Enterprise Network Security Accessing the WAN Lecture week 4.

57
Enterprise Network Security Accessing the WAN Lecture week 4

Transcript of Enterprise Network Security Accessing the WAN Lecture week 4.

Enterprise Network Security

Accessing the WAN

Lecture week 4

Objectives

• General methods to mitigate security threats to Enterprise networks

• Configure Basic Router Security• Explain how to disable unused Cisco router

network services and interfaces • Explain how to use Cisco SDM• Manage Cisco IOS devices

Why Network Security is Important?

The Closed Network

The Network Today

Achieving the right balance

Most common security threats

Common types of network attacks

Reconnaissance Attacks

Access Attacks

DoS/DDoS Attacks

Malicious Code AttacksA worm executes code and installs copies of itself in the memory of the infected computer, which can, in turn, infect other hosts.

A virus is malicious software that is attached to another program for the purpose of executing a particular unwanted function on a workstation.

Common mitigation techniques

Common mitigation techniques (contd)

Common Security Appliances and Applications

The Security Wheel - Secure

The Security Wheel - Monitor

The Security Wheel - Test

The Security Wheel - Improve

Goals of a comprehensive security policy in an organization

Enterprise Network Security

4.2 Securing Cisco Routers

Routers’ role in Network Security

Basic Router Security

Configure Basic Router Security

Implementing SSH to Secure Remote Administrative Access

Login Router Activity

Enterprise Network Security

4.3 Vulnerable Router Services and Interfaces

Disable Unused Services and Interfaces

Disable Unused Services and Interfaces

no service tcp-small-servers

no service udp-small-servers

no ip http server

no cpd run

SNMP, NTP, and DNS Vulnerabilities

Enterprise Network Security

4.3 Securing Routing Protocols

Routing Protocol AuthenticationRouting systems can be attacked in two ways:• Disruption of peers (reset)• Falsification of routing information

Falsification of routing information

Using password authentication

Configuring RIPv2 with Authentication

Configuring EIGRP with Authentication

Configuring OSPF with Authentication

Locking router with Auto secure command

Enterprise Network Security

4.4 Using Cisco SDM

Security Device Manage

Configuring router to use Cisco SDM

Start SDM

Cisco SDM Interface

Commonly used Cisco SDM wizards

Locking down your router with SDM

Enterprise Network Security

4.5 Secure Router Management

IOS Maintenance• Periodically, the router requires updates to be

loaded to either the operating system or the configuration file.

• These updates are necessary to fix known security vulnerabilities, support new features that allow more advanced security policies, or improve performance

File systems used by a Cisco router

Backup and upgrade a Cisco IOS image

Router#copy tftp flash:

Address or name of remote host []?

Router#sh flash:

-#- --length-- -----date/time------ path

1 25678740 Mar 31 2010 06:36:00 +00:00 c1841-adventerprisek9-mz.124-16a.bin

2 685 Apr 14 2008 20:25:10 +00:00 pre_autosec.cfg

6250496 bytes available (25686016 bytes used)

Back up and upgrade Cisco IOS software images using a network server

Recover a Cisco IOS software image

Cisco IOS Troubleshooting

Recover the enable password and the enable secret passwords

Summary

• Security Threats to an Enterprise network include:– Unstructured threats– Structured threats– External threats– Internal threats

• Methods to lessen security threats consist of:– Device hardening– Use of antivirus software– Firewalls– Download security updates

Summary

• Basic router security involves the following:– Physical security– Update and backup IOS – Backup configuration files– Password configuration– Logging router activity

• Disable unused router interfaces & services to minimize their exploitation by intruders

• Cisco SDM– A web based management tool for configuring

security measures on Cisco routers

Summary• Cisco IOS Integrated File System (IFS)

– Allows for the creation, navigation & manipulation of directories on a cisco device

Thank You