CIS410_Security_Policy_Developement_Lab

CIS410_Security_Policy_Developement_Lab - CCNA Security...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CCNA Security Lab: Chapter 9 Lab A, Security Policy Development and Implementation Instructor Version Topology IP Addressing Table Devi ce I nterface I P Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A S1 FA0/5 S0/0/0 (DCE) 10.1.1.1 255.255.255.2 52 N/A N/A R2 S0/0/0 10.1.1.2 255.255.255.2 52 N/A N/A S0/0/1 10.2.2.2 255.255.255.2 N/A N/A All contents are Copyright 19922009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 109 CCNA Security (DCE) 52 R3 FA0/1 192.168.3. 1 255.255.255.0 N/A S3 FA0/5 S0/0/1 10.2.2.1 255.255.255.2 52 N/A N/A S1 VLAN 1 192.168.1.1 1 255.255.255.0 192.168.1.1 N/A S2 VLAN 1 192.168.1.1 2 255.255.255.0 192.168.1.1 N/A S3 VLAN 1 192.168.3.1 1 255.255.255.0 192.168.3.1 N/A PC-A NIC 192.168.1. 3 255.255.255.0 192.168.1.1 S1 FA0/6 PC-B NIC 192.168.1. 2 255.255.255.0 192.168.1.1 S2 FA0/18 PC-C NIC 192.168.3. 3 255.255.255.0 192.168.3.1 S3 FA0/18 Objectives Part 1: Create a Basic Security Policy Use Cisco Security Policy Builder to create a policy. Develop a network device configuration policy. Part 2: Basic Network Device Configuration Configure host names, interface IP addresses, and passwords. Configure static routing. Part 3: Secure Network Routers Configure passwords and a login banner. Configure SSH access and disable Telnet. Configure HTTP secure server access. 2- 109 CCNP 1: Advanced Routing v3.0 - Lab 1.4.1Copyright 2003, Cisco Systems, Inc. CCNA Security Configure a synchronized time source using NTP. Configure router syslog support. Configure centralized authentication using AAA and RADIUS. Use IOS to disable unneeded services and secure against login attacks. Use SDM to disable unneeded services. Configure a CABC firewall. Configure a ZBF firewall. Configure Int rusion Prevention (IPS) using IOS and SDM. Backup and secure Cisco IOS image and configuration Files. Part 4: Secure Network Switches Configure hostnames, passwords and a login banner. Configure management VLAN access Configure a synchronized time source Using NTP. Configure syslog support. Configure SSH access. Configure AAA and RADIUS. Secure trunk ports. Secure access ports. Protect against STP attacks. Configure port security and disable unused ports. Part 5: Configure VPN Remote Access Use SDM to configure Easy VPN Server. Use the Cisco VPN Client to test the remote access VPN. All contents are Copyright 19922009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 109 CCNA Security Background A comprehensive security policy covers three main areas: Governing Policies, End user policies and Technical Policies. Technical Policies may include E-mail, remote access, telephony, applications, and network policies, such as device access controls and logging. The focus of this lab is the technical network policies and security measures logging....
View Full Document

This note was uploaded on 09/09/2011 for the course CIS CIS410 taught by Professor Mr.t during the Spring '11 term at ECPI College of Technology.

Page1 / 109

CIS410_Security_Policy_Developement_Lab - CCNA Security...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online