07 - How To Secure Your Networks
07 - How To Secure Your Networks
ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
NEXUS IT TRAINING CENTER
Host and Server Based Security: Device Hardening
When a new operating system is installed on a
computer, the level of security is inadequate. There
are some simple steps that should be taken :
NEXUS IT TRAINING CENTER
Step 2: Monitor
–Monitoring security involves both active and passive methods
of detecting security violations.
•The active method is to audit host-level log files.
•Passive methods include using IDS devices to detect intrusion.
Step 3: Test
–The functionality of the security solutions implemented in step
1 and the system auditing and intrusion detection methods
implemented in step 2 are verified.
Step 4: Improve
–With the information collected from the monitoring and testing
phases, IDSs can be used to implement improvements
NEXUS IT TRAINING CENTER
Routers are Targets
Because routers provide gateways to other networks,
they are obvious targets. Here are some examples of
various security problems:
–Compromising the access control can expose network
NEXUS IT TRAINING CENTER
–Combine letters, numbers, and symbols. Include at least one lowercase letter, uppercase letter,
digit, and special character.
–Deliberately misspell a password. For example, Smith can be spelled as 5mYth. Another
example could be Security spelled as 5ecur1ty.
–Make passwords lengthy. The best practice is to have a minimum of eight characters.
–Change passwords as often as possible. This practice limits the window of opportunity in which
a hacker can crack a password and limits the window of exposure after a password has been
compromised.
Passphrases
–A recommended method for creating strong complex passwords is to use passphrases. A
passphrase is basically a sentence or phrase that serves as a more secure password.
NEXUS IT TRAINING CENTER
Step 1: Manage Router Security
By default, Cisco IOS software leaves passwords in
plain text when they are entered on a router. This is
not secure since anyone walking behind you when
you are looking at a router configuration could snoop
NEXUS IT TRAINING CENTER
–Timeouts -Retries
Step 1: Set router parameters
–Configure the router hostname with the hostname command.
Step 2: Set the domain name
–Enter the ip domain-name cisco.com command.
Step 3: Generate asymmetric keys
–You need to create a key that the router uses to encrypt its SSH
management traffic with the crypto key generate rsa command.
–Cisco recommends using a minimum modulus length of 1024.
Step 4: Configure local authentication and vty
–You must define a local user and assign SSH to the vty lines.
Step 5: Configure SSH timeouts (optional)
–Use the command ip ssh time-out second and authentication-retries
integer to enable timeouts and authentication retries.
–Set the SSH timeout to 15 seconds and the amount of retries to 2
NEXUS IT TRAINING CENTER
Test SSH Security
To connect to a router configured with SSH, you have to use an SSH
client application such as PuTTY or TeraTerm.
You must be sure to choose the SSH option and that it uses TCP port
NEXUS IT TRAINING CENTER
22.
–Using TeraTerm to connect securely to the R2 router with SSH,
–once the connection is initiated, the R2 displays a username prompt,
followed by a password prompt.
–Assuming that the correct credentials are provided, TeraTerm displays
the router R2 user EXEC prompt.
NEXUS IT TRAINING CENTER
Step 4: Vulnerable Router Services and Interfaces
Services which should typically be disabled are.
–Cisco Discovery Protocol (CDP) - Use the no cdp run.
–Source routing - Use the no ip source-route command.
–Classless routing - Use the no ip classless command.
NEXUS IT TRAINING CENTER