© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 2 – Securing Network Devices.

Slides:



Advertisements
Similar presentations
Managing Cisco IOS Software. Overview The router boot sequence Locating IOS software The configuration register Recovering Passwords Backing Up the Cisco.
Advertisements

Securing the Router Chris Cunningham.
CCNA2 MODULE 5.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 3 – Authentication, Authorization and Accounting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
Introduction to the Cisco IOS
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CCNA 2 v3.1 Module 2.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11 Final.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
1 Chapter 2 ROUTER FUNDAMENTALS By: Tassos Tassou.
1 Semester 2 Module 3 Configuring a Router Yuda college of business James Chen
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Configuring a Network Operating System Introduction to Networks.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Chapter 6 Router Configuration Sem 2V2. Configuration files can come from the console NVRAM TFTP server. The router has several modes:  privileged mode.
Configuring a network os
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Copyright 2003 CCNA 3 Chapter 7 Switch Configuration By Your Name.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration Cisco Networking Academy.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
© Wiley Inc All Rights Reserved. CHAPTER 4: Introduction to the Cisco IOS CCNA: Cisco Certified Network Associate Study Guide.
Chapter 2: Securing Network Devices
Instructor & Todd Lammle
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
User Access to Router Securing Access.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Chapter 3: Authentication, Authorization, and Accounting
Chapter 2: Securing Network Devices
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Sybex CCNA Chapter 4: Cisco’s IOS and SDM Instructor & Todd Lammle.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring and Testing Your Network Network Fundamentals – Chapter.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Introduction to Routers
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
Routers 1st semester
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter 2: Configure a Network Operating System
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
 Router Configurations part1 2 nd semester
© 2002, Cisco Systems, Inc. All rights reserved..
+ Lecture#3: Configuring a Network Operating System Asma AlOSAIMI.
Configuring and Testing Your Network Network Fundamentals.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Configuring Network Devices
© 2002, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 2: Configure a Network Operating System
Chapter 2: Configure a Network Operating System
CCNA Routing and Switching Routing and Switching Essentials v6.0
Router Startup and Setup
CCNA 3 v3.1 Module 6 Switch Configuration
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Configuring and Testing Your Network
Chapter 2: Configure a Network Operating System
Chapter 10: Device Discovery, Management, and Maintenance
Instructor & Todd Lammle
Instructor & Todd Lammle
Router Startup and Setup
Presentation transcript:

© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 2 – Securing Network Devices

© 2012 Cisco and/or its affiliates. All rights reserved. 2 Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP. Configure administrative roles using privilege levels and role- based CLI. Implement the management and reporting features of syslog, SNMP, SSH, and NTP. Examine router configurations with the Security Audit feature of CCP, and make the router and network more secure by using the auto secure command or the One-Step Lockdown feature of CCP.

© 2012 Cisco and/or its affiliates. All rights reserved Securing Cisco Routers 2.1 Implement Security on Cisco routers CCP Security Audit feature CCP One-Step Lockdown feature Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security Multiple privilege levels Role-Based CLI Cisco IOS image and configuration files

© 2012 Cisco and/or its affiliates. All rights reserved Implement Secure Network Management and Reporting 5.1 Describe Secure Network Management In-band Out of bound Management protocols Management enclave Management plane 5.1 Implement Secure Network Management SSH Syslog SNMP NTP SCP CLI CCP

© 2012 Cisco and/or its affiliates. All rights reserved. 5 Device hardening is a critical task that involves physically securing the router and protecting the router's administrative access using the Cisco IOS command-line interface (CLI) as well as the Cisco Configuration Professional (CCP). Some of these methods involve maintaining passwords, configuring enhanced virtual login features, and implementing Secure Shell (SSH). Securing the management and reporting features such as syslog, Simple Network Management Protocol (SNMP), and configuring Network Time Protocol (NTP) are also examined. Many router services are enabled by default and a number of these features are no longer required and must be disabled. These services are examined using the Security Audit feature of CCP. Finally, the CCP One-Step Lockdown and the auto secure command are used to automate device-hardening tasks.

© 2012 Cisco and/or its affiliates. All rights reserved. 6 Chapter 2 Lab: Securing the Router for Administrative Access Part 1: Basic Network Device Configuration Part 2: Control Administrative Access for Routers Part 3: Configure Administrative Roles Part 4: Configure Cisco IOS Resilience and Management Reporting Part 5: Configure Automated Security Features

© 2012 Cisco and/or its affiliates. All rights reserved. 7

8

9

10

© 2012 Cisco and/or its affiliates. All rights reserved. 11 Cisco Configuration Professional (CCP) has replaced SDM to do the following: To configure syslog logging. To configure SNMP. To configure NTP. To conduct a Security Audit. To perform a One-Step Lockdown.

© 2012 Cisco and/or its affiliates. All rights reserved. 12 The chapter 2 lab sets the stage for securing a network infrastructure. Students use CLI and CCP tools to secure local and remote access to the routers, analyze potential vulnerabilities, and take steps to mitigate them. They will also enable management reporting to monitor router configuration changes. This lab is divided into five parts. Each part can be administered individually or in combination with others as time permits. The main goal is to configure various Cisco IOS and CCP security features on routers R1 and R3. R1 and R3 are on separate networks and communicate through R2, which simulates a connection to an ISP. Students can work in teams of two for router security configuration, one student configuring R1 and the other student configuring R3. Although switches are shown in the topology, students can omit the switches and use crossover cables between the PCs and routers R1 and R3.

