SlideShare uma empresa Scribd logo
1 de 64
CCNA Security


                                         Chapter Two
                                   Securing Network Devices



© 2009 Cisco Learning Institute.                              1
Lesson Planning


     • This lesson should take 3-6 hours to present
     • The lesson should include lecture,
       demonstrations, discussion and assessment
     • The lesson can be taught in person or using
       remote instruction




© 2009 Cisco Learning Institute.                      2
Major Concepts


     • Discuss the aspects of router hardening
     • Configure secure administrative access and
       router resiliency
     • Configure network devices for monitoring
       administrative access
     • Demonstrate network monitoring techniques
     • Secure IOS-based Routers using automated
       features

© 2009 Cisco Learning Institute.                    3
Lesson Objectives

     Upon completion of this lesson, the successful participant
     will be able to:
     1.Describe how to configure a secure network perimeter
     2.Demonstrate the configuration of secure router administration access
     3.Describe how to enhance the security for virtual logins
     4.Describe the steps to configure an SSH daemon for secure remote
     management
     5.Describe the purpose and configuration of administrative privilege
     levels
     6.Configure the role-based CLI access feature to provide hierarchical
     administrative access



© 2009 Cisco Learning Institute.                                              4
Lesson Objectives

     7. Use the Cisco IOS resilient configuration feature to secure the
        Cisco IOS image and configuration files
     8. Describe the factors to consider when securing the data that
        transmits over the network related to the network management and
        reporting of device activity
     9. Configure syslog for network security
     10. Configure SNMP for network security
     11. Configure NTP to enable accurate time stamping between all
         devices
     12. Describe the router services, interfaces, and management services
         that are vulnerable to network attacks and perform a security audit
     13. Lock down a router using AutoSecure
     14. Lock down a router using SDM


© 2009 Cisco Learning Institute.                                               5
The Edge Router

     • What is the edge router?
                    - The last router between the internal network and an untrusted
                      network such as the Internet
                    - Functions as the first and last line of defense
                    - Implements security actions based on the organization’s
                      security policies
     • How can the edge router be secured?
                    - Use various perimeter router implementations
                    - Consider physical security, operating system security, and
                      router hardening
                    - Secure administrative access
                    - Local versus remote router access




© 2009 Cisco Learning Institute.                                                      6
Perimeter Implementations

     • Single Router Approach
                                                                    Router 1 (R1)
                    A single router connects the                                        LAN 1
                                                        Internet
                    internal LAN to the Internet. All                                 192.168.2.0

                    security policies are
                    configured on this device.
     • Defense-in-depth Approach
                                                                     R1    Firewall
                    Passes everything through to                                        LAN 1
                                                        Internet                      192.168.2.0
                    the firewall. A set of rules
                    determines what traffic the
                    router will allow or deny.
     • DMZ Approach
                                                                   R1 Firewall R2
                                                        Internet                        LAN 1
                    The DMZ is set up between                                         192.168.2.0
                    two routers. Most traffic                             DMZ
                    filtering left to the firewall

© 2009 Cisco Learning Institute.                                                                7
Areas of Router Security

     • Physical Security
                    - Place router in a secured, locked room
                    - Install an uninterruptible power supply
     • Operating System Security
                    - Use the latest stable version that meets network requirements
                    - Keep a copy of the O/S and configuration file as a backup
     • Router Hardening
                    - Secure administrative control
                    - Disable unused ports and interfaces
                    - Disable unnecessary services



© 2009 Cisco Learning Institute.                                                      8
Banner Messages

     • Banners are disabled by default and must be explicitly
       enabled.
            R1(config)# banner {exec | incoming | login | motd | slip-ppp} d message d

     • There are four valid tokens for use within the message
       section of the banner command:
                  - $(hostname)—Displays the hostname for the router
                  - $(domain)—Displays the domain name for the router
                  - $(line)—Displays the vty or tty (asynchronous) line number
                  - $(line-desc)—Displays the description that is attached to the
                    line


© 2009 Cisco Learning Institute.                                                         9
SSH                                version 1, 2



     • Configuring Router
     • SSH Commands
     • Connecting to Router
     • Using SDM to configure the SSH Daemon
            What's the difference between versions 1 and 2 of the SSH protocol?




© 2009 Cisco Learning Institute.                                           10
Preliminary Steps for Configuring SSL

     Complete the following prior to configuring routers for the
     SSH protocol:
              1. Ensure that the target routers are running a Cisco IOS Release
                 12.1(1)T image or later to support SSH.
              2. Ensure that each of the target routers has a unique hostname.
              3. Ensure that each of the target routers is using the correct
                 domain name of the network.
              4. Ensure that the target routers are configured for local
                 authentication, or for authentication, authorization, and
                 accounting (AAA) services for username or password
                 authentication, or both. This is mandatory for a router-to-router
                 SSH connection.



© 2009 Cisco Learning Institute.                                                     11
Configuring the Router for SSH

       R1# conf t                     1. Configure the IP domain
                                         name of the network
       R1(config)# ip domain-name span.com
       R1(config)# crypto key generate rsa general-keys
       modulus 1024                                  2. Generate one   way
       The name for the keys will be: R1.span.com       secret key
       % The key modulus size is 1024 bits
       % Generating 1024 bit RSA keys, keys will be non-
       exportable...[OK]

       R1(config)#
       *Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has
       been enabled                          3. Verify or create a local
       R1(config)# username Bob secret cisco    database entry
       R1(config)# line vty 0 4
       R1(config-line)# login local
       R1(config-line)# transport input ssh 4. Enable VTY inbound
       R1(config-line)# exit                    SSH sessions


© 2009 Cisco Learning Institute.                                             12
Optional SSH Commands

       R1# show ip ssh
       SSH Enabled - version 1.99
       Authentication timeout: 120 secs; Authentication
       retries: 3
       R1#
       R1# conf t
       Enter configuration commands, one per line. End
       with CNTL/Z.
       R1(config)# ip ssh version 2
       R1(config)# ip ssh time-out 60
       R1(config)# ip ssh authentication-retries 2
       R1(config)# ^Z
       R1#
       R1# show ip ssh
       SSH Enabled - version 2.0
       Authentication timeout: 60 secs; Authentication
       retries: 2
       R1#
© 2009 Cisco Learning Institute.                          13
Connecting to the Router
                                                               There are two different ways to
                                                               connect to an SSH-enabled router:
  1 There are no current SSH sessions ongoing with R1.
                                                                       - Connect using an SSH-enabled Cisco
 R1# sho ssh
 %No SSHv2 server connections running.
                                                                         router
 %No SSHv1 server connections running.
 R1#                                                                   - Connect using an SSH client running
                                                                         on a host.

