© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)

Slides:



Advertisements
Similar presentations
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

Access Control List (ACL)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Implementing Secure Converged Wide Area Networks (ISCW)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Chapter 9: Access Control Lists
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
Implementing a Highly Available Network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 1 Implementing Secure Converged Wide Area Networks (ISCW)
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L6 1 Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
2010 Cisco Configuration Elements APRICOT 2010 Kuala Lumpur, Malaysia.
© 2002, Cisco Systems, Inc. All rights reserved..
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Access Control List ACL. Access Control List ACL.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements.
Cisco Configuration Elements Network Monitoring and Management Tutorial.
User Access to Router Securing Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Module 10: How Middleboxes Impact Performance
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Carlos Armas Roundtrip Networks Hervey Allen NSRC.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
 Router Configurations part1 2 nd semester
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Instructor Materials Chapter 5: Network Security and Monitoring
Instructor Materials Chapter 7: Access Control Lists
100% Exam Passing Guarantee & Money Back Assurance
Working at a Small-to-Medium Business or ISP – Chapter 8
Introduction to Networking
NAT , Device Discovery Chapter 9 , chapter 10.
Chapter 5: Network Security and Monitoring
– Chapter 3 – Device Security (B)
Chapter 8: Monitoring the Network
– Chapter 3 – Device Security (B)
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 2 Lesson 8 – Module 5 – ‘Cisco Device Hardening’ Securing Management and Reporting Features

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 3 Module Introduction  The open nature of the Internet makes it increasingly important for businesses to pay attention to the security of their networks. As organisations move more of their business functions to the public network, they need to take precautions to ensure that attackers do not compromise their data, or that the data does not end up being accessed by the wrong people.  Unauthorised network access by an outside hacker or disgruntled employee can wreak havoc with proprietary data, negatively affect company productivity, and stunt the ability to compete.  Unauthorised network access can also harm relationships with customers and business partners who may question the ability of companies to protect their confidential information, as well as lead to potentially damaging and expensive legal actions.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 4 Objectives  At the completion of this eighth lesson, you will be able to: Describe and demonstrate how to set up syslog reporting for a large network Demonstrate the importance of secure channels for syslog information Describe the difference between inband and out-of-band reporting Read and analyse syslog reports

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 5 Secure Management and Reporting Planning Considerations  Configuring logging for Cisco routers is a straightforward operation when the network contains only a few Cisco routers. However, logging and reading information from hundreds of devices can be a challenging proposition. Too much information can be as bad as too little information and can raise these important questions: Which are the most important logs? How are important messages separated from routine notifications? How do you prevent tampering with logs? How do you make sure time stamps match? What log data is needed in criminal investigations? How do you deal with the volume of log messages? How do you manage all the devices? How can you track changes when attacks or network failures occur?

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 6 Secure Management and Reporting Architecture

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 7 Information Paths  Information flow between management hosts and the managed devices can take two paths: In-band: Information flows across the enterprise production network or the Internet (or both) Out of Band (OOB): Information flows within a network on which no production traffic resides

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 8 Information Paths

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 9 In-Band Management Considerations  Some questions that must be considered when designing an in-band management solution: Which management protocols does each device support? Does the management channel need to be active at all times? Is SNMP necessary?

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 10 Secure Management and Reporting Guidelines  In-band management guidelines: Apply only to devices needing to be managed or monitored. Use IPsec when possible. Use SSH or SSL instead of Telnet. Decide whether the management channel needs to be open at all times. Keep clocks on hosts and network devices synchronised. Record changes and archive configurations.  OOB management guidelines: Provide highest level of security and mitigate the risk of passing insecure management protocols over the production network. Keep clocks on hosts and network devices synchronised. Record changes and archive configurations.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 11 Configuring an SSH Server for Secure Management and Reporting  Austin2#configure terminal Austin2(config)#ip domain-name cisco.com Austin2(config)#crypto key generate rsa general-keys modulus 1024  Sept 22 13:20:45: %SSH-5-ENABLED: SSH 1.5 has been enabled  Austin2(config)#ip ssh timeout 120 Austin2(config)#ip ssh authentication-retries 4 Austin2(config)#line vty 0 4 Austin2(config-line)#no transport input telnet Austin2(config-line)#transport input ssh Austin2(config-line)#end 1.Configure the IP domain name. 2.Generate the RSA keys. 3.(Optional) Display generated keys. 4.Configure the SSH timeout interval. 5.Configure the SSH retries. 6.Disable vty inbound Telnet sessions. 7.Enable vty inbound SSH sessions.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 12 Implementing Log Messaging for Security  Routers should be configured to send log messages to one or more of these: Console Terminal lines Memory buffer SNMP traps Syslog  Syslog logging is a key security policy component

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 13 Syslog Systems Syslog server: A host that accepts and processes log messages from one or more syslog clients Syslog client: A host that generates log messages and forwards them to a syslog server

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 14 Cisco Log Severity Levels Syslog Level and NameDefinitionExample 0 LOG_EMERGA panic condition normally broadcast to all users Cisco IOS software could not load 1 LOG_ALERTA condition that should be corrected immediately, such as a corrupted system database Temperature too high 2 LOG_CRITCritical conditions; for example, hard device errors Unable to allocate memory 3 LOG_ERRErrorsInvalid memory size 4 LOG_WARNINGWarning messagesCrypto operation failed 5 LOG_NOTICEConditions that are not error conditions but should possibly be handled specially Interface changed state, up or down 6 LOG_INFOInformational messagesPacket denied by ACL 7 LOG_DEBUGMessages that contain information that is normally used only when debugging a program Packet type invalid

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 15 Log Message Format Oct 29 10:00:01 EST: %SYS-5-CONFIG_I: Configured from console by vty0 ( ) Time Stamp Log Message Name and Severity Level Message Text Note: The log message name is not the same as a severity level name.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 16 Configuring Syslog Step 1 ParameterDescription host-name The name of the host you want to use as a syslog server ip-address The IP address of the host you want to use as a syslog server Router(config)# logging [host-name | ip-address] 1.Sets the destination logging host

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 17 Configuring Syslog Step 2 ParameterDescription level Limits the logging of messages to the syslog servers to a specified level. You can enter the level number (0 to 7) or level name. Router(config)# logging trap level 2.(Optional) Sets the log severity (trap) level

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 18 Configuring Syslog Step 3 ParameterDescription facility-type The syslog facility type (local0 to local7) Router(config)# logging facility facility-type 3.(Optional) Sets the syslog facility

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 19 Configuring Syslog Steps 4 and 5 Router(config)# logging source-interface interface-type interface-number 4.(Optional) Sets the source interface ParameterDescription interface-type The interface type (for example, Ethernet) interface-number The interface number (for example, 0/1) Router(config)# logging on 5.Enables logging

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 20 Syslog Implementation Example R3(config)#logging R3(config)#logging trap informational R3(config)#logging source-interface loopback 0 R3(config)#logging on

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 21