Enterprise Network Security. Accessing the WAN Chapter 4

Similar documents
Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Chapter 4. Network Security. Part II

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Accessing the WAN Chapter 4 - PART II Modified by Tony Chen 07/20/2008

Certified Cisco Networking Associate v1.1 ( )

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

HikCentral V.1.1.x for Windows Hardening Guide

Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies

Chapter 4. Network Security. Part I

Cisco IOS Inline Intrusion Prevention System (IPS)

HikCentral V1.3 for Windows Hardening Guide

Fundamentals of Network Security v1.1 Scope and Sequence

CCNA Exploration Network Fundamentals

Configuring Security on the Voice Network

Course D:Implementing and Managing Windows 100

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

VPN Troubleshooting. VPN Troubleshooting CHAPTER20. Tunnel Details

Cisco Associate-Level Certifications

Interconnecting Cisco Networking Devices Part 1 ICND1

Unified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test

SonicOS Standard Release Notes SonicWALL Secure Anti-Virus Router 80 Series SonicWALL, Inc. Software Release: March 15, 2007

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Ch6 Packet Tracer Skills Integration Challenge Topology Diagram

securing your network perimeter with SIEM

Implementing IP Addressing Services

Implementing IP Addressing Services. Accessing the WAN Chapter 7

6.5.1: Packet Tracer Skills Integration Challenge Activity Topology Diagram

Scope and Sequence: CCNA Discovery v4.0

Router Startup and Configuration

Best Practices With IP Security.

ABB Ability Cyber Security Services Protection against cyber threats takes ability

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Installing and Configuring Windows 10

CS 356 Operating System Security. Fall 2013

ASA/PIX Security Appliance

The primary audience for this course includes Network Administrators, Network Engineers,

IC32E - Pre-Instructional Survey

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Security Setup CHAPTER

Interconnecting Cisco Network Devices: Accelerated

AutoSecure. Finding Feature Information. Last Updated: January 18, 2012

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Semester 1. Cisco I. Introduction to Networks JEOPADY. Chapter 11

Cyber security tips and self-assessment for business

ClearPath OS 2200 System LAN Security Overview. White paper

Troubleshooting Cisco Emergency Responder System and Administration Problems

Information System Security. Nguyen Ho Minh Duc, M.Sc

Cisco Security Monitoring, Analysis and Response System 4.2

5 Tips to Fortify your Wireless Network

MD-100: Modern Desktop Administrator Part 1

Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454

IP Office Technical Bulletin

Configuring the Management Access List

Training for the cyber professionals of tomorrow

CHAPTER 7 ADVANCED ADMINISTRATION PC

Microsoft Internet Security & Acceleration Server Overview

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy

Manual. DriveLock Setup. Quick Start Guide

Machine-Based Penetration Testing

Tenable.io for Thycotic

Cisco ISR G2 Management Overview

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

CyBot Suite. Machine-based Penetration Testing

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

Security Fundamentals for your Privileged Account Security Deployment

CompTIA A+ Certification ( ) Study Guide Table of Contents

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Cisco CCNA (ICND1, ICND2) Bootcamp

Chapter 11: Networks

Cisco 4: Enterprise Networking

ArcGIS Enterprise: Advanced Topics in Administration. Thomas Edghill & Moginraj Mohandas

Scope and Sequence: CCNA Discovery

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Machine-Based Penetration Testing

How Network Security Services Work to Protect Your Business

NEN The Education Network

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

Cisco Cluster Management Suite

McAfee Network Security Platform 8.3

2. INTRUDER DETECTION SYSTEMS

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

CertifyMe. CertifyMe

Cisco Security Solutions for Systems Engineers (SSSE) Practice Test. Version

DOWNLOAD PDF CISCO IRONPORT CONFIGURATION GUIDE

PrepKing. PrepKing

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Course Outline. ICND1 - Interconnecting Cisco Networking Devices Part 1. ICND1 - Interconnecting Cisco Networking Devices Part 1

Endpoint Security & Health Check Report Background

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Easy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide.

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

Configure a Switch. LAN Switching and Wireless Chapter 2. Version Cisco Systems, Inc. All rights reserved.

PXM45 Backup Boot Procedures

Diploma in Network (LAN/WAN) Administration

Firewall Stateful Inspection of ICMP

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Transcription:

Enterprise Network Security Accessing the WAN Chapter 4 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1

Objectives Describe the general methods used to mitigate security threats to Enterprise networks Configure Basic Router Security Explain how to disable unused Cisco router network services and interfaces Explain how to use Cisco SDM Manage Cisco IOS devices 2

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies 3

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common security threats and how they impact enterprises 4

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common types of network attacks and how they impact enterprises 5

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the common mitigation techniques that enterprises use to protect themselves against threats 6

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the concept of the Network Security Wheel 7

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the goals of a comprehensive security policy in an organization 8

Configure Basic Router Security Explain why the security of routers and their configuration settings is vital to network operation 9

Configure Basic Router Security Describe the recommended approach to applying Cisco IOS security features on network routers 10

Configure Basic Router Security Describe the basic security measures needed to secure Cisco routers 11

Explain How to Disable Unused Cisco Router Network Services and Interfaces Describe the router services and interfaces that are vulnerable to network attack 12

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain the vulnerabilities posed by commonly configured management services 13

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain how to secure a router with the command-line interface (CLI) auto secure command 14

Explain How to Use Cisco SDM Provide an overview of Cisco SDM 15

Explain How to Use Cisco SDM Explain the steps to configure a router to use Cisco SDM 16

Explain How to Use Cisco SDM Explain the steps you follow to start SDM 17

Explain How to Use Cisco SDM Describe the Cisco SDM Interface 18

Explain How to Use Cisco SDM Describe the commonly used Cisco SDM wizards 19

Explain How to Use Cisco SDM Explain how to use Cisco SDM for locking down your router 20

Manage Cisco IOS Devices Describe the file systems used by a Cisco router 21

Manage Cisco IOS Devices Describe how to backup and upgrade a Cisco IOS image 22

Manage Cisco IOS Devices Explain how to back up and upgrade Cisco IOS software images using a network server 23

Manage Cisco IOS Devices Explain how to recover a Cisco IOS software image 24

Manage Cisco IOS Devices Compare the use of the show and debug commands when troubleshooting Cisco router configurations 25

Manage Cisco IOS Devices Explain how to recover the enable password and the enable secret passwords 26

Summary Security Threats to an Enterprise network include: Unstructured threats Structured threats External threats Internal threats Methods to lessen security threats consist of: Device hardening Use of antivirus software Firewalls Download security updates 27

Summary Basic router security involves the following: Physical security Update and backup IOS Backup configuration files Password configuration Logging router activity Disable unused router interfaces & services to minimize their exploitation by intruders Cisco SDM A web based management tool for configuring security measures on Cisco routers 28

Summary Cisco IOS Integrated File System (IFS) Allows for the creation, navigation & manipulation of directories on a cisco device 29

30