                                                         2 R2 establishes an SSH connection with R1.

                                                         R2# ssh -l Bob 192.168.2.101

                                                         Password:

                                                         R1>


   3       There is an incoming and outgoing SSHv2 session user Bob.


   R1# sho ssh
   Connection Version Mode Encryption Hmac                     State                 Username
   0           2.0    IN   aes128-cbc hmac-sha1                Session started       Bob
   0           2.0    OUT aes128-cbc hmac-sha1                 Session started       Bob
   %No SSHv1 server connections running.
   R1#



© 2009 Cisco Learning Institute.                                                                           14
Using SDM
             1. Choose Configure > Additional Tasks > Router Access > SSH




                                             2. Possible status options:
                                                - RSA key is not set on this router
                                                - RSA key is set on this router




                                               3. Enter a modulus size and
                                                  generate a key, if there is
   4. To configure SSH on the vty lines,          no key configured
         choose Configure > Additional
         Tasks > Router Access > VTY
© 2009 Cisco Learning Institute.                                                 15
Configuring for Privilege Levels

     • By default:
                    - User EXEC mode (privilege level 1)
                    - Privileged EXEC mode (privilege level 15)
     • Sixteen privilege levels available
     • Methods of providing privileged level access
       infrastructure access:
                    - Privilege Levels
                    - Role-Based CLI Access


                                   Config AAA, Show,
                                   Firewall, IDS/IPS,
                                   NetFlow




© 2009 Cisco Learning Institute.                                  16
Privilege CLI Command

router(config)# privilege mode {level level command | reset command}


  Command                           Description
  mode                              Specifies the configuration mode. Use the privilege ?
                                    command to see a complete list of router configuration
                                    modes available
  level                             (Optional) Enables setting a privilege level with a
                                    specified command
  level command                     (Optional) The privilege level associated with a
                                    command (specify up to 16 privilege levels, using
                                    numbers 0 to 15)
  reset                             (Optional) Resets the privilege level of a command
  Command                           (Optional) Resets the privilege level


 © 2009 Cisco Learning Institute.                                                         17
Privilege Levels for Users
                   R1# conf t
                   R1(config)#     username USER privilege 1 secret cisco
                   R1(config)#
                   R1(config)#     privilege exec level 5 ping
                   R1(config)#     enable secret level 5 cisco5
                   R1(config)#     username SUPPORT privilege 5 secret cisco5
                   R1(config)#
                   R1(config)#     privilege exec level 10 reload
                   R1(config)#     enable secret level 10 cisco10
                   R1(config)#     username JR-ADMIN privilege 10 secret cisco10
                   R1(config)#
                   R1(config)#     username ADMIN privilege 15 secret cisco123
                   R1(config)#


     • A USER account with normal, Level 1 access.
     • A SUPPORT account with Level 1 and ping command access.
     • A JR-ADMIN account with the same privileges as the SUPPORT
       account plus access to the reload command.
     • An ADMIN account which has all of the regular privileged EXEC
       commands.


© 2009 Cisco Learning Institute.                                                   18
Privilege Levels

                                   The enable level command is used to switch
     R1> enable 5
                     from Level 1 to Level 5
     Password:
     R1# <cisco5>
     R1# show privilege
                                     The show privilege command                 displays
     Current privilege level is 5
                                     The current privilege level
     R1#
     R1# reload
     Translating "reload"
                                        The user cannot us the reload command
     Translating "reload"

     % Unknown command or computer name, or unable to find computer
     address
     R1#



© 2009 Cisco Learning Institute.                                                           19
Privilege Level Limitations

     • There is no access control to specific interfaces, ports,
       logical interfaces, and slots on a router
     • Commands available at lower privilege levels are always
       executable at higher levels.
     • Commands specifically set on a higher privilege level are
       not available for lower-privileged users.
     • Assigning a command with multiple keywords to a
       specific privilege level also assigns any commands
       associated with the first keywords to the same privilege
       level.


© 2009 Cisco Learning Institute.                                   20
Role-Based CLI

     • Controls which commands are available to specific roles
     • Different views of router configurations created for
       different users providing:
                    - Security: Defines the set of CLI commands that is accessible by
                      a particular user by controlling user access to configure specific
                      ports, logical interfaces, and slots on a router
                    - Availability: Prevents unintentional execution of CLI commands
                      by unauthorized personnel
                    - Operational Efficiency: Users only see the CLI commands
                      applicable to the ports and CLI to which they have access




© 2009 Cisco Learning Institute.                                                           21
Role-Based Views

     • Root View
                    To configure any view for the system, the administrator must be in
                    the root view. Root view has all of the access privileges as a user
                    who has level 15 privileges.
     • CLI View
                    A specific set of commands can be bundled into a “CLI view”.
                    Each view must be assigned all commands associated with that
                    view and there is no inheritance of commands from other views.
                    Additionally, commands may be reused within several views.
     • Superview
                    Allow a network administrator to assign users and groups of users
                    multiple CLI views at once instead of having to assign a single
                    CLI view per user with all commands associated to that one CLI
                    view.


© 2009 Cisco Learning Institute.                                                          22
Role-Based Views




© 2009 Cisco Learning Institute.   23
Creating and Managing a View

     1. Enable aaa with the global configuration command aaa new-
        model. Exit, and enter the root view with the command enable
        view command.
     2. Create a view using the parser view view-name command.
     3. Assign a secret password to the view using the secret
        encrypted-password command.
     4. Assign commands to the selected view using the parser-mode
        {include | include-exclusive | exclude} [all]
        [interface interface-name | command] command in view
        configuration mode.
     5. Exit the view configuration mode by typing the command exit.




© 2009 Cisco Learning Institute.                                       24
View Commands

       router# enable [view [view-name]]

       Command is used to enter the CLI view.
        Parameter                  Description
        view                       Enters view, which enables users to configure CLI views.
                                   This keyword is required if you want to configure a CLI view.

        view-name                  (Optional) Enters or exits a specified CLI view.
                                   This keyword can be used to switch from one CLI view to
                                   another CLI view.

     router(config)# parser view view-name
         Creates a view and enters view configuration mode.
       router(config-view)# secret encrypted-password
       • Sets a password to protect access to the View.
       • Password must be created immediately after creating a view

© 2009 Cisco Learning Institute.                                                                   25
Creating and Managing a Superview


     1. Create a view using the parser view view-
        name superview command and enter
        superview configuration mode.
     2. Assign a secret password to the view using the
        secret encrypted-password command.
     3. Assign an existing view using the view view-
        name command in view configuration mode.
     4. Exit the superview configuration mode by typing
        the command exit.


© 2009 Cisco Learning Institute.                          26
Running Config “Views”




© 2009 Cisco Learning Institute.   27
Running Config “SUPERVIEWS”




© 2009 Cisco Learning Institute.   28
Verifying a View

   R1# show parser view
   No view is active ! Currently in Privilege Level Context
   R1#
   R1# enable view
   Password:
   *Mar           1 10:38:56.233: %PARSER-6-VIEW_SWITCH: successfully set to view 'root'.
   R1#
   R1# show parser view
   Current view is 'root'
   R1#
   R1# show parser view all
   Views/SuperViews Present in System:
     SHOWVIEW
     VERIFYVIEW




© 2009 Cisco Learning Institute.                                                            29
Resilient Configuration Facts

     • The configuration file in the primary
       bootset is a copy of the running
       configuration that was in the router when
       the feature was first enabled.
     • The feature secures the smallest working      R1# erase
                                                     R1# erase

       set of files to preserve persistent storage   startup-config
                                                     startup-config
                                                     Erasing the
                                                     Erasing the
       space. No extra space is required to          nvram filesystem
                                                     nvram filesystem
                                                     will remove all
                                                     will remove all
       secure the primary IOS image file.            configuration
                                                     configuration
                                                     files! Continue?
                                                     files! Continue?
                                                     [confirm]
                                                     [confirm]
     • The feature automatically detects image
       or configuration version mismatch.
     • Only local storage is used for securing
       files.
     • The feature can be disabled only through
       a console session.



