PART-2 (CCNA Security)
Network Device Security
Network Device Security – Configuration
Switch & Router
Laptop >> Desktop >> Terminal >> OK
Switch(config)#hostname cse
cse(config)#enable secret cse123
cse(config)#line con 0
cse(config-line)#password con123
cse(config-line)#login
Switch & Router
Switch(config)#hostname cse
cse(config)#interface Vlan1
cse(config)#ip address 10.10.10.1 255.255.255.0
cse(config)#line vty 0 4
cse(config-line)#password ssh123
cse (conf)#service password-encryption
cse(config-line)#login
cse#copy running-config startup-config
PC >> Desktop >> IP Configuration >> 10.10.10.2 255.255.255.0
PC >> Desktop >> Command Prompt >> telnet 10.10.10.1
Port Security:
Note: All PCs must be configured by IP Address Like 10.10.10.3/10.10.10.4
cse(config)#interface fastethernet 0/2
cse(config-if)#switchport mode access
cse(config-if)#switchport port-security (This line must be separate inserted to active security)
cse(config-if)#switchport port-security mac-address 0004.9ACB.01C6 (mac-address sticky = auto MAC Address in first sending packet)
cse(config-if)#switchport port-security maximum 1
cse(config-if)#switchport port-security violation shutdown
[cse #show port-security]
[Switch#show port-security address]
[cse #show port-security interface fastEthernet 0/1]
[cse# show mac-address-table]
[Switch#clear port-security all]
[cse(config)#shutdown and cse(config)#no shutdown to get back the PC in same port]
Auto MAC Address in First Packet Sending:
cse(config)#interface range fa0/5 - 24
cse(config-if-range)#switchport port-security mac-address sticky
cse(config-if-range)#switchport port-security violation shutdown
Down all Ports:
cse(config-if-range)#int range fa0/5 - 24
cse(config-if-range)#shutdown
Up all Ports:
cse(config-if-range)#int range fa0/5 - 24
cse(config-if-range)#no shutdown
[cse#show ip interface brief ]
Password Break / Password Recovery
Standard ACL
Three method of Access:
1. Console Access - Directly Connect with Console Cable
2. Telnet Access - you need to Configure Telnet setup in the router using line vty
3. SSH Access - You need to Configure SSH setup in the router using generate crypto key rsa and then line vty
Standard ACL - Configuration:
Router-0
(config)#router rip
(config-router)network 10.10.10.0
(config-router)network 172.16.1.0
(config-router)network 192.168.1.0
Router-1:
(config)#router rip
(config-router)network 200.20.20.0
(config-router)network 172.16.1.0
SSH Configuration:
(config)#line vty 0 4
(config-line)#password 123
Router(config)#service password-encryption
Permit One PC:
Router(config)#access-list 10 permit host 192.168.1.2
Router(config)#line vty 0 4
Router(config-line)#access-class 10 in
Permit on a Network:
(config)#line vty 0 4
(config-line)#password 123
Router(config)#access-list 10 permit 10.10.10.0 0.0.0.255
Router(config)#line vty 0 4
Router(config-line)#access-class 10 in
Define ACL on Port:
Router(config)#access-list 10 deny host 192.168.1.3
Router(config)#access-list 10 permit any
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip access-group 10 out
Extended ACL
Extended ACL - Configuration
Setup DNS Server:
Deny Single Host to a PC (not to use):
Router(config)#access-list 100 deny ip 10.10.10.2 0.0.0.0 10.10.20.2 0.0.0.0
Router(config)#access-list 100 permit ip any any
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip access-group 100 in
Deny Half Network:
Router(config)#access-list 110 deny tcp 10.10.10.100 0.0.0.127 host 10.10.20.4 eq 80
Router(config)#access-list 110 deny tcp 10.10.10.200 0.0.0.127 host 10.10.20.5 eq 80
Router(config)#access-list 110 permit ip any any
interface fastEthernet 0/0
Router(config-if)#ip access-group 110 in
NAT (PAT)
Network Address Translation-NAT (Static)
AAA Security Services
AAA Security Services – Configuration
Router-1
Router(config)#hostname cse TACACS (Terminal Access Controller Access Control System)
cse (config)#username cse secret cse123
cse (config)#aaa new-model
cse (config)#tacacs-server host 10.10.10.2
cse (config)#aaa authentication login default group tacacs+ local
cse (config)#tacacs-server key cse
cse (config)#line vty 0 4
[default=all services like vty and others, group tacacs =maintain by tacacs server, local=if tacacs
doesn’t work then router will work locally)]
In Server:
Service AAA >
Client Name: cse
Clint IP: 10.10.10.1
Secret cse
Server Type: tacacs
On/Off if necessary
Username: abc
Password: abc123
Username: xyz
Password: xyz123
From PC:
telnet 10.10.10.1
Configure Rip in Rouer-1:
CSE(config)# router rip
Network 10.10.10.1
Network 10.10.20.1
Network 10.10.40.1
Configure Rip in Rouer-2:
CSE(config)# router rip
Network 10.10.20.1
Network 10.10.30.1
Router-2
Router(config)#hostname bba
bba (config)#username bba secret bba123
bba (config)#aaa new-model
bba (config)#tacacs-server host 10.10.10.2
bba (config)#aaa authentication login default group tacacs+ local
bba (config)#tacacs-server key bba
bba (config)#line vty 0 4
[default=all services like vty and others, group tacacs =maintain by tacacs server, local=if tacacs
doesn’t work then router will work locally)]
In Server:
Service AAA >
Client Name: BBA
Clint IP: 10.10.30.1
Secret bba On/Off if necessary
Server Type: tacacs
Username: abc
Password: abc123
Username: xyz
Password: xyz123
From PC:
telnet 10.10.30.1