CCNA Security: Chapter Two Securing Network Devices
CCNA Security: Chapter Two Securing Network Devices
Chapter Two
Securing Network Devices
Lesson Objectives
Upon completion of this lesson, the successful
participant will be able to:
1. Describe how to configure a secure network perimeter
2. Demonstrate the configuration of secure router
administration access
3. Describe how to enhance the security for virtual logins
4. Describe the steps to configure an SSH daemon for secure
remote management
5. Describe the purpose and configuration of administrative
privilege levels
6. Configure the role-based CLI access feature to provide
hierarchical administrative access
Lesson Objectives
7. Use the Cisco IOS resilient configuration feature to secure
the Cisco IOS image and configuration files
8. Describe the factors to consider when securing the data
that transmits over the network related to the network
management and reporting of device activity
9. Configure syslog for network security
10. Configure SNMP for network security
11. Configure NTP to enable accurate time stamping between
all devices
12. Describe the router services, interfaces, and management
services that are vulnerable to network attacks and
perform a security audit
13. Lock down a router using AutoSecure
14. Lock down a router using SDM
Perimeter Implementations
Single Router Approach
A single router connects
the internal LAN to the
Internet. All security
policies are configured on
this device.
Defense-in-depth
Approach
Passes everything through
to the firewall. A set of
rules determines what
traffic the router will allow
or deny.
DMZ Approach
The DMZ is set up
between two routers. Most
Internet
Router 1
(R1)
R1
Firewall
Internet
Internet
LAN 1
192.168.2.
0
LAN 1
192.168.2.
0
R1 Firewall R2
DMZ
LAN 1
192.168.2.
0
Router Hardening
Banner Messages
Banners are disabled by default and must be
explicitly enabled.
R1(config)# banner {exec | incoming | login | motd | slip-ppp} d message d
Banner Example
!
banner motd ^
Access to this system is for authorized XXXXXX
employees only. By accessing this system you agree
to be bound by the Corporate Guidelines for Network Security
and the Information Security Policy. Your activity on this
system may be monitored and by logging on, you signify your
consent to such monitoring. Unauthorized use detected may be
subject to investigation and disciplinary action and/or
reporting to law enforcement and/or civil action. If you do
not agree to these terms you must disconnect immediately.
^
!
SSH
version 1, 2
Configuring Router
SSH Commands
Connecting to Router
Using SDM to configure the SSH Daemon
way
secret key
Using
SDM
1. Choose Configure > Additional Tasks > Router Access > SSH