© 2009 Cisco Learning Institute.                                        30
CLI Commands


       router(config)#
       secure boot-image
         Enables Cisco IOS image resilience. Prevents the IOS image
          from being deleted by a malicious user.

       router(config)#
       secure boot-config
         Takes a snapshot of the router running configuration and securely
          archives it in persistent storage.




© 2009 Cisco Learning Institute.                                              31
Restoring Primary bootset

     To restore a primary bootset from a secure archive:
     1. Reload the router using the reload command.
     2. From ROMMON mode, enter the dir command to list the contents
        of the device that contains the secure bootset file. The device name
        can be found in the output of the show secure bootset
        command.
     3. Boot up the router using the secure bootset image using the boot
        command with the filename found in step 2. Once the compromised
        router boots, proceed to privileged EXEC mode and restore the
        configuration.
     4. Enter global configuration mode using conf t.
     5. Restore the secure configuration to the supplied filename using the
        secure boot-config restore filename.




© 2009 Cisco Learning Institute.                                               32
Password Recovery Procedures

     1.          Connect to the console port.
     2.          Use the show version command to view and record the
                 configuration register
     3.          Use the power switch to turn off the router, and then turn the router
                 back on.
     4.          Press Break on the terminal keyboard within 60 seconds of power
                 up to put the router into ROMmon.
     5.          At the rommon 1> prompt Type config 0x2142.
     6.          Type reset at the rommon 2> prompt. The router reboots, but
                 ignores the saved configuration.
     7.          Type no after each setup question, or press Ctrl-C to skip the
                 initial setup procedure.
     8.          Type enable at the Router> prompt.


© 2009 Cisco Learning Institute.                                                         33
Password Recovery Procedures, 2

     9.          Type copy startup-config running-config to copy the
                 NVRAM into memory.
     10. Type show running-config.
     11. Enter global configuration and type the enable secret command
         to change the enable secret password.
     12. Issue the no shutdown command on every interface to be used.
         Once enabled, issue a show ip interface brief command.
         Every interface to be used should display ‘up up’.
     13. Type config-register configuration_register_setting.
         The configuration_register_setting is either the value recorded in
         Step 2 or 0x2102 .
     14. Save configuration changes using the copy running-config
         startup-config command.


© 2009 Cisco Learning Institute.                                          34
Preventing Password Recovery
                   R1(config)# no service password-recovery
                   WARNING:
                   Executing this command will disable password recovery mechanism.
                   Do not execute this command without another plan for password recovery.
                   Are you sure you want to continue? [yes/no]: yes
                   R1(config)

                     R1# sho run
                     Building configuration...

                     Current configuration : 836 bytes
                     !
                     version 12.4
                     service timestamps debug datetime msec
                     service timestamps log datetime msec
                     service password-encryption
                     no service password-recovery

                    System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
                    Technical Support: http://www.cisco.com/techsupport
                    Copyright (c) 2006 by cisco Systems, Inc.
                    PLD version 0x10
                    GIO ASIC version 0x127
                    c1841 platform with 131072 Kbytes of main memory
                    Main memory is configured to 64 bit mode with parity disabled

                    PASSWORD RECOVERY FUNCTIONALITY IS DISABLED
                    program load complete, entry point: 0x8000f000, size: 0xcb80
© 2009 Cisco Learning Institute.                                                             35
Implementing Secure Management

     • Configuration Change Management
                    - Know the state of critical network devices
                    - Know when the last modifications occurred
                    - Ensure the right people have access when new management
                      methodologies are adopted
                    - Know how to handle tools and devices no longer used

     • Automated logging and reporting of information from
       identified devices to management hosts
     • Available applications and protocols like SNMP



© 2009 Cisco Learning Institute.                                                36
Secure Management and Reporting


     • When logging and managing information, the
       information flow between management hosts and
       the managed devices can take two paths:
                    - Out-of-band (OOB): Information flows on a
                      dedicated management network on which no
                      production traffic resides.
                    - In-band: Information flows across an enterprise
                      production network, the Internet, or both using regular
                      data channels.



© 2009 Cisco Learning Institute.                                                37
Factors to Consider


     • OOB management appropriate for large
       enterprise networks
     • In-band management recommended in smaller
       networks providing a more cost-effective security
       deployment
     • Be aware of security vulnerabilities of using
       remote management tools with in-band
       management


© 2009 Cisco Learning Institute.                           38
Using Syslog


     • Implementing Router Logging
     • Syslog
     • Configuring System Logging
     • Enabling Syslog using SDM/CCP




© 2009 Cisco Learning Institute.       39
Implementing Router Logging


     Configure the router to send log messages to:
     • Console: Console logging is used when modifying or
       testing the router while it is connected to the console.
       Messages sent to the console are not stored by the
       router and, therefore, are not very valuable as security
       events.
     • Terminal lines: Configure enabled EXEC sessions to
       receive log messages on any terminal lines. Similar to
       console logging, this type of logging is not stored by the
       router and, therefore, is only valuable to the user on that
       line.



© 2009 Cisco Learning Institute.                                     40
Implementing Router Logging

     • Buffered logging: Store log messages in router memory.
       Log messages are stored for a time, but events are
       cleared whenever the router is rebooted.
     • SNMP traps: Certain thresholds can be preconfigured.
       Events can be processed by the router and forwarded as
       SNMP traps to an external SNMP server. Requires the
       configuration and maintenance of an SNMP system.
     • Syslog: Configure routers to forward log messages to an
       external syslog service. This service can reside on any
       number of servers, including Microsoft Windows and
       UNIX-based systems, or the Cisco Security MARS
       appliance.


© 2009 Cisco Learning Institute.                                 41
Syslog

     • Syslog servers: Known as log hosts, these systems
       accept and process log messages from syslog clients.
     • Syslog clients: Routers or other types of equipment that
       generate and forward log messages to syslog servers.
                                                     Public Web        Mail     Administrator
                                                       Server         Server       Server
                                                      10.2.2.3       10.2.2.4     10.2.2.5


                                          Syslog Client
                                         e0/0
                                     10.2.1.1   R3    e0/1        DMZ LAN 10.2.2.0/24
                                             e0/2     10.2.2.1
                                         10.2.3.1
                                                             Syslog
                                                             Server 10.2.3.2


                                   Protected LAN             User 10.2.3.3
                                      10.2.3.0/24

© 2009 Cisco Learning Institute.                                                                42
Configuring System Logging




                                                             Turn logging on and off using the
                                                             logging buffered, logging
                                                             monitor, and logging commands


                                                      1. Set the destination logging host
 R3(config)#                       logging   10.2.2.6
 R3(config)#                       logging   trap informational 2. Set the log    severity (trap) level
 R3(config)#                       logging   source-interface loopback 0
 R3(config)#                       logging   on                          3. Set   the source interface
                                                4. Enable logging
© 2009 Cisco Learning Institute.                                                                          43
Enabling Syslog Using SDM/CCP
  1. Choose Configure > Additional Tasks > Router Properties > Logging


                                                               2. Click Edit
                                                 3. Check Enable Logging
                                                    Level and choose the
                                                    desired logging level
                                                 4. Click Add, and enter
                                                    an IP address of a
                                                    logging host




                                   5. Click OK


© 2009 Cisco Learning Institute.                                           44
Monitor Logging with SDM
          1. Choose Monitor > Logging




                                    2. See the logging hosts to which
                                       the router logs messages

                                   3. Choose the minimum severity level




                                        4. Monitor the messages, update the
                                           screen to show the most current log
                                           entries, and clear all syslog
                                           messages from the router log buffer

© 2009 Cisco Learning Institute.                                            45
Monitor Logging Remotely

• Logs can easily be viewed
  through the SDM, or for easier
  use, through a syslog viewer on
  any remote system.
• There are numerous Free
  remote syslog viewers, Kiwi is
  relatively basic and free.
• Configure the router/switch/etc
  to send logs to the PC’s ip
  address that has kiwi installed.
• Kiwi automatically listens for
  syslog messages and displays
  them.

