Review - week 4 Basic device access security

Slides:



Advertisements
Similar presentations
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

DMZ (De-Militarized Zone)
DMZ (De-Militarized Zone)
Securing the Router Chris Cunningham.
Radius based ssh authentication Location of Radius server – radius-server host auth-port 1812 acct-port 1813 key WinRadius – The same config.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Summer Classes Router - Initial Configuration By Roshan Chaudhary Lecturer Islington College.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 5 City College.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Cisco Configuration Elements Network Monitoring and Management Tutorial.
User Access to Router Securing Access.
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
Chapter 3: Authentication, Authorization, and Accounting
NetPro-ITI Ethernet LANs
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Jose Luis Flores / Amel Walkinshaw
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
Lesson 3a © 2005 Cisco Systems, Inc. All rights reserved. CSPFA v4.0—19-1 System Management and Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
 Router Configurations part1 2 nd semester
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
CISCO CONFIGURATION ELEMENTS 1. Overview Basic things that we need to make sure are configured on a Cisco router (and switch) to do proper network management.
LAN Switching and Wireless – Chapter 2
Instructor Materials Chapter 8 Configuring Cisco Devices
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Cisco configuration elelements
Instructor Materials Chapter 11: Build a Small Network
Chapter 11: Build a Small Network
R3# R3#sh run Building configuration...
Instructor Materials Chapter 2: Configure a Network Operating System
Working at a Small-to-Medium Business or ISP – Chapter 8
Understanding Switch Security
Methods of Securing LANs
CCNA Configuration Journal Sample
CCNA Journal Sample.
Introduction to SQL Server 2000 Security
Chapter 5: Switch Configuration
Cisco configuration elements
Marcos Hernandez, SMB Technical Marketing Engineer
Introduction to Networking
Cisco Device Hardening
Securing Access.
Understanding Switch Security
Chapter 5: Switch Configuration
– Chapter 3 – Device Security (B)
Net 412 (Practical Part) LAB 3 - Telnet
Understanding Cisco Router Security
Configuring a Router Module 3 Semester 2.
LAN Switching and Wireless – Chapter 2
Ch. 7 Network Management CIS 187 Multilayer Switched Networks CCNP version 7 Rick Graziani Spring 2016.
Chapter 5: Switch Configuration
Net 412 (Practical Part) LAB 4 - SSH
– Chapter 3 – Device Security (B)
Fundamentals of Computer Networks
Create New User in Database. First Connect the System.
5 – Switch Configuration
LAN Switching and Wireless – Chapter 2
Lock and Key by Linda Wier 2/23/2019.
Zachary blum Sam Garcia Courtney Sullivan
Presentation transcript:

Review - week 4 Basic device access security Password protect con 0, vty 0 4, privileged exec Strong passwords Store encrypted Service password encryption Enable password Level 8 and 9

Review - week 4 Guarding against password attacks Login delay period Login quiet period after bad attempts Exception for admins

Review - week 4 Access security Require username and password Store in local database Line con 0 Login local Line vty 0 4 Use AAA method list Aaa new-model Aaa authentication login default local

Review - week 4 Additional remote access security Apply access list Access-list 1 permit x.x.x.x 0.0.0.255 Line vty 0 4 Access-class 1 in Require SSH Create crypto key crypto key generate rsa general-keys modulus 1024 Set domain name Ip domain-name cis46.com Transport input ssh

Set privilege levels privilege exec level 5 show username admin5 privilege 5 secret cisco Use views A View contains a command or commands A superview contains one or more views