© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Troubleshooting Accessing the WAN – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
Enterprise Network Security Accessing the WAN Lecture week 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Characterizing the Existing Network Designing and Supporting Computer Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Frame Relay Accessing the WAN – Chapter 3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Frame Relay Accessing the WAN – Chapter 3.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Operating Cisco IOS Software
LAN Switching and Wireless – Chapter 2
Implementing IP Addressing Services Accessing the WAN – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Basic Switch Concepts and Configuration Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring and Testing Your Network Network Fundamentals – Chapter.
Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Chapter 4: Implementing Firewall Technologies
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
© 2002, Cisco Systems, Inc. All rights reserved..
LAN Switching and Wireless – Chapter 2
Configuring Network Devices
Enterprise Network Security
© 2002, Cisco Systems, Inc. All rights reserved.
Working at a Small-to-Medium Business or ISP – Chapter 8
Operating & Configuring a Cisco IOS Device
Enterprise Network Security
Implementing IP Addressing Services
Configuring Network Devices
LAN Switching and Wireless – Chapter 2
Enterprise Network Security
LAN Switching and Wireless – Chapter 2
Enterprise Network Security
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 2 Objectives  Describe the general methods used to mitigate security threats to Enterprise networks  Configure Basic Router Security  Explain how to disable unused Cisco router network services and interfaces  Explain how to use Cisco SDM  Manage Cisco IOS devices

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 3 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 4 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common security threats and how they impact enterprises

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 5 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common types of network attacks and how they impact enterprises

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 6 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the common mitigation techniques that enterprises use to protect themselves against threats

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 7 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the concept of the Network Security Wheel

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 8 Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the goals of a comprehensive security policy in an organization

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 9 Configure Basic Router Security  Explain why the security of routers and their configuration settings is vital to network operation

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 10 Configure Basic Router Security  Describe the recommended approach to applying Cisco IOS security features on network routers

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 11 Configure Basic Router Security  Describe the basic security measures needed to secure Cisco routers

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 12 Explain How to Disable Unused Cisco Router Network Services and Interfaces  Describe the router services and interfaces that are vulnerable to network attack

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 13 Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain the vulnerabilities posed by commonly configured management services

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 14 Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain how to secure a router with the command-line interface (CLI) auto secure command

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 15 Explain How to Use Cisco SDM  Provide an overview of Cisco SDM

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 16 Explain How to Use Cisco SDM  Explain the steps to configure a router to use Cisco SDM

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 17 Explain How to Use Cisco SDM  Explain the steps you follow to start SDM

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 18 Explain How to Use Cisco SDM  Describe the Cisco SDM Interface

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 19 Explain How to Use Cisco SDM  Describe the commonly used Cisco SDM wizards

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 20 Explain How to Use Cisco SDM  Explain how to use Cisco SDM for locking down your router

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 21 Manage Cisco IOS Devices  Describe the file systems used by a Cisco router

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 22 Manage Cisco IOS Devices  Describe how to backup and upgrade a Cisco IOS image

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 23 Manage Cisco IOS Devices  Explain how to back up and upgrade Cisco IOS software images using a network server

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 24 Manage Cisco IOS Devices  Explain how to recover a Cisco IOS software image

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 25 Manage Cisco IOS Devices  Compare the use of the show and debug commands when troubleshooting Cisco router configurations

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 26 Manage Cisco IOS Devices  Explain how to recover the enable password and the enable secret passwords

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 27 Summary  Security Threats to an Enterprise network include: –Unstructured threats –Structured threats –External threats –Internal threats  Methods to lessen security threats consist of: –Device hardening –Use of antivirus software –Firewalls –Download security updates

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 28 Summary  Basic router security involves the following: –Physical security –Update and backup IOS –Backup configuration files –Password configuration –Logging router activity  Disable unused router interfaces & services to minimize their exploitation by intruders  Cisco SDM –A web based management tool for configuring security measures on Cisco routers

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 29 Summary  Cisco IOS Integrated File System (IFS) –Allows for the creation, navigation & manipulation of directories on a cisco device

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 30