© 2009 Cisco Learning Institute.     46
SNMP

     • Developed to manage nodes, such as servers,
       workstations, routers, switches, hubs, and security
       appliances on an IP network
     • All versions are Application Layer protocols that facilitate
       the exchange of management information between
       network devices
     • Part of the TCP/IP protocol suite
     • Enables network administrators to manage network
       performance, find and solve network problems, and plan
       for network growth
     • Three separate versions of SNMP


© 2009 Cisco Learning Institute.                                      47
Community Strings
                                   A text string that can authenticate messages
                                   between a management station and an SNMP
                                   agent and allow access to the information in MIBs




                                                   Provides read-only access to all
                                                   objects in the MIB except the
                                                   community strings.

                                                   Provides read-write access to
                                                   all objects in the MIB except the
                                                   community strings.




© 2009 Cisco Learning Institute.                                                       48
SNMPv3
                                   Transmissions from manager to
                                   agent may be authenticated to
                         NMS
                                   guarantee the identity of the sender
                                   and the integrity and timeliness of a
                                   message.
                                                                             Managed
                                                                              Node



                                                                                   Managed
                                                Encrypted Tunnel                    Node




                  Messages may be                                                  Managed
                  encrypted to ensure                                               Node
                  privacy
                                    Agent may enforce access
                                    control to restrict each principal
                                    to certain actions on certain        Managed
                   NMS
                                    portions of its data.                 Node

© 2009 Cisco Learning Institute.                                                             49
Security Levels

     • noAuth: Authenticates a packet by a string match of the
       username or community string
     • auth: Authenticates a packet by using either the Hashed
       Message Authentication Code (HMAC) with Message
       Digest 5 (MD5) method or Secure Hash Algorithms
       (SHA) method.
     • Priv: Authenticates a packet by using either the HMAC
       MD5 or HMAC SHA algorithms and encrypts the packet
       using the Data Encryption Standard (DES), Triple DES
       (3DES), or Advanced Encryption Standard (AES)
       algorithms.



© 2009 Cisco Learning Institute.                                 50
Trap Receivers


                                                                               1. Click Edit



                                                                         3. Enter the IP address or
                                                                            the hostname of the
                                                                            trap receiver and the
                                                            2. Click Add    password



      5. To edit or delete an existing trap receiver,
                    choose a trap receiver from the
         trap receiver list and click Edit or Delete

                                   6. When the trap receiver list            4. Click OK

© 2009 Cisco Learning Institute.
                                        is complete, click OK                                  51
Using NTP

     • Clocks on hosts and network devices must be maintained
       and synchronized to ensure that log messages are
       synchronized with one another
     • The date and time settings of the router can be set using
       one of two methods:
                    - Manually edit the date and time
                    - Configure Network Time Protocol




© 2009 Cisco Learning Institute.                                   52
Timekeeping

     • Pulling the clock time from the Internet means that unsecured
       packets are allowed through the firewall
     • Many NTP servers on the Internet do not require any authentication
       of peers
     • Devices are given the IP address of NTP masters. In an NTP
       configured network, one or more routers are designated as the
       master clock keeper (known as an NTP Master) using the ntp
       master global configuration command.
     • NTP clients either contact the master or listen for messages from the
       master to synchronize their clocks. To contact the server, use the
       ntp server ntp-server-address command.
     • In a LAN environment, NTP can be configured to use IP broadcast
       messages instead, by using the ntp broadcast client
       command.


© 2009 Cisco Learning Institute.                                               53
Features/Functions

     • There are two security mechanisms available:
                    - An ACL-based restriction scheme
                    - An encrypted authentication mechanism such as offered by NTP
                      version 3 or higher

     • Implement NTP version 3 or higher. Use the following
       commands on both NTP Master and the NTP client.
                    - ntp authenticate
                    - ntp authentication key md5 value
                    - ntp trusted-key key-value




© 2009 Cisco Learning Institute.                                                     54
Enabling NTP
 1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP

                                                               2. Click Add


                    3. Add an NTP server by
                       name or by IP address
                                                           5. Check Prefer if this
                                                              NTP server is a
                         4. Choose the interface              preferred server (more
                            that the router will use          than one is allowed)
                            to communicate with
                            the NTP server
                                                         6. If authentication is used,
                                                            check Authentication
                                                            Key and enter the key
                                           7. Click OK      number, the key value,
                                                            and confirm the key value.

© 2009 Cisco Learning Institute.                                                    55
Security Practices

     • Determine what devices should use CDP
     • To ensure a device is secure:
                    - Disable unnecessary services and interfaces
                    - Disable and restrict commonly configured management
                      services, such as SNMP
                    - Disable probes and scans, such as ICMP
                    - Ensure terminal access security
                    - Disable gratuitous and proxy Address Resolution Protocol
                      (ARP)
                    - Disable IP-directed broadcast


© 2009 Cisco Learning Institute.                                                 56
SDM Security Audit



                                   Perform Security Audit
                                   letting the
                                   administrator choose
                                   configuration changes
                                   to implement


                                   One-Step Lockdown
                                   automatically makes
                                   all recommended
                                   security-related
                                   configuration changes




© 2009 Cisco Learning Institute.                       57
Security Audit Wizard

                                     Compares router configuration
                                     against recommended settings:
                                   • Shut down unneeded servers
                                   • Disable unneeded services
                                   • Apply the firewall to the outside
                                     interfaces
                                   • Disable or harden SNMP
                                   • Shut down unused interfaces
                                   • Check password strength
                                   • Enforce the use of ACLs




© 2009 Cisco Learning Institute.                                         58
Cisco AutoSecure

     • Initiated from CLI and executes a script. The
       AutoSecure feature first makes
       recommendations for fixing security
       vulnerabilities, and then modifies the security
       configuration of the router.
     • Can lockdown the management plane functions
       and the forwarding plane services and functions
       of a router
     • Used to provide a baseline security policy on a
       new router

© 2009 Cisco Learning Institute.                         59
Auto Secure Command


     • Command to enable the Cisco AutoSecure
       feature setup:
                    auto secure [no-interact]
     • In Interactive mode, the router prompts with
       options to enable and disable services and other
       security features. This is the default mode but
       can also be configured using the auto secure
       full command.



