Enterprise Network Security Accessing the WAN Lecture week 4.

Slides:



Advertisements
Similar presentations
Managing Cisco IOS Software. Overview The router boot sequence Locating IOS software The configuration register Recovering Passwords Backing Up the Cisco.
Advertisements

Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Network Security Part II
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—6-1 Network Environment Management Managing Cisco Devices.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 9 Managing a Cisco Internetwork Cisco Router Components Bootstrap - Brings up the router during initialization POST - Checks basic functionality;
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Sybex CCNA Chapter 7: Managing a Cisco Internetwork Instructor & Todd Lammle.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 9: Managing a Cisco Internetwork.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Cyber Patriot Training
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Operating Cisco IOS Software
Honeypot and Intrusion Detection System
Instructor & Todd Lammle
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Enterprise Network Security Accessing the WAN – Chapter 4.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Chapter 7 & 8 IOS Images and Router Configuration
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
1 Pertemuan 3 Operating Cisco IOS Software. Discussion Topics The purpose of Cisco IOS software Router user interface Router user interface modes Cisco.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Introduction to networking (Yarnfield) Configure a router.
© 2002, Cisco Systems, Inc. All rights reserved..
Configuring Network Devices
Managing a Cisco Devices Internetwork
Enterprise Network Security
Instructor Materials Chapter 5: Network Security and Monitoring
Working at a Small-to-Medium Business or ISP – Chapter 8
Enterprise Network Security
CCNA Routing and Switching Routing and Switching Essentials v6.0
Secure Software Confidentiality Integrity Data Security Authentication
Instructor & Todd Lammle
Chapter 11: It’s a Network
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 5: Network Security and Monitoring
– Chapter 3 – Device Security (B)
Chapter 10: Device Discovery, Management, and Maintenance
Configuring Network Devices
Enterprise Network Security
– Chapter 3 – Device Security (B)
Chapter 10: Advanced Cisco Adaptive Security Appliance
Enterprise Network Security
Presentation transcript:

Enterprise Network Security Accessing the WAN Lecture week 4

Objectives General methods to mitigate security threats to Enterprise networks Configure Basic Router Security Explain how to disable unused Cisco router network services and interfaces Explain how to use Cisco SDM Manage Cisco IOS devices

Why Network Security is Important?

The Closed Network

The Network Today

Achieving the right balance

Most common security threats

Common types of network attacks

Reconnaissance Attacks

Access Attacks

DoS/DDoS Attacks

Malicious Code Attacks A worm executes code and installs copies of itself in the memory of the infected computer, which can, in turn, infect other hosts. A virus is malicious software that is attached to another program for the purpose of executing a particular unwanted function on a workstation.

Common mitigation techniques

Common mitigation techniques (contd)

Common Security Appliances and Applications

The Security Wheel - Secure

The Security Wheel - Monitor

The Security Wheel - Test

The Security Wheel - Improve

Goals of a comprehensive security policy in an organization

Enterprise Network Security 4.2 Securing Cisco Routers

Routers’ role in Network Security

Basic Router Security

Configure Basic Router Security

Implementing SSH to Secure Remote Administrative Access

Login Router Activity

Enterprise Network Security 4.3 Vulnerable Router Services and Interfaces

Disable Unused Services and Interfaces

no service tcp-small-servers no service udp-small-servers no ip http server no cpd run

SNMP, NTP, and DNS Vulnerabilities

Enterprise Network Security 4.3 Securing Routing Protocols

Routing Protocol Authentication Routing systems can be attacked in two ways: Disruption of peers (reset) Falsification of routing information

Using password authentication

Configuring RIPv2 with Authentication

Configuring EIGRP with Authentication

Configuring OSPF with Authentication

Locking router with Auto secure command

Enterprise Network Security 4.4 Using Cisco SDM

Security Device Manage

Configuring router to use Cisco SDM

Start SDM

Cisco SDM Interface

Commonly used Cisco SDM wizards

Locking down your router with SDM

Enterprise Network Security 4.5 Secure Router Management

IOS Maintenance Periodically, the router requires updates to be loaded to either the operating system or the configuration file. These updates are necessary to fix known security vulnerabilities, support new features that allow more advanced security policies, or improve performance

File systems used by a Cisco router

Backup and upgrade a Cisco IOS image Router#copy tftp flash: Address or name of remote host []? Router#sh flash: -#- --length date/time path Mar :36:00 +00:00 c1841-adventerprisek9-mz a.bin Apr :25:10 +00:00 pre_autosec.cfg bytes available ( bytes used)

Back up and upgrade Cisco IOS software images using a network server

Recover a Cisco IOS software image

Cisco IOS Troubleshooting

Recover the enable password and the enable secret passwords

Summary Security Threats to an Enterprise network include: –Unstructured threats –Structured threats –External threats –Internal threats Methods to lessen security threats consist of: –Device hardening –Use of antivirus software –Firewalls –Download security updates

Summary Basic router security involves the following: –Physical security –Update and backup IOS –Backup configuration files –Password configuration –Logging router activity Disable unused router interfaces & services to minimize their exploitation by intruders Cisco SDM –A web based management tool for configuring security measures on Cisco routers

Summary Cisco IOS Integrated File System (IFS) –Allows for the creation, navigation & manipulation of directories on a cisco device

Thank You