Lab-02A-Securing The Router For Administrative Access
Lab-02A-Securing The Router For Administrative Access
R1 had associated its clock with the NTP server on R2 using sh ntp associations. We used debug ntp all to view the NTP activity between R1 and R2. After R1 was configured to use a syslog server, we tested that it worked by attempting to authenticate an SSH session with invalid credentials twice which sent logs to our syslog server successfully. After we had reverted to our presaved basic configuration, we used sh run to verify that only the basic information was configured, and used ping on PC-A to ping PC-C to verify connectivity. After completing AutoSecure on R3, we used PuTTY on PC-C to verify that we could remotely connect to R3 through SSH successfully. We then tested that R1 was successfully returned to its basic configuration with sh run and repeated the ping test from PCA to PC-C. After we had completed the Security Audit, we verified that the changes were made by viewing the config by opening View > Running Configuration in CCP. We then checked for differences between the CCP and AutoSecure methods by using SSH to view the config of R3 side-by-side with that of R1. We then issued pings to and PC-A and PC-C to verify that connectivity was not lost.
What we learned:
Through this lab, we were able to dramatically increase our knowledge of the use of AutoSecure and CCP. We learned that you can skip most of the basic configurations for security related items when using either to harden devices as they will do a bulk of the work for you. That said, it is still important to check the scripts that it would want to execute to secure the devices to make sure that there are no errors in the scripts. We also learned more about navigating CCP and the ease of using CCP to administer changes. This will be a great asset in the future when the need to execute the same changes on multiple devices will be needed.