© 2009 Cisco Learning Institute.                          60
Auto Secure Command
     router#
     auto secure [no-interact | full] [forwarding | management ] [ntp
     | login | ssh | firewall | tcp-intercept]


       R1# auto secure ?
            firewall               AutoSecure Firewall
            forwarding             Secure Forwarding Plane
            full                   Interactive full session of AutoSecure
            login                  AutoSecure Login
            management             Secure Management Plane
            no-interact            Non-interactive session of AutoSecure
            ntp                    AutoSecure NTP
            ssh                    AutoSecure SSH
            tcp-intercept          AutoSecure TCP Intercept
            <cr>


       R1#

© 2009 Cisco Learning Institute.                                            61
Cisco One-step Lockdown


                                   Tests router configuration
                                   for any potential security
                                   problems and
                                   automatically makes the
                                   necessary configuration
                                   changes to correct any
                                   problems found




© 2009 Cisco Learning Institute.                           62
AutoSecure Versus SDM Security
Audit One-Step Lockdown

  R1# auto secure
  --- AutoSecure Configuration ---
  *** AutoSecure configuration enhances the
  security of the router, but it will not make
  it absolutely resistant to all security
  attacks ***
  AutoSecure will modify the configuration of
  your device.
  All configuration changes will be shown. For a
  detailed explanation of how the configuration
  changes enhance security and any possible side
  effects, please refer to Cisco.com for
  Autosecure documentation.
                                                     SDM implements some the
 Cisco AutoSecure also:                              following features differently:
 • Disables NTP                                    • SNMP is disabled but will not
 • Configures AAA                                    configure SNMPv3
 • Sets SPD values                                 • SSH is enabled and configured with
 • Enables TCP intercepts                             images that support this feature.
 • Configures anti-spoofing ACLs on                • Secure Copy Protocol (SCP) is not
   outside-facing interfaces                         enabled--unsecure FTP is.
© 2009 Cisco Learning Institute.                                                   63
© 2009 Cisco Learning Institute.   64

Mais conteúdo relacionado

Mais procurados

CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architectureAmir Hossain
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKKulsumKhan13
 

Mais procurados (20)

CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Chapter03
Chapter03Chapter03
Chapter03
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORK
 

Semelhante a CCNA Security - Chapter 2

Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overviewali raza
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.pptveracru1
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeAhmed Habib
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1Waqas Ahmed Nawaz
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2limenih muluneh
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10Chaing Ravuth
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overviewali raza
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01slavenvvv
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1Chaing Ravuth
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmatCisco Canada
 

Semelhante a CCNA Security - Chapter 2 (20)

Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.ppt
 
Ccnas v11 ch02_eb
Ccnas v11 ch02_ebCcnas v11 ch02_eb
Ccnas v11 ch02_eb
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
network security
network securitynetwork security
network security
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Topic22
Topic22Topic22
Topic22
 
Securityic2
Securityic2Securityic2
Securityic2
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 

