ISP Responsibility

Post on 05-Jan-2016

69 views 0 download

description

ISP Responsibility. Working at a Small-to-Medium Business or ISP – Chapter 8. Objectives. Describe ISP security policies and procedures. Describe the tools used in implementing security at the ISP. Describe the monitoring and managing of the ISP. - PowerPoint PPT Presentation

Transcript of ISP Responsibility

© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.1

ISP Responsibility

Working at a Small-to-Medium Business or ISP – Chapter 8

2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Objectives Describe ISP security policies and procedures.

Describe the tools used in implementing security at the ISP.

Describe the monitoring and managing of the ISP.

Describe the responsibilities of the ISP with regard to maintenance and recovery.

3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

ISP Security Considerations Helping clients to create secure passwords

Securing applications

Removing vulnerabilities

Configuring firewalls

Performing security scans

4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

ISP Security ConsiderationsCommon security practices:

Encrypting data stored on servers

Using permissions to secure access

Implement user accounts

Assign levels of access

5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

ISP Security ConsiderationsThree steps used to reduce network vulnerability:

Authentication

Authorization

Accounting

6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

ISP Security Considerations Encryption: use the secure version of a protocol

whenever confidential data is being exchanged

7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Tools Access control lists and port filtering protect

against DoS and DDoS attacks

8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Tools Firewalls use ACLs to control which traffic is

passed or blocked

9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Tools Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Tools Wireless security:

Changing default settings

Enabling authentication

MAC filtering

Encryption

11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Tools Host-based firewalls control inbound and

outbound network traffic

12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security ToolsTargets of host security:

Known attacks

Exploitable services

Worms and viruses

Back doors and Trojans

13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Monitoring and Managing the ISP Typical features of a Service Level Agreement

(SLA):

14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Monitoring and Managing the ISP Monitoring network link performance

15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Monitoring and Managing the ISPIn-band management:

Telnet Virtual Terminal (VTY) session

Secure Shell (SSH): preferred for security

16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Monitoring and Managing the ISP SNMP enables administrators to gather data

about the network

Syslog uses syslog clients to generate and forward log messages to syslog servers

17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster Recovery Factors in choosing backup media:

Amount of data

Cost of media

Performance

Reliability

Ease of offsite storage

18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster RecoveryMethods of file backup:

Normal

Differential

Incremental

19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster RecoveryHow to ensure successful backups:

Swap media

Review backup logs

Trial restores

Drive maintenance

20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster Recovery Use TFTP to protect configurations and Cisco

IOS software

Restore a Cisco IOS image using TFTP in ROMmon mode

21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster Recovery Steps to designing an effective recovery plan:

22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Backups and Disaster Recovery Phases to creating and implementing a disaster

recovery plan:

23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Summary ISPs provide desktop security services for customers, such

as creating passwords, implementing patches and updates, and assigning permissions.

Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential.

Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic.

Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network.

ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers.

24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public