Exploration Accessing WAN Chapter4

30
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4

Transcript of Exploration Accessing WAN Chapter4

Page 1: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE I Chapter 6 1

Enterprise Network Security

Accessing the WAN – Chapter 4

Page 2: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 2

Objectives Describe the general methods used to mitigate

security threats to Enterprise networks Configure Basic Router Security Explain how to disable unused Cisco router network

services and interfaces Explain how to use Cisco SDM Manage Cisco IOS devices

Page 3: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 3

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain how sophisticated attack tools and open

networks have created an increased need for network security and dynamic security policies

Page 4: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 4

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common security threats and how

they impact enterprises

Page 5: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 5

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common types of network attacks

and how they impact enterprises

Page 6: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 6

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the common mitigation techniques that

enterprises use to protect themselves against threats

Page 7: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 7

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the concept of the Network Security Wheel

Page 8: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 8

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the goals of a comprehensive security policy in

an organization

Page 9: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 9

Configure Basic Router Security Explain why the security of routers and their

configuration settings is vital to network operation

Page 10: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 10

Configure Basic Router Security Describe the recommended approach to applying Cisco

IOS security features on network routers

Page 11: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 11

Configure Basic Router Security Describe the basic security measures needed to secure

Cisco routers

Page 12: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 12

Explain How to Disable Unused Cisco Router Network Services and Interfaces Describe the router services and interfaces that are

vulnerable to network attack

Page 13: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 13

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain the vulnerabilities posed by commonly

configured management services

Page 14: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 14

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain how to secure a router with the command-line

interface (CLI) auto secure command

Page 15: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 15

Explain How to Use Cisco SDM Provide an overview of Cisco SDM

Page 16: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 16

Explain How to Use Cisco SDM Explain the steps to configure a router to use Cisco

SDM

Page 17: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 17

Explain How to Use Cisco SDM Explain the steps you follow to start SDM

Page 18: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 18

Explain How to Use Cisco SDM Describe the Cisco SDM Interface

Page 19: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 19

Explain How to Use Cisco SDM Describe the commonly used Cisco SDM wizards

Page 20: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 20

Explain How to Use Cisco SDM Explain how to use Cisco SDM for locking down your

router

Page 21: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 21

Manage Cisco IOS Devices Describe the file systems used by a Cisco router

Page 22: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 22

Manage Cisco IOS Devices Describe how to backup and upgrade a Cisco IOS

image

Page 23: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 23

Manage Cisco IOS Devices Explain how to back up and upgrade Cisco IOS

software images using a network server

Page 24: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 24

Manage Cisco IOS Devices Explain how to recover a Cisco IOS software image

Page 25: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 25

Manage Cisco IOS Devices Compare the use of the show and debug commands

when troubleshooting Cisco router configurations

Page 26: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 26

Manage Cisco IOS Devices Explain how to recover the enable password and the

enable secret passwords

Page 27: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 27

Summary Security Threats to an Enterprise network include:

–Unstructured threats–Structured threats–External threats–Internal threats

Methods to lessen security threats consist of:–Device hardening–Use of antivirus software–Firewalls–Download security updates

Page 28: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 28

Summary

Basic router security involves the following:–Physical security–Update and backup IOS –Backup configuration files–Password configuration–Logging router activity

Disable unused router interfaces & services to minimize their exploitation by intruders

Cisco SDM–A web based management tool for configuring security measures on Cisco routers

Page 29: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 29

Summary

Cisco IOS Integrated File System (IFS)–Allows for the creation, navigation & manipulation of directories on a cisco device

Page 30: Exploration Accessing WAN Chapter4

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 30