Mais de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

Mais de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

CCNA Security - Chapter 2

  • 1. CCNA Security Chapter Two Securing Network Devices © 2009 Cisco Learning Institute. 1
  • 2. Lesson Planning • This lesson should take 3-6 hours to present • The lesson should include lecture, demonstrations, discussion and assessment • The lesson can be taught in person or using remote instruction © 2009 Cisco Learning Institute. 2
  • 3. Major Concepts • Discuss the aspects of router hardening • Configure secure administrative access and router resiliency • Configure network devices for monitoring administrative access • Demonstrate network monitoring techniques • Secure IOS-based Routers using automated features © 2009 Cisco Learning Institute. 3
  • 4. Lesson Objectives Upon completion of this lesson, the successful participant will be able to: 1.Describe how to configure a secure network perimeter 2.Demonstrate the configuration of secure router administration access 3.Describe how to enhance the security for virtual logins 4.Describe the steps to configure an SSH daemon for secure remote management 5.Describe the purpose and configuration of administrative privilege levels 6.Configure the role-based CLI access feature to provide hierarchical administrative access © 2009 Cisco Learning Institute. 4
  • 5. Lesson Objectives 7. Use the Cisco IOS resilient configuration feature to secure the Cisco IOS image and configuration files 8. Describe the factors to consider when securing the data that transmits over the network related to the network management and reporting of device activity 9. Configure syslog for network security 10. Configure SNMP for network security 11. Configure NTP to enable accurate time stamping between all devices 12. Describe the router services, interfaces, and management services that are vulnerable to network attacks and perform a security audit 13. Lock down a router using AutoSecure 14. Lock down a router using SDM © 2009 Cisco Learning Institute. 5
  • 6. The Edge Router • What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as the first and last line of defense - Implements security actions based on the organization’s security policies • How can the edge router be secured? - Use various perimeter router implementations - Consider physical security, operating system security, and router hardening - Secure administrative access - Local versus remote router access © 2009 Cisco Learning Institute. 6
  • 7. Perimeter Implementations • Single Router Approach Router 1 (R1) A single router connects the LAN 1 Internet internal LAN to the Internet. All 192.168.2.0 security policies are configured on this device. • Defense-in-depth Approach R1 Firewall Passes everything through to LAN 1 Internet 192.168.2.0 the firewall. A set of rules determines what traffic the router will allow or deny. • DMZ Approach R1 Firewall R2 Internet LAN 1 The DMZ is set up between 192.168.2.0 two routers. Most traffic DMZ filtering left to the firewall © 2009 Cisco Learning Institute. 7
  • 8. Areas of Router Security • Physical Security - Place router in a secured, locked room - Install an uninterruptible power supply • Operating System Security - Use the latest stable version that meets network requirements - Keep a copy of the O/S and configuration file as a backup • Router Hardening - Secure administrative control - Disable unused ports and interfaces - Disable unnecessary services © 2009 Cisco Learning Institute. 8
  • 9. Banner Messages • Banners are disabled by default and must be explicitly enabled. R1(config)# banner {exec | incoming | login | motd | slip-ppp} d message d • There are four valid tokens for use within the message section of the banner command: - $(hostname)—Displays the hostname for the router - $(domain)—Displays the domain name for the router - $(line)—Displays the vty or tty (asynchronous) line number - $(line-desc)—Displays the description that is attached to the line © 2009 Cisco Learning Institute. 9
  • 10. SSH version 1, 2 • Configuring Router • SSH Commands • Connecting to Router • Using SDM to configure the SSH Daemon What's the difference between versions 1 and 2 of the SSH protocol? © 2009 Cisco Learning Institute. 10
  • 11. Preliminary Steps for Configuring SSL Complete the following prior to configuring routers for the SSH protocol: 1. Ensure that the target routers are running a Cisco IOS Release 12.1(1)T image or later to support SSH. 2. Ensure that each of the target routers has a unique hostname. 3. Ensure that each of the target routers is using the correct domain name of the network. 4. Ensure that the target routers are configured for local authentication, or for authentication, authorization, and accounting (AAA) services for username or password authentication, or both. This is mandatory for a router-to-router SSH connection. © 2009 Cisco Learning Institute. 11
  • 12. Configuring the Router for SSH R1# conf t 1. Configure the IP domain name of the network R1(config)# ip domain-name span.com R1(config)# crypto key generate rsa general-keys modulus 1024 2. Generate one way The name for the keys will be: R1.span.com secret key % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non- exportable...[OK] R1(config)# *Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has been enabled 3. Verify or create a local R1(config)# username Bob secret cisco database entry R1(config)# line vty 0 4 R1(config-line)# login local R1(config-line)# transport input ssh 4. Enable VTY inbound R1(config-line)# exit SSH sessions © 2009 Cisco Learning Institute. 12
  • 13. Optional SSH Commands R1# show ip ssh SSH Enabled - version 1.99 Authentication timeout: 120 secs; Authentication retries: 3 R1# R1# conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip ssh version 2 R1(config)# ip ssh time-out 60 R1(config)# ip ssh authentication-retries 2 R1(config)# ^Z R1# R1# show ip ssh SSH Enabled - version 2.0 Authentication timeout: 60 secs; Authentication retries: 2 R1# © 2009 Cisco Learning Institute. 13
  • 14. Connecting to the Router There are two different ways to connect to an SSH-enabled router: 1 There are no current SSH sessions ongoing with R1. - Connect using an SSH-enabled Cisco R1# sho ssh %No SSHv2 server connections running. router %No SSHv1 server connections running. R1# - Connect using an SSH client running on a host. 2 R2 establishes an SSH connection with R1. R2# ssh -l Bob 192.168.2.101 Password: R1> 3 There is an incoming and outgoing SSHv2 session user Bob. R1# sho ssh Connection Version Mode Encryption Hmac State Username 0 2.0 IN aes128-cbc hmac-sha1 Session started Bob 0 2.0 OUT aes128-cbc hmac-sha1 Session started Bob %No SSHv1 server connections running. R1# © 2009 Cisco Learning Institute. 14
  • 15. Using SDM 1. Choose Configure > Additional Tasks > Router Access > SSH 2. Possible status options: - RSA key is not set on this router - RSA key is set on this router 3. Enter a modulus size and generate a key, if there is 4. To configure SSH on the vty lines, no key configured choose Configure > Additional Tasks > Router Access > VTY © 2009 Cisco Learning Institute. 15
  • 16. Configuring for Privilege Levels • By default: - User EXEC mode (privilege level 1) - Privileged EXEC mode (privilege level 15) • Sixteen privilege levels available • Methods of providing privileged level access infrastructure access: - Privilege Levels - Role-Based CLI Access Config AAA, Show, Firewall, IDS/IPS, NetFlow © 2009 Cisco Learning Institute. 16
  • 17. Privilege CLI Command router(config)# privilege mode {level level command | reset command} Command Description mode Specifies the configuration mode. Use the privilege ? command to see a complete list of router configuration modes available level (Optional) Enables setting a privilege level with a specified command level command (Optional) The privilege level associated with a command (specify up to 16 privilege levels, using numbers 0 to 15) reset (Optional) Resets the privilege level of a command Command (Optional) Resets the privilege level © 2009 Cisco Learning Institute. 17
  • 18. Privilege Levels for Users R1# conf t R1(config)# username USER privilege 1 secret cisco R1(config)# R1(config)# privilege exec level 5 ping R1(config)# enable secret level 5 cisco5 R1(config)# username SUPPORT privilege 5 secret cisco5 R1(config)# R1(config)# privilege exec level 10 reload R1(config)# enable secret level 10 cisco10 R1(config)# username JR-ADMIN privilege 10 secret cisco10 R1(config)# R1(config)# username ADMIN privilege 15 secret cisco123 R1(config)# • A USER account with normal, Level 1 access. • A SUPPORT account with Level 1 and ping command access. • A JR-ADMIN account with the same privileges as the SUPPORT account plus access to the reload command. • An ADMIN account which has all of the regular privileged EXEC commands. © 2009 Cisco Learning Institute. 18
  • 19. Privilege Levels The enable level command is used to switch R1> enable 5 from Level 1 to Level 5 Password: R1# <cisco5> R1# show privilege The show privilege command displays Current privilege level is 5 The current privilege level R1# R1# reload Translating "reload" The user cannot us the reload command Translating "reload" % Unknown command or computer name, or unable to find computer address R1# © 2009 Cisco Learning Institute. 19
  • 20. Privilege Level Limitations • There is no access control to specific interfaces, ports, logical interfaces, and slots on a router • Commands available at lower privilege levels are always executable at higher levels. • Commands specifically set on a higher privilege level are not available for lower-privileged users. • Assigning a command with multiple keywords to a specific privilege level also assigns any commands associated with the first keywords to the same privilege level. © 2009 Cisco Learning Institute. 20