© 2012 Cisco and/or its affiliates. All rights reserved. 13 When discussing the service password-encryption command, a good demonstration is to copy a level 7 encrypted password and enter into one of many online Cisco password crackers to reveal the encrypted password. Emphasize that the service password-encryption command is simply to stop shoulder surfing. Ask the students “Why does the IOS not encrypt all password using MD5”? Explain that Cisco IOS passwords are not properly encrypted because there are protocols such as when using CHAP authentication that an MD5 encrypted password would not work.

© 2012 Cisco and/or its affiliates. All rights reserved. 14 Make sure to explain that the enable secret command should always be used instead of the enable password command. If both are configured, the enable secret supersedes the enable password command.

© 2012 Cisco and/or its affiliates. All rights reserved. 15 To illustrate why the enhanced login features of the login block-for command should be configured: Interconnect a router -> switch -> hosts and ping to verify connectivity. Change the Telnet password. Ask students to attempt to login. Next, configure the login block-for command. Ask students to attempt to login again and observe the results. Use the show login and show login failures to observe the results.

© 2012 Cisco and/or its affiliates. All rights reserved. 16 To illustrate why SSH is more secure than Telnet: Interconnect and configure a router -> hub -> hosts. Each host should be able to ping the router gateway address. Each host starts Wireshark. One host Telnets and authenticates into the router. Observe the Wireshark transfer and locate the Telnet flow. Highlight a flow and from the Menu Bar, choose Analyze > Follow TCP Stream. The username and password can be identified this way. Repeat exercise but this time SSH into the router. The content is no longer divulged.

© 2012 Cisco and/or its affiliates. All rights reserved. 17 To explain the RSA key used by SSH: Write down eight binary ones ( ) and ask student what decimal number that is equal to? (255) Add another 1 bit ( ) and what does it equal to now? (1023) Keep repeating the previous step a few times. Contrast this with the number of possible IPv4 addresses (32 bits = 4 billion). Contrast this with the number of possible IPV6 addresses (128 bits =340 trillion trillion trillion or 340 undecillion). Now highlight that the RSA key has 1,024 bits and ask them to imagine how big of a key this creates. What are the odds that something could calculate the exact same key in a reasonable amount of time? SSH uses RSA keys to authenticate users instead of (or in addition to) a username/password.

© 2012 Cisco and/or its affiliates. All rights reserved. 18 To highlight the difference between privilege levels and role based CLI: Interconnect a router -> switch -> hosts. Configure privileged EXEC and Telnet access. Verify connectivity using ping. Ask one student to Telnet into the router and secretly configure something. Ask another student to do the same. Repeat with several students. Now reveal the running-config and explain how there is no way to really tell who typed in which command. Once privileged levels are configured, explain that although there is some control, there are still some limitations. Once role-based CLI is configured, explain how logins can be easily customized.

© 2012 Cisco and/or its affiliates. All rights reserved. 19 Ask students what they think is the worst a hacker could do if he gained access to the privileged EXEC mode of an edge router? Possible answers include (but are not limited to) alter the configuration, reload the router, erase the startup config, erase the IOS, format flash, … Explain that the Cisco IOS Resilient Configuration feature secures the IOS image and maintains a secure copy of the startup- configuration file. Even if a hacker gains access, he will not be able to completely delete the two files and restoration would be very quick.

© 2012 Cisco and/or its affiliates. All rights reserved. 20 When discussing disabling of unneeded services and protocols make sure to identify each service and carefully explain its function and why it needs to be disabled. A good journal exercise is to assign the students to create a table consisting of three columns. The first column identifies the service. The second is a short description of the service. The third is the CLI command to disable or enable the service. Students can use the CCP Security Audit to drive this section. Specifically, use the Security Audit Wizard on a router and when you get to the Security Audit Report screen, click on the different security problems identified and explain them. This also displays the equivalent CLI command to disable.

© 2012 Cisco and/or its affiliates. All rights reserved. 21 There are many areas of classroom discussion in this chapter. Discussion can include and are not limited to the following: Which social network / services do you subscribe to that require password authentication. What’s the worst someone could do if they got your password? How do you create your password? Is it strong? How could you make it stronger? We know that SSH is more secure than Telnet. Is there a reason why you would still use Telnet? How could you make Telnet more secure? If CCP can be used to configure and secure a router, is CLI still valuable to know? When would knowing the CLI be better? What types of IT infrastructure jobs are there in a Network Operation Center? Should all of these positions have the same level of access to the infrastructure devices? Have students research these various job titles and report back.

© 2012 Cisco and/or its affiliates. All rights reserved. 22 There are many examples of security breaches that have occurred in the news lately. Ask students to research some of these and report back on how they could have been deterred better.

© 2012 Cisco and/or its affiliates. All rights reserved note09186a f48.shtml note09186a f48.shtml between-telnet-and-ssh/ between-telnet-and-ssh/ Download a trial version of Cisco CDP Monitor:

© 2011 Cisco and/or its affiliates. All rights reserved. 24