Enterprise Network Security

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
Enterprise Network Security Accessing the WAN Lecture week 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Copyright 2003 CCNA 3 Chapter 7 Switch Configuration By Your Name.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Operating Cisco IOS Software
LAN Switching and Wireless – Chapter 2
Implementing IP Addressing Services Accessing the WAN – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Basic Switch Concepts and Configuration Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Chapter 4: Implementing Firewall Technologies
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2002, Cisco Systems, Inc. All rights reserved..
Configuring and Testing Your Network Network Fundamentals.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
LAN Switching and Wireless – Chapter 2
Configuring Network Devices
Enterprise Network Security
Instructor Materials Chapter 5: Network Security and Monitoring
© 2002, Cisco Systems, Inc. All rights reserved.
© 2002, Cisco Systems, Inc. All rights reserved.
Working at a Small-to-Medium Business or ISP – Chapter 8
Operating & Configuring a Cisco IOS Device
Secure Software Confidentiality Integrity Data Security Authentication
CCNA 3 v3.1 Module 6 Switch Configuration
Chapter 10: DHCP Routing & Switching Chapter 10: DHCP
Configuring and Testing Your Network
Chapter 2: Introduction to Switched Networks
Chapter 5: Network Security and Monitoring
Implementing IP Addressing Services
Configuring Network Devices
LAN Switching and Wireless – Chapter 2
Enterprise Network Security
– Chapter 3 – Device Security (B)
Implementing IP Addressing Services
LAN Switching and Wireless – Chapter 2
Securing Windows 7 Lesson 10.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Network Troubleshooting
Enterprise Network Security
Presentation transcript:

Enterprise Network Security Accessing the WAN – Chapter 4

Objectives Describe the general methods used to mitigate security threats to Enterprise networks Configure Basic Router Security Explain how to disable unused Cisco router network services and interfaces Explain how to use Cisco SDM Manage Cisco IOS devices

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common security threats and how they impact enterprises

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common types of network attacks and how they impact enterprises

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the common mitigation techniques that enterprises use to protect themselves against threats

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the concept of the Network Security Wheel

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the goals of a comprehensive security policy in an organization

Configure Basic Router Security Explain why the security of routers and their configuration settings is vital to network operation

Configure Basic Router Security Describe the recommended approach to applying Cisco IOS security features on network routers

Configure Basic Router Security Describe the basic security measures needed to secure Cisco routers

Explain How to Disable Unused Cisco Router Network Services and Interfaces Describe the router services and interfaces that are vulnerable to network attack

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain the vulnerabilities posed by commonly configured management services

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain how to secure a router with the command-line interface (CLI) auto secure command

Explain How to Use Cisco SDM Provide an overview of Cisco SDM

Explain How to Use Cisco SDM Explain the steps to configure a router to use Cisco SDM

Explain How to Use Cisco SDM Explain the steps you follow to start SDM

Explain How to Use Cisco SDM Describe the Cisco SDM Interface

Explain How to Use Cisco SDM Describe the commonly used Cisco SDM wizards

Explain How to Use Cisco SDM Explain how to use Cisco SDM for locking down your router

Manage Cisco IOS Devices Describe the file systems used by a Cisco router

Manage Cisco IOS Devices Describe how to backup and upgrade a Cisco IOS image

Manage Cisco IOS Devices Explain how to back up and upgrade Cisco IOS software images using a network server

Manage Cisco IOS Devices Explain how to recover a Cisco IOS software image

Manage Cisco IOS Devices Compare the use of the show and debug commands when troubleshooting Cisco router configurations

Manage Cisco IOS Devices Explain how to recover the enable password and the enable secret passwords

Summary Security Threats to an Enterprise network include: Unstructured threats Structured threats External threats Internal threats Methods to lessen security threats consist of: Device hardening Use of antivirus software Firewalls Download security updates

Summary Basic router security involves the following: Physical security Update and backup IOS Backup configuration files Password configuration Logging router activity Disable unused router interfaces & services to minimize their exploitation by intruders Cisco SDM A web based management tool for configuring security measures on Cisco routers

Summary Cisco IOS Integrated File System (IFS) Allows for the creation, navigation & manipulation of directories on a cisco device