI. Implement the management and reporting features of syslog, SNMP, SSH, and NTP . Examine router configurations with the Security Audit feature of Cisco SDM. Using the auto secure command or the One-Step Lockdown feature. 3 Securing Network Devices 2.1 2.1 Securing Device Access Securing Device Access 2.2 2.2 Assigning Administrative Roles Assigning Administrative Roles 2.3 2.3 Monitoring and Managing Devices Monitoring and Managing Devices 2.4 2.4 Using Automated Security Features Using Automated Security Features 4 2.1 Securing Device Access 5 2.4 Using Automated Security Features 6 2.1 Securing Device Access 2.1.1 2.1.1 Securing Securing the Edge Router the Edge Router 2.1.2 Configuring Secure 2.1.2 Configuring Secure Administrative Access Administrative Access 2.1.3 Configuring Support for 2.1.3 Configuring Support for Virtual Logins Virtual Logins 2.1.4 Configuring 2.1.4 Configuring SSH SSH 7 2.1.1 Securing the Edge Router Single Router Single Router Approach Approach Defense-in-depth Defense-in-depth Approach Approach DMZ Approach DMZ Approach 8 Securing the Edge Router Areas of Router Security Areas of Router Security Location, UPS Location, UPS Memory, Version, Memory, Version, Backup Backup Control Secure, Control Secure, Disable unused Disable unused 9 Securing the Edge Router Securing Administrative Access Restrict Restrict device accessibility Log Log and account for all access Authenticate access Authorize actions Present legal notification legal notification Ensure the confidentiality confidentiality of data 10 Securing the Edge Router Local Versus Remote Access Internet LAN 1 R1 Local Access Administrator Console Port LAN 2 R1 Internet R2 Firewall LAN 3 Management LAN Administration Host Logging Host Remote Access Telnet, SSH, HTTP or SNMP Telnet, SSH, HTTP or SNMP Console, AUX Console, AUX 11 2.1.2 Configuring Secure Administrative Access Passwords Access Port Passwords Password Security Creating Users 12 Passwords Length> 10 R1(config)# R1(config)# security passwords min-length 10 security passwords min-length 10 Complex password No dictionary words, No username, No...... Security = 5ecur1ty Change passwords often Save password in private place 13 Access Port Passwords R1(config)# enable secret cisco enable secret cisco R1(config)# line con 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line aux 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line vty 0 4 line vty 0 4 R1(config-line)# password cisco password cisco R1(config-line)# login login 14 Password Security 15 Creating Users Parameter Description name This parameter specifies the username.This parameter specifies the username....
View Full Document

Page1 / 97

CCNA_Security_02-bupt - 1 CCNA Security Chapter 2: Securing...

This preview shows document pages 1 - 16. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online