  • 21. Role-Based CLI • Controls which commands are available to specific roles • Different views of router configurations created for different users providing: - Security: Defines the set of CLI commands that is accessible by a particular user by controlling user access to configure specific ports, logical interfaces, and slots on a router - Availability: Prevents unintentional execution of CLI commands by unauthorized personnel - Operational Efficiency: Users only see the CLI commands applicable to the ports and CLI to which they have access © 2009 Cisco Learning Institute. 21
  • 22. Role-Based Views • Root View To configure any view for the system, the administrator must be in the root view. Root view has all of the access privileges as a user who has level 15 privileges. • CLI View A specific set of commands can be bundled into a “CLI view”. Each view must be assigned all commands associated with that view and there is no inheritance of commands from other views. Additionally, commands may be reused within several views. • Superview Allow a network administrator to assign users and groups of users multiple CLI views at once instead of having to assign a single CLI view per user with all commands associated to that one CLI view. © 2009 Cisco Learning Institute. 22
  • 23. Role-Based Views © 2009 Cisco Learning Institute. 23
  • 24. Creating and Managing a View 1. Enable aaa with the global configuration command aaa new- model. Exit, and enter the root view with the command enable view command. 2. Create a view using the parser view view-name command. 3. Assign a secret password to the view using the secret encrypted-password command. 4. Assign commands to the selected view using the parser-mode {include | include-exclusive | exclude} [all] [interface interface-name | command] command in view configuration mode. 5. Exit the view configuration mode by typing the command exit. © 2009 Cisco Learning Institute. 24
  • 25. View Commands router# enable [view [view-name]] Command is used to enter the CLI view. Parameter Description view Enters view, which enables users to configure CLI views. This keyword is required if you want to configure a CLI view. view-name (Optional) Enters or exits a specified CLI view. This keyword can be used to switch from one CLI view to another CLI view. router(config)# parser view view-name Creates a view and enters view configuration mode. router(config-view)# secret encrypted-password • Sets a password to protect access to the View. • Password must be created immediately after creating a view © 2009 Cisco Learning Institute. 25
  • 26. Creating and Managing a Superview 1. Create a view using the parser view view- name superview command and enter superview configuration mode. 2. Assign a secret password to the view using the secret encrypted-password command. 3. Assign an existing view using the view view- name command in view configuration mode. 4. Exit the superview configuration mode by typing the command exit. © 2009 Cisco Learning Institute. 26
  • 27. Running Config “Views” © 2009 Cisco Learning Institute. 27
  • 28. Running Config “SUPERVIEWS” © 2009 Cisco Learning Institute. 28
  • 29. Verifying a View R1# show parser view No view is active ! Currently in Privilege Level Context R1# R1# enable view Password: *Mar 1 10:38:56.233: %PARSER-6-VIEW_SWITCH: successfully set to view 'root'. R1# R1# show parser view Current view is 'root' R1# R1# show parser view all Views/SuperViews Present in System: SHOWVIEW VERIFYVIEW © 2009 Cisco Learning Institute. 29
  • 30. Resilient Configuration Facts • The configuration file in the primary bootset is a copy of the running configuration that was in the router when the feature was first enabled. • The feature secures the smallest working R1# erase R1# erase set of files to preserve persistent storage startup-config startup-config Erasing the Erasing the space. No extra space is required to nvram filesystem nvram filesystem will remove all will remove all secure the primary IOS image file. configuration configuration files! Continue? files! Continue? [confirm] [confirm] • The feature automatically detects image or configuration version mismatch. • Only local storage is used for securing files. • The feature can be disabled only through a console session. © 2009 Cisco Learning Institute. 30
  • 31. CLI Commands router(config)# secure boot-image  Enables Cisco IOS image resilience. Prevents the IOS image from being deleted by a malicious user. router(config)# secure boot-config  Takes a snapshot of the router running configuration and securely archives it in persistent storage. © 2009 Cisco Learning Institute. 31
  • 32. Restoring Primary bootset To restore a primary bootset from a secure archive: 1. Reload the router using the reload command. 2. From ROMMON mode, enter the dir command to list the contents of the device that contains the secure bootset file. The device name can be found in the output of the show secure bootset command. 3. Boot up the router using the secure bootset image using the boot command with the filename found in step 2. Once the compromised router boots, proceed to privileged EXEC mode and restore the configuration. 4. Enter global configuration mode using conf t. 5. Restore the secure configuration to the supplied filename using the secure boot-config restore filename. © 2009 Cisco Learning Institute. 32
  • 33. Password Recovery Procedures 1. Connect to the console port. 2. Use the show version command to view and record the configuration register 3. Use the power switch to turn off the router, and then turn the router back on. 4. Press Break on the terminal keyboard within 60 seconds of power up to put the router into ROMmon. 5. At the rommon 1> prompt Type config 0x2142. 6. Type reset at the rommon 2> prompt. The router reboots, but ignores the saved configuration. 7. Type no after each setup question, or press Ctrl-C to skip the initial setup procedure. 8. Type enable at the Router> prompt. © 2009 Cisco Learning Institute. 33
  • 34. Password Recovery Procedures, 2 9. Type copy startup-config running-config to copy the NVRAM into memory. 10. Type show running-config. 11. Enter global configuration and type the enable secret command to change the enable secret password. 12. Issue the no shutdown command on every interface to be used. Once enabled, issue a show ip interface brief command. Every interface to be used should display ‘up up’. 13. Type config-register configuration_register_setting. The configuration_register_setting is either the value recorded in Step 2 or 0x2102 . 14. Save configuration changes using the copy running-config startup-config command. © 2009 Cisco Learning Institute. 34
  • 35. Preventing Password Recovery R1(config)# no service password-recovery WARNING: Executing this command will disable password recovery mechanism. Do not execute this command without another plan for password recovery. Are you sure you want to continue? [yes/no]: yes R1(config) R1# sho run Building configuration... Current configuration : 836 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption no service password-recovery System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 2006 by cisco Systems, Inc. PLD version 0x10 GIO ASIC version 0x127 c1841 platform with 131072 Kbytes of main memory Main memory is configured to 64 bit mode with parity disabled PASSWORD RECOVERY FUNCTIONALITY IS DISABLED program load complete, entry point: 0x8000f000, size: 0xcb80 © 2009 Cisco Learning Institute. 35
  • 36. Implementing Secure Management • Configuration Change Management - Know the state of critical network devices - Know when the last modifications occurred - Ensure the right people have access when new management methodologies are adopted - Know how to handle tools and devices no longer used • Automated logging and reporting of information from identified devices to management hosts • Available applications and protocols like SNMP © 2009 Cisco Learning Institute. 36
  • 37. Secure Management and Reporting • When logging and managing information, the information flow between management hosts and the managed devices can take two paths: - Out-of-band (OOB): Information flows on a dedicated management network on which no production traffic resides. - In-band: Information flows across an enterprise production network, the Internet, or both using regular data channels. © 2009 Cisco Learning Institute. 37
  • 38. Factors to Consider • OOB management appropriate for large enterprise networks • In-band management recommended in smaller networks providing a more cost-effective security deployment • Be aware of security vulnerabilities of using remote management tools with in-band management © 2009 Cisco Learning Institute. 38
  • 39. Using Syslog • Implementing Router Logging • Syslog • Configuring System Logging • Enabling Syslog using SDM/CCP © 2009 Cisco Learning Institute. 39
  • 40. Implementing Router Logging Configure the router to send log messages to: • Console: Console logging is used when modifying or testing the router while it is connected to the console. Messages sent to the console are not stored by the router and, therefore, are not very valuable as security events. • Terminal lines: Configure enabled EXEC sessions to receive log messages on any terminal lines. Similar to console logging, this type of logging is not stored by the router and, therefore, is only valuable to the user on that line. © 2009 Cisco Learning Institute. 40
  • 41. Implementing Router Logging • Buffered logging: Store log messages in router memory. Log messages are stored for a time, but events are cleared whenever the router is rebooted. • SNMP traps: Certain thresholds can be preconfigured. Events can be processed by the router and forwarded as SNMP traps to an external SNMP server. Requires the configuration and maintenance of an SNMP system. • Syslog: Configure routers to forward log messages to an external syslog service. This service can reside on any number of servers, including Microsoft Windows and UNIX-based systems, or the Cisco Security MARS appliance. © 2009 Cisco Learning Institute. 41
