The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

1 Passwords and Banners Cisco Devices Packet Tracer.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
Ch. 6 – Switch Configuration CCNA 3 version Overview Identify the major components of a Catalyst switch Monitor switch activity and status using.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
© 2004 Cisco Systems, Inc. All rights reserved. Operating and Configuring Cisco IOS Devices Starting a Switch INTRO v2.0—8-1.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Operating Cisco IOS Software.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
CCNA 2 v3.1 Module 2.
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
What is Router? Router is a device which makes communication between two or more networks present in different geographical locations. Routers are data.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Configuring a network os
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—1-1 Small Network Implementation Introducing the Review Lab.
Module 4: Add Client Computers and Devices to the Network.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
User Access to Router Securing Access.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Remote Administration Remote Desktop Remote Desktop Gateway Remote Assistance Windows Remote Management Service Remote Server Administration Tools.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Database Role Activity. DB Role and Privileges Worksheet.
Sybex CCNA Chapter 4: Cisco’s IOS and SDM Instructor & Todd Lammle.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring and Testing Your Network Network Fundamentals – Chapter.
Enterprise Network Security Accessing the WAN – Chapter 4.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Introduction to Routers
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
Routers 1st semester
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
Cisco IOS Command Line Interface Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Chapter 2: Configure a Network Operating System
 Router Configurations part1 2 nd semester
© 2002, Cisco Systems, Inc. All rights reserved..
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Cisco 2 - Routers Perrine. J Page 16/26/2016 Chapter 2 Cisco IOS Software Cisco’s operating system is called Cisco Internetwork Operating System (IOS)
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Instructor Materials Chapter 8 Configuring Cisco Devices
© 2002, Cisco Systems, Inc. All rights reserved.
Working at a Small-to-Medium Business or ISP – Chapter 8
Operating & Configuring a Cisco IOS Device
CISCO IOS CLI (Command-Line Interface)
Enterprise Network Security
Introduction to Networking
Basic switch and router configuration
مراجعه النظم Information Systems Audit
Final HIPAA Security Rule
Enterprise Network Security
Instructor & Todd Lammle
Instructor & Todd Lammle
What are IAM Key Processes.
Enterprise Network Security
資訊網路專題 Router & Practice
Access Control and Site Security
Presentation transcript:

The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration mode Specific Configuration modes

User Mode – view only Privileged Mode – used to manage, update configuration By default, no authentication required.

Policy – roles, responsibilities, permissions, standard configurations Access – Physical and Electronic IOS - The operating system for the router is a crucial component. Configuration Management – both static and dynamic. Basic hardening should be one of the first steps implemented to minimize the risk of attacks. Logging - log information helps to determine whether the router is working properly of if it has been probed or worst case, compromised.

Security policy should define: Roles – define administrator, operator and any user role. Permissions – defines how who will be granted privileges on the device. Rules of conduct – define how rules will be configured on the router and who will approve rule implementation. Responsibilities – define who will make config changes or who will monitor logs. Minimum Configuration Standards – basic hardening requirements.

Access should be limited 24/7 365 days a year. Environmental controls - free of electrostatic and magnetic interference, temperature and humidity controlled, Uninterruptible Power Supply (UPS) Some routers offer PC-Card slots or CompactFlash slots The Cisco password recovery procedure allows individual to gain privileged access to the device without using a password.

There are two types of access: local and remote. Local access involves a direct connection to a console port on the router with a dumb terminal or a laptop computer.