SlideShare uma empresa Scribd logo
1 de 30
Enterprise Network 
Security 
Accessing the WAN – Chapter 4 
© 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
Objectives 
 Describe the general methods used to mitigate 
security threats to Enterprise networks 
 Configure Basic Router Security 
 Explain how to disable unused Cisco router network 
services and interfaces 
 Explain how to use Cisco SDM 
 Manage Cisco IOS devices 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain how sophisticated attack tools and open 
networks have created an increased need for network 
security and dynamic security policies 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the most common security threats and how 
they impact enterprises 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the most common types of network attacks 
and how they impact enterprises 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the common mitigation techniques that 
enterprises use to protect themselves against threats 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain the concept of the Network Security Wheel 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain the goals of a comprehensive security policy in 
an organization 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure Basic Router Security 
 Explain why the security of routers and their 
configuration settings is vital to network operation 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure Basic Router Security 
 Describe the recommended approach to applying Cisco 
IOS security features on network routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure Basic Router Security 
 Describe the basic security measures needed to secure 
Cisco routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Describe the router services and interfaces that are 
vulnerable to network attack 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Explain the vulnerabilities posed by commonly 
configured management services 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Explain how to secure a router with the command-line 
interface (CLI) auto secure command 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Explain How to Use Cisco SDM 
 Provide an overview of Cisco SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Explain How to Use Cisco SDM 
 Explain the steps to configure a router to use Cisco 
SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Explain How to Use Cisco SDM 
 Explain the steps you follow to start SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Explain How to Use Cisco SDM 
 Describe the Cisco SDM Interface 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Explain How to Use Cisco SDM 
 Describe the commonly used Cisco SDM wizards 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Explain How to Use Cisco SDM 
 Explain how to use Cisco SDM for locking down your 
router 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Manage Cisco IOS Devices 
 Describe the file systems used by a Cisco router 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Manage Cisco IOS Devices 
 Describe how to backup and upgrade a Cisco IOS 
image 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Manage Cisco IOS Devices 
 Explain how to back up and upgrade Cisco IOS 
software images using a network server 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Manage Cisco IOS Devices 
 Explain how to recover a Cisco IOS software image 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Manage Cisco IOS Devices 
 Compare the use of the show and debug commands 
when troubleshooting Cisco router configurations 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Manage Cisco IOS Devices 
 Explain how to recover the enable password and the 
enable secret passwords 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary 
 Security Threats to an Enterprise network include: 
–Unstructured threats 
–Structured threats 
–External threats 
–Internal threats 
 Methods to lessen security threats consist of: 
–Device hardening 
–Use of antivirus software 
–Firewalls 
–Download security updates 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Summary 
 Basic router security involves the following: 
–Physical security 
–Update and backup IOS 
–Backup configuration files 
–Password configuration 
–Logging router activity 
 Disable unused router interfaces & services to minimize 
their exploitation by intruders 
 Cisco SDM 
–A web based management tool for configuring security 
measures on Cisco routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary 
 Cisco IOS Integrated File System (IFS) 
–Allows for the creation, navigation & manipulation of 
directories on a cisco device 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30

Mais conteúdo relacionado

Mais procurados

CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
Irsandi Hasan
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
Carmelo de Jesús
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
Irsandi Hasan
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
Irsandi Hasan
 

Mais procurados (20)

CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
 

Destaque

CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
Irsandi Hasan
 

Destaque (20)

CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
IPv6 ACL
IPv6 ACLIPv6 ACL
IPv6 ACL
 

Semelhante a CCNA Exploration 4 - Chapter 4

CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8
Irsandi Hasan
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
Irsandi Hasan
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8
Irsandi Hasan
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
Irsandi Hasan
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
ali raza
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
CamTESOL2015
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
shah_ril1512
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
Irsandi Hasan
 

Semelhante a CCNA Exploration 4 - Chapter 4 (20)

Week3 1
Week3 1Week3 1
Week3 1
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 

Mais de Irsandi Hasan

Mais de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

CCNA Exploration 4 - Chapter 4

  • 1. Enterprise Network Security Accessing the WAN – Chapter 4 © 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
  • 2. Objectives  Describe the general methods used to mitigate security threats to Enterprise networks  Configure Basic Router Security  Explain how to disable unused Cisco router network services and interfaces  Explain how to use Cisco SDM  Manage Cisco IOS devices © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common security threats and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common types of network attacks and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the common mitigation techniques that enterprises use to protect themselves against threats © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the concept of the Network Security Wheel © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the goals of a comprehensive security policy in an organization © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Configure Basic Router Security  Explain why the security of routers and their configuration settings is vital to network operation © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Configure Basic Router Security  Describe the recommended approach to applying Cisco IOS security features on network routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Configure Basic Router Security  Describe the basic security measures needed to secure Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Describe the router services and interfaces that are vulnerable to network attack © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain the vulnerabilities posed by commonly configured management services © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain how to secure a router with the command-line interface (CLI) auto secure command © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Explain How to Use Cisco SDM  Provide an overview of Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Explain How to Use Cisco SDM  Explain the steps to configure a router to use Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Explain How to Use Cisco SDM  Explain the steps you follow to start SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Explain How to Use Cisco SDM  Describe the Cisco SDM Interface © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Explain How to Use Cisco SDM  Describe the commonly used Cisco SDM wizards © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Explain How to Use Cisco SDM  Explain how to use Cisco SDM for locking down your router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Manage Cisco IOS Devices  Describe the file systems used by a Cisco router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Manage Cisco IOS Devices  Describe how to backup and upgrade a Cisco IOS image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Manage Cisco IOS Devices  Explain how to back up and upgrade Cisco IOS software images using a network server © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. Manage Cisco IOS Devices  Explain how to recover a Cisco IOS software image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Manage Cisco IOS Devices  Compare the use of the show and debug commands when troubleshooting Cisco router configurations © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Manage Cisco IOS Devices  Explain how to recover the enable password and the enable secret passwords © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Summary  Security Threats to an Enterprise network include: –Unstructured threats –Structured threats –External threats –Internal threats  Methods to lessen security threats consist of: –Device hardening –Use of antivirus software –Firewalls –Download security updates © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. Summary  Basic router security involves the following: –Physical security –Update and backup IOS –Backup configuration files –Password configuration –Logging router activity  Disable unused router interfaces & services to minimize their exploitation by intruders  Cisco SDM –A web based management tool for configuring security measures on Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  • 29. Summary  Cisco IOS Integrated File System (IFS) –Allows for the creation, navigation & manipulation of directories on a cisco device © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30