chapter 4 network security

30
© 20 06 Ci sco Systems, Inc. All rig ht s r es erve d. Cisco Public 1 Version 4.0 Enterprise Network Security Accessi ng t he WAN ± Chapter 4

Upload: httpheiserzcom

Post on 06-Apr-2018

239 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 1/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0

Enterprise NetworkSecurity

Accessing the WAN ± Chapter 4

Page 2: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 2/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2

Objectives

Describe the general methods used to mitigatesecurity threats to Enterprise networks

Configure Basic Router Security

Explain how to disable unused Cisco router networkservices and interfaces

Explain how to use Cisco SDM

Manage Cisco IOS devices

Page 3: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 3/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Explain how sophisticated attack tools and opennetworks have created an increased need for networksecurity and dynamic security policies

Page 4: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 4/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Describe the most common security threats and howthey impact enterprises

Page 5: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 5/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Describe the most common types of network attacksand how they impact enterprises

Page 6: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 6/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Describe the common mitigation techniques thatenterprises use to protect themselves against threats

Page 7: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 7/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Explain the concept of the Network Security Wheel

Page 8: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 8/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8

Describe the General Methods used to MitigateSecurity Threats to Enterprise Networks

Explain the goals of a comprehensive security policy inan organization

Page 9: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 9/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Configure Basic Router Security

Explain why the security of routers and their configuration settings is vital to network operation

Page 10: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 10/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10

Configure Basic Router Security

Describe the recommended approach to applying CiscoIOS security features on network routers

Page 11: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 11/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Configure Basic Router Security

Describe the basic security measures needed to secureCisco routers

Page 12: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 12/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12

Explain How to Disable Unused CiscoRouter Network Services and Interfaces

Describe the router services and interfaces that arevulnerable to network attack

Page 13: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 13/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Explain How to Disable Unused CiscoRouter Network Services and Interfaces

Explain the vulnerabilities posed by commonlyconfigured management services

Page 14: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 14/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14

Explain How to Disable Unused CiscoRouter Network Services and Interfaces

Explain how to secure a router with the command-lineinterface (CLI) auto secure command

Page 15: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 15/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Explain How to Use Cisco SDM

Provide an overview of Cisco SDM

Page 16: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 16/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16

Explain How to Use Cisco SDM

Explain the steps to configure a router to use CiscoSDM

Page 17: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 17/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Explain How to Use Cisco SDM

Explain the steps you follow to start SDM

Page 18: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 18/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18

Explain How to Use Cisco SDM

Describe the Cisco SDM Interface

Page 19: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 19/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19

Explain How to Use Cisco SDM

Describe the commonly used Cisco SDM wizards

Page 20: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 20/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Explain How to Use Cisco SDM

Explain how to use Cisco SDM for locking down your router 

Page 21: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 21/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Manage Cisco IOS Devices

Describe the file systems used by a Cisco router 

Page 22: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 22/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22

Manage Cisco IOS Devices

Describe how to backup and upgrade a Cisco IOSimage

Page 23: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 23/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23

Manage Cisco IOS Devices

Explain how to back up and upgrade Cisco IOSsoftware images using a network server 

Page 24: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 24/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Manage Cisco IOS Devices

Explain how to recover a Cisco IOS software image

Page 25: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 25/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25

Manage Cisco IOS Devices

Compare the use of the show and debug commandswhen troubleshooting Cisco router configurations

Page 26: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 26/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26

Manage Cisco IOS Devices

Explain how to recover the enable password and theenable secret passwords

Page 27: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 27/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27

Summary

Security Threats to an Enterprise network include:

 ±Unstructured threats

 ±Structured threats

 ±External threats

 ±Internal threats

Methods to lessen security threats consist of:

 ±Device hardening

 ±Use of antivirus software

 ±Firewalls

 ±Download security updates

Page 28: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 28/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28

Summary

Basic router security involves the following: ±Physical security

 ±Update and backup IOS

 ±Backup configuration files

 ±Password configuration

 ±Logging router activity

Disable unused router interfaces & services to minimizetheir exploitation by intruders

Cisco SDM

 ±A web based management tool for configuring securitymeasures on Cisco routers

Page 29: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 29/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29

Summary

Cisco IOS Integrated File System (IFS)

 ±Allows for the creation, navigation & manipulation of directories on a cisco device

Page 30: Chapter 4 Network Security

8/3/2019 Chapter 4 Network Security

http://slidepdf.com/reader/full/chapter-4-network-security 30/30

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30