APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Managing Cisco IOS Software. Overview The router boot sequence Locating IOS software The configuration register Recovering Passwords Backing Up the Cisco.
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Securing the Router Chris Cunningham.
Virtual LANs.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Implementing a Highly Available Network
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
Chapter 9 Managing a Cisco Internetwork Cisco Router Components Bootstrap - Brings up the router during initialization POST - Checks basic functionality;
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 2 – Securing Network Devices.
Sybex CCNA Chapter 7: Managing a Cisco Internetwork Instructor & Todd Lammle.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NMS Labs Mikko Suomi LAB1 Choose SNMP device managment software Features: –Gives Nice overview of network –Bandwith monitoring –Multible.
2010 Cisco Configuration Elements APRICOT 2010 Kuala Lumpur, Malaysia.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Ch.4 – Learning About Other Devices (CDP and Telnet) CCNA 1 version 3.0 Rick Graziani Cabrillo College.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
IPv6 Network Assessor 111 © 2005 Cisco Systems, Inc. All rights reserved. Susan Shareshian Solutions Manager, Cisco Systems, Inc.
Chapter 2: Securing Network Devices
CCNA Journal Sample. Index Basic Ethernet Serial Router Rip.
CCNA Configuration Journal Sample. Index Basic Ethernet Serial Router Rip …
Instructor & Todd Lammle
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
Cisco Configuration Elements Network Monitoring and Management Tutorial.
1 © 2001, Cisco Systems, Inc. All rights reserved. Configuring Cisco Routers.
User Access to Router Securing Access.
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Cisco Discovery Protocol. CDP and Router Boot Up When a Cisco device boots up, CDP starts up automatically and allows the device to detect neighbor devices.
NetPro-ITI Ethernet LANs
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Chapter 5 Managing a Cisco Internetwork
Jose Luis Flores / Amel Walkinshaw
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Carlos Armas Roundtrip Networks Hervey Allen NSRC.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Understanding Switch Security.
Configuration Modes and TFTP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
 Router Configurations part1 2 nd semester
Cisco LAN Switches.
CISCO CONFIGURATION ELEMENTS 1. Overview Basic things that we need to make sure are configured on a Cisco router (and switch) to do proper network management.
Cisco configuration elelements
Instructor Materials Chapter 5: Network Security and Monitoring
Understanding Switch Security
CCNA Routing and Switching Routing and Switching Essentials v6.0
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
Wrapup.
Chapter 10: Device Discovery, Management, and Maintenance
Cisco configuration elements
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 5: Network Security and Monitoring
Understanding Switch Security
Chapter 10: Device Discovery, Management, and Maintenance
Understanding Cisco Router Security
Chapter 8: Monitoring the Network
– Chapter 3 – Device Security (B)
Review - week 4 Basic device access security
Presentation transcript:

APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements

Overview Basic things that we need to make sure are configured on a Cisco router (and switch) to do proper network management These apply to other network equipment manufacturers of course, and to servers and workstations

Elements Hostnamehostname of the device SSHenable secure shell DNSdomain name lookup NTPtime synchronization Syslogsyslog messages SNMPSNMP configuration SNMP trapsand where to send traps CDPCisco discovery protocol

Hostname Use the FQDN preferably. In config mode: hostname gw|sw-XYZ[.domain.name]

DNS configuration Config mode: ip domain-name mgmt.conference.apricot.net ip name-server

NTP + time configuration In config mode: ntp server pool.ntp.org clock timezone CWT 8 If needed: clock summer-time XXX recurring last Sun Mar 2:00 last Sun Oct 3:00 Verify: show clock

SSH Only crypto version of IOS/CatOS have support for SSH – there are export restrictions... In config mode: aaa new-model crypto key generate rsa username inst secret 0 xxxxxxxxx... above is required to be allowed to enable SSH. Verify creation with: sh crypto key mypubkey rsa Use at least 768 bits

SSH (2)‏ Enforce ssh (disabling telnet) on vty lines: host # conf t host(config)# line vty 0 4 host(config-line)# transport input ssh ^Z host# SSH is now enabled, and the telnet disabled

Syslog In config mode: logging noc.mgmt.conference.apricot.net logging facility local5 logging trap debugging

SNMP In config mode: snmp-server community xxxxxxxxx RW snmp-server community apric0t08 RO snmp-server location Taipei, room 403 snmp-server enable traps config snmp-server enable traps envmon snmp-server enable traps config snmp-server enable traps syslog snmp-server host xxx (see cisco doc)‏

CDP Cisco Discovery Protocol Normally enabled by default nowadays Otherwise, enabled with ”cdp enable” tcpdump and tools like cdpr will show you CDP announcements