SIS - Security Lab Introductory Session University of Pittsburgh 2008.

Slides:



Advertisements
Similar presentations
Configuring a Router Harold Hernandez, MS, CCNI. 3.1 Configuring a Router Name a router Set passwords Examine show commands Configure a serial interface.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved..
Managing Cisco IOS Software. Overview The router boot sequence Locating IOS software The configuration register Recovering Passwords Backing Up the Cisco.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
Cisco Router. Overview Understanding and configuring the Cisco Internetwork Operating System (IOS) Connecting to a router Bringing up a router Logging.
1 CCNA 2 v3.1 Module 3. 2 CCNA 2 Module 3 Configuring a Router.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Introduction to the Cisco IOS
PIX Firewall. Stateful Packet Filter Runs on its own Operating System Assigning varying security levels to interfaces (0 – 100) Access Control Lists Extensive.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CCNA 2 v3.1 Module 2.
Cisco Devices CONFIGURING CISCO SWITCH AND ROUTER.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
1 © 2002, Cisco Systems, Inc. All rights reserved. Router boot procedure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
Routers A router is a computer Computers have four basic components:
1 Semester 2 Module 3 Configuring a Router Yuda college of business James Chen
Basic Router Configuration Warren Toomey GCIT. Introduction A Cisco router is simply a computer that receives packets and forwards them on based on what.
Basic Router Configuration Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Chapter 6 Router Configuration Sem 2V2. Configuration files can come from the console NVRAM TFTP server. The router has several modes:  privileged mode.
Configuring a network os
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 3 Configuring a Router.
1 Data Forwarding Basic Router Configuration. Overview In this session, we sill be looking at  Review : router backplane Ethernet, console and serial.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
Configuring a Router. Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment.
Release 16/07/2009Jetking Infotrain Ltd. Basic Router Configuration Chapter 5.
Module 3 Configuring a Router.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork.
Introduction to Routers
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
1 Pertemuan 5 Configuring a Router. Discussion Topics CLI command modes Configuring a router name Configuring router passwords Examining the show commands.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Configuration Modes and TFTP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—5-1 Lesson 5 Getting Started with the Cisco PIX Firewall.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Configuring a Router MM Clements. Copyright This Week Command line interface Router configuration Modes for configuration Interface.
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
2016/2/211 資訊網路專題 Router & Practice. 2016/2/212 Router Basics Computers have four basic components: a CPU, memory, interfaces, and a bus. –A router also.
Cisco router configuration basics. overview router configuration controls the operation of the router: interface address and netmask routing information.
Cisco S2 C6 Router Configuration 1. Router Boot Up Router uses following from config-startup when it boots –Cisco IOS software version –Router identification.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Introduction to networking (Yarnfield) Configure a router.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
© 2001, Cisco Systems, Inc. CSPFA 2.0—6-1 Chapter 6 Configuring Multiple Interfaces.
Cisco Routers & IOS Introduction. Router Interface ● Serial cable ● Command line interface ● Efficient ● Fast ● Universal across all Cisco equipment ●
Configuring Network Devices
Instructor Materials Chapter 8 Configuring Cisco Devices
Configuring a Router Module 3 Semester 2.
Introduction to Cisco IOS -(Internetwork Operating System)
Lecture9: Embedded Network Operating System: cisco IOS
Module 3 Configuring a Router.
資訊網路專題 Router & Practice
Routers and Routing Basics Review
CCNA 2 2 Double JEOPARDY Midterm REVIEW S2C06 Jeopardy Review.
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

SIS - Security Lab Introductory Session University of Pittsburgh 2008

Agenda Description of lab infrastructure Equipment configuration basics Text based connection / configuration Graphical configuration environment Cabling description Useful commands Cisco IOS Windows / Linux Recommendations

Equipment configuration

Equipment configuration (2)

Access modes The PIX firewalls (and other CISCO equipment) have four administrative access modes: Unprivileged mode: Available at first access. Provides a restricted, limited view of system settings. (Prompt = ‘>’) Privileged mode: Allows you to change system settings. (Prompt = ‘#’) Configuration mode: Enables you to change system configurations. (Prompt = ‘(config)#’ Monitor mode: Special mode that allows you to update system configuration image over the network (using a TFTP server)

Access modes (2) To access privileged mode enable To access configuration mode configure terminal Use the exit command to exit from one mode to the previous one

Firewalls System or group of systems that manage access between two networks Internet RouterFirewall DMZ Inside Network Outside Network

PIX Firewalls Proprietary operating system Stateful inspection Protocol and application inspection User-based authentication Virtual private networking Web-based management Stateful failover capabilities

Viewing / Saving configurations There are two configuration memories, running- configuration and startup-configuration show running-config displays the current configuration in the RAM memory of the equipment. Any configuration changes are written to the running- configuration write memory saves the current running-configuration to the flash memory startup-configuration show configure shows the configuration that is in flash memory show history displays previously entered commands

Basic CISCO IOS commands ip address if_name ip_address [netmask] ip address ethernet show ip address Displays the IP adresses assigned to all interfaces show interface allows you to view the network interface information and status ping ip_address To determine reachability of a system

Basic Windows/Linux networking commands ipconfig (windows) / ifconfig (linux) To obtain ip configuration information of a PC ping netstat –r To obtain routing configuration and statistics netstat Gives you information on active ports and established connections on a system

Packet Sniffer - WireShark

Lab procedures Lab assignments will be given a couple of days in advance to the start of the lab working period Lab working periods = 1 or 2 weeks Lab groups should be composed of two persons (no more, no less) Use sign-up sheet to schedule the time in which you will be using lab equipment Lab reports can be written in any format but should include answers to the questions presented in the assignment and equipment configuration files

Important recommendations Never change a password (you’ll be held accountable) unless its for your own user account Get rid of static electricity build up before touching equipment For questions: Check CISCO web site Ask GSA:

Questions ??

References