  • 42. Syslog • Syslog servers: Known as log hosts, these systems accept and process log messages from syslog clients. • Syslog clients: Routers or other types of equipment that generate and forward log messages to syslog servers. Public Web Mail Administrator Server Server Server 10.2.2.3 10.2.2.4 10.2.2.5 Syslog Client e0/0 10.2.1.1 R3 e0/1 DMZ LAN 10.2.2.0/24 e0/2 10.2.2.1 10.2.3.1 Syslog Server 10.2.3.2 Protected LAN User 10.2.3.3 10.2.3.0/24 © 2009 Cisco Learning Institute. 42
  • 43. Configuring System Logging Turn logging on and off using the logging buffered, logging monitor, and logging commands 1. Set the destination logging host R3(config)# logging 10.2.2.6 R3(config)# logging trap informational 2. Set the log severity (trap) level R3(config)# logging source-interface loopback 0 R3(config)# logging on 3. Set the source interface 4. Enable logging © 2009 Cisco Learning Institute. 43
  • 44. Enabling Syslog Using SDM/CCP 1. Choose Configure > Additional Tasks > Router Properties > Logging 2. Click Edit 3. Check Enable Logging Level and choose the desired logging level 4. Click Add, and enter an IP address of a logging host 5. Click OK © 2009 Cisco Learning Institute. 44
  • 45. Monitor Logging with SDM 1. Choose Monitor > Logging 2. See the logging hosts to which the router logs messages 3. Choose the minimum severity level 4. Monitor the messages, update the screen to show the most current log entries, and clear all syslog messages from the router log buffer © 2009 Cisco Learning Institute. 45
  • 46. Monitor Logging Remotely • Logs can easily be viewed through the SDM, or for easier use, through a syslog viewer on any remote system. • There are numerous Free remote syslog viewers, Kiwi is relatively basic and free. • Configure the router/switch/etc to send logs to the PC’s ip address that has kiwi installed. • Kiwi automatically listens for syslog messages and displays them. © 2009 Cisco Learning Institute. 46
  • 47. SNMP • Developed to manage nodes, such as servers, workstations, routers, switches, hubs, and security appliances on an IP network • All versions are Application Layer protocols that facilitate the exchange of management information between network devices • Part of the TCP/IP protocol suite • Enables network administrators to manage network performance, find and solve network problems, and plan for network growth • Three separate versions of SNMP © 2009 Cisco Learning Institute. 47
  • 48. Community Strings A text string that can authenticate messages between a management station and an SNMP agent and allow access to the information in MIBs Provides read-only access to all objects in the MIB except the community strings. Provides read-write access to all objects in the MIB except the community strings. © 2009 Cisco Learning Institute. 48
  • 49. SNMPv3 Transmissions from manager to agent may be authenticated to NMS guarantee the identity of the sender and the integrity and timeliness of a message. Managed Node Managed Encrypted Tunnel Node Messages may be Managed encrypted to ensure Node privacy Agent may enforce access control to restrict each principal to certain actions on certain Managed NMS portions of its data. Node © 2009 Cisco Learning Institute. 49
  • 50. Security Levels • noAuth: Authenticates a packet by a string match of the username or community string • auth: Authenticates a packet by using either the Hashed Message Authentication Code (HMAC) with Message Digest 5 (MD5) method or Secure Hash Algorithms (SHA) method. • Priv: Authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and encrypts the packet using the Data Encryption Standard (DES), Triple DES (3DES), or Advanced Encryption Standard (AES) algorithms. © 2009 Cisco Learning Institute. 50
  • 51. Trap Receivers 1. Click Edit 3. Enter the IP address or the hostname of the trap receiver and the 2. Click Add password 5. To edit or delete an existing trap receiver, choose a trap receiver from the trap receiver list and click Edit or Delete 6. When the trap receiver list 4. Click OK © 2009 Cisco Learning Institute. is complete, click OK 51
  • 52. Using NTP • Clocks on hosts and network devices must be maintained and synchronized to ensure that log messages are synchronized with one another • The date and time settings of the router can be set using one of two methods: - Manually edit the date and time - Configure Network Time Protocol © 2009 Cisco Learning Institute. 52
  • 53. Timekeeping • Pulling the clock time from the Internet means that unsecured packets are allowed through the firewall • Many NTP servers on the Internet do not require any authentication of peers • Devices are given the IP address of NTP masters. In an NTP configured network, one or more routers are designated as the master clock keeper (known as an NTP Master) using the ntp master global configuration command. • NTP clients either contact the master or listen for messages from the master to synchronize their clocks. To contact the server, use the ntp server ntp-server-address command. • In a LAN environment, NTP can be configured to use IP broadcast messages instead, by using the ntp broadcast client command. © 2009 Cisco Learning Institute. 53
  • 54. Features/Functions • There are two security mechanisms available: - An ACL-based restriction scheme - An encrypted authentication mechanism such as offered by NTP version 3 or higher • Implement NTP version 3 or higher. Use the following commands on both NTP Master and the NTP client. - ntp authenticate - ntp authentication key md5 value - ntp trusted-key key-value © 2009 Cisco Learning Institute. 54
  • 55. Enabling NTP 1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP 2. Click Add 3. Add an NTP server by name or by IP address 5. Check Prefer if this NTP server is a 4. Choose the interface preferred server (more that the router will use than one is allowed) to communicate with the NTP server 6. If authentication is used, check Authentication Key and enter the key 7. Click OK number, the key value, and confirm the key value. © 2009 Cisco Learning Institute. 55
  • 56. Security Practices • Determine what devices should use CDP • To ensure a device is secure: - Disable unnecessary services and interfaces - Disable and restrict commonly configured management services, such as SNMP - Disable probes and scans, such as ICMP - Ensure terminal access security - Disable gratuitous and proxy Address Resolution Protocol (ARP) - Disable IP-directed broadcast © 2009 Cisco Learning Institute. 56
  • 57. SDM Security Audit Perform Security Audit letting the administrator choose configuration changes to implement One-Step Lockdown automatically makes all recommended security-related configuration changes © 2009 Cisco Learning Institute. 57
  • 58. Security Audit Wizard Compares router configuration against recommended settings: • Shut down unneeded servers • Disable unneeded services • Apply the firewall to the outside interfaces • Disable or harden SNMP • Shut down unused interfaces • Check password strength • Enforce the use of ACLs © 2009 Cisco Learning Institute. 58
  • 59. Cisco AutoSecure • Initiated from CLI and executes a script. The AutoSecure feature first makes recommendations for fixing security vulnerabilities, and then modifies the security configuration of the router. • Can lockdown the management plane functions and the forwarding plane services and functions of a router • Used to provide a baseline security policy on a new router © 2009 Cisco Learning Institute. 59
  • 60. Auto Secure Command • Command to enable the Cisco AutoSecure feature setup: auto secure [no-interact] • In Interactive mode, the router prompts with options to enable and disable services and other security features. This is the default mode but can also be configured using the auto secure full command. © 2009 Cisco Learning Institute. 60
  • 61. Auto Secure Command router# auto secure [no-interact | full] [forwarding | management ] [ntp | login | ssh | firewall | tcp-intercept] R1# auto secure ? firewall AutoSecure Firewall forwarding Secure Forwarding Plane full Interactive full session of AutoSecure login AutoSecure Login management Secure Management Plane no-interact Non-interactive session of AutoSecure ntp AutoSecure NTP ssh AutoSecure SSH tcp-intercept AutoSecure TCP Intercept <cr> R1# © 2009 Cisco Learning Institute. 61
  • 62. Cisco One-step Lockdown Tests router configuration for any potential security problems and automatically makes the necessary configuration changes to correct any problems found © 2009 Cisco Learning Institute. 62
  • 63. AutoSecure Versus SDM Security Audit One-Step Lockdown R1# auto secure --- AutoSecure Configuration --- *** AutoSecure configuration enhances the security of the router, but it will not make it absolutely resistant to all security attacks *** AutoSecure will modify the configuration of your device. All configuration changes will be shown. For a detailed explanation of how the configuration changes enhance security and any possible side effects, please refer to Cisco.com for Autosecure documentation. SDM implements some the Cisco AutoSecure also: following features differently: • Disables NTP • SNMP is disabled but will not • Configures AAA configure SNMPv3 • Sets SPD values • SSH is enabled and configured with • Enables TCP intercepts images that support this feature. • Configures anti-spoofing ACLs on • Secure Copy Protocol (SCP) is not outside-facing interfaces enabled--unsecure FTP is. © 2009 Cisco Learning Institute. 63
  • 64. © 2009 Cisco Learning Institute. 64

Notas do Editor

  1. The default configuration file that ships with a Cisco SDM-enabled router automatically enables Telnet and SSH access from the LAN interface and generates an RSA key.
  2. Remember, t he aaa-new model command must be configured prior to entering a view.
  3. However, if the logging on command is disabled, no messages will be sent to these destinations. Only the console will receive messages.