O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

CCNA Exploration 4 - Chapter 4

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Próximos SlideShares
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
Carregando em…3
×

Confira estes a seguir

1 de 30 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Quem viu também gostou (20)

Anúncio

Semelhante a CCNA Exploration 4 - Chapter 4 (20)

Mais de Irsandi Hasan (20)

Anúncio

Mais recentes (20)

CCNA Exploration 4 - Chapter 4

  1. 1. Enterprise Network Security Accessing the WAN – Chapter 4 © 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
  2. 2. Objectives  Describe the general methods used to mitigate security threats to Enterprise networks  Configure Basic Router Security  Explain how to disable unused Cisco router network services and interfaces  Explain how to use Cisco SDM  Manage Cisco IOS devices © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  3. 3. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  4. 4. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common security threats and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  5. 5. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common types of network attacks and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  6. 6. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the common mitigation techniques that enterprises use to protect themselves against threats © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  7. 7. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the concept of the Network Security Wheel © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  8. 8. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the goals of a comprehensive security policy in an organization © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  9. 9. Configure Basic Router Security  Explain why the security of routers and their configuration settings is vital to network operation © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  10. 10. Configure Basic Router Security  Describe the recommended approach to applying Cisco IOS security features on network routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  11. 11. Configure Basic Router Security  Describe the basic security measures needed to secure Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  12. 12. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Describe the router services and interfaces that are vulnerable to network attack © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  13. 13. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain the vulnerabilities posed by commonly configured management services © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  14. 14. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain how to secure a router with the command-line interface (CLI) auto secure command © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  15. 15. Explain How to Use Cisco SDM  Provide an overview of Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  16. 16. Explain How to Use Cisco SDM  Explain the steps to configure a router to use Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  17. 17. Explain How to Use Cisco SDM  Explain the steps you follow to start SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  18. 18. Explain How to Use Cisco SDM  Describe the Cisco SDM Interface © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  19. 19. Explain How to Use Cisco SDM  Describe the commonly used Cisco SDM wizards © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  20. 20. Explain How to Use Cisco SDM  Explain how to use Cisco SDM for locking down your router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  21. 21. Manage Cisco IOS Devices  Describe the file systems used by a Cisco router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  22. 22. Manage Cisco IOS Devices  Describe how to backup and upgrade a Cisco IOS image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  23. 23. Manage Cisco IOS Devices  Explain how to back up and upgrade Cisco IOS software images using a network server © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  24. 24. Manage Cisco IOS Devices  Explain how to recover a Cisco IOS software image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  25. 25. Manage Cisco IOS Devices  Compare the use of the show and debug commands when troubleshooting Cisco router configurations © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  26. 26. Manage Cisco IOS Devices  Explain how to recover the enable password and the enable secret passwords © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  27. 27. Summary  Security Threats to an Enterprise network include: –Unstructured threats –Structured threats –External threats –Internal threats  Methods to lessen security threats consist of: –Device hardening –Use of antivirus software –Firewalls –Download security updates © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  28. 28. Summary  Basic router security involves the following: –Physical security –Update and backup IOS –Backup configuration files –Password configuration –Logging router activity  Disable unused router interfaces & services to minimize their exploitation by intruders  Cisco SDM –A web based management tool for configuring security measures on Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  29. 29. Summary  Cisco IOS Integrated File System (IFS) –Allows for the creation, navigation & manipulation of directories on a cisco device © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  30. 30. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30

×