Podcast
Questions and Answers
Which security approach involves multiple layers of security devices, such as routers and firewalls, to protect the network?
Which security approach involves multiple layers of security devices, such as routers and firewalls, to protect the network?
- Single Router Approach
- DMZ Approach
- Perimeter Security Approach
- Defense in Depth Approach (correct)
What is the recommended minimum length for strong passwords?
What is the recommended minimum length for strong passwords?
- 12 characters
- 8 characters
- 6 characters
- 10 characters (correct)
Which of the following commands is used to enable password encryption on a Cisco router?
Which of the following commands is used to enable password encryption on a Cisco router?
- `password encryption enable`
- `service password-encryption` (correct)
- `enable secret password`
- `encrypt all passwords`
Which algorithm type is NOT an option for the enable algorithm-type
command when configuring secret passwords?
Which algorithm type is NOT an option for the enable algorithm-type
command when configuring secret passwords?
When configuring line access security, which command is used to specify that only SSH connections are allowed?
When configuring line access security, which command is used to specify that only SSH connections are allowed?
What is the purpose of implementing delays between successive login attempts?
What is the purpose of implementing delays between successive login attempts?
Which command is used to configure the number of failed login attempts before a user is blocked?
Which command is used to configure the number of failed login attempts before a user is blocked?
What action does the crypto key zeroize rsa
command perform?
What action does the crypto key zeroize rsa
command perform?
Which CLI mode is required to configure privilege levels?
Which CLI mode is required to configure privilege levels?
What is the range of privilege levels that can be customized for user-level privileges?
What is the range of privilege levels that can be customized for user-level privileges?
What is a key limitation of privilege levels regarding command execution?
What is a key limitation of privilege levels regarding command execution?
What does role-based CLI access primarily control?
What does role-based CLI access primarily control?
What is the primary function of the Cisco IOS Resilient Configuration feature?
What is the primary function of the Cisco IOS Resilient Configuration feature?
What type of storage does the Cisco IOS Resilient Configuration feature use for securing files?
What type of storage does the Cisco IOS Resilient Configuration feature use for securing files?
What is the default severity level for informational syslog messages?
What is the default severity level for informational syslog messages?
What does the logging trap level
command configure?
What does the logging trap level
command configure?
What security practice should be applied during security audits to discovery protocols such as CDP and LLDP?
What security practice should be applied during security audits to discovery protocols such as CDP and LLDP?
Which automated security tool can be used on Cisco IOS-based routers to enhance security settings?
Which automated security tool can be used on Cisco IOS-based routers to enhance security settings?
What is the primary consequence of routing protocol spoofing?
What is the primary consequence of routing protocol spoofing?
When configuring OSPF authentication, which command is used to specify the SHA authentication key?
When configuring OSPF authentication, which command is used to specify the SHA authentication key?
A single router approach to network security involves multiple firewalls and routers to protect the internal network.
A single router approach to network security involves multiple firewalls and routers to protect the internal network.
Physical security, router operating system security, and router hardening are key areas of router security.
Physical security, router operating system security, and router hardening are key areas of router security.
Restricting device accessibility is not an important step in securing administrative access.
Restricting device accessibility is not an important step in securing administrative access.
It is recommended to use passwords shorter than 8 characters for better memorization.
It is recommended to use passwords shorter than 8 characters for better memorization.
The command service password-encryption
encrypts all passwords in the router's configuration file.
The command service password-encryption
encrypts all passwords in the router's configuration file.
Secret passwords of type 8 or 9 are less secure compared to type 7 passwords.
Secret passwords of type 8 or 9 are less secure compared to type 7 passwords.
Using the login local
command on a line requires a locally defined username and password.
Using the login local
command on a line requires a locally defined username and password.
Implementing delays between successive login attempts can help mitigate brute-force attacks.
Implementing delays between successive login attempts can help mitigate brute-force attacks.
The command login block-for 60 attempts 3 within 10
blocks login attempts for 60 seconds after 3 failed attempts within 10 seconds.
The command login block-for 60 attempts 3 within 10
blocks login attempts for 60 seconds after 3 failed attempts within 10 seconds.
Configuring SSH involves generating RSA keys and enabling SSH on VTY lines.
Configuring SSH involves generating RSA keys and enabling SSH on VTY lines.
Administrative privilege levels are configured to restrict command availability.
Administrative privilege levels are configured to restrict command availability.
Privilege level 15 is the user EXEC mode, with limited privileges.
Privilege level 15 is the user EXEC mode, with limited privileges.
Role-Based CLI Access allows administrators to create custom views with specific command sets.
Role-Based CLI Access allows administrators to create custom views with specific command sets.
Commands set at higher privilege levels are executable by users at lower privilege levels.
Commands set at higher privilege levels are executable by users at lower privilege levels.
Cisco IOS resilient configuration feature secures the Cisco IOS image and nothing else.
Cisco IOS resilient configuration feature secures the Cisco IOS image and nothing else.
Syslog messages include a severity level, with 0 indicating emergencies and 7 indicating debugging messages.
Syslog messages include a severity level, with 0 indicating emergencies and 7 indicating debugging messages.
In syslog, a facility code denotes the destination or the source of the message.
In syslog, a facility code denotes the destination or the source of the message.
SNMPv4 uses secure authentication and encryption, making it the preferred version for network management.
SNMPv4 uses secure authentication and encryption, making it the preferred version for network management.
NTP can be configured with authentication to prevent malicious time synchronization attacks.
NTP can be configured with authentication to prevent malicious time synchronization attacks.
AutoSecure configures only the management plane and guarantees absolute security from all attacks.
AutoSecure configures only the management plane and guarantees absolute security from all attacks.
Flashcards
Physical Security
Physical Security
Securing the physical location of the router and its components.
Router OS Security
Router OS Security
Protecting the software and configurations on the router.
Router Hardening
Router Hardening
Enhancing the router's security posture through various configuration tweaks.
Secure Administrative Access
Secure Administrative Access
Signup and view all the flashcards
Password Misspelling
Password Misspelling
Signup and view all the flashcards
IOS Resilient Configuration
IOS Resilient Configuration
Signup and view all the flashcards
Syslog
Syslog
Signup and view all the flashcards
Routing Protocol Authentication
Routing Protocol Authentication
Signup and view all the flashcards
Routing Protocol Spoofing
Routing Protocol Spoofing
Signup and view all the flashcards
Control Plane Policing
Control Plane Policing
Signup and view all the flashcards
Privilege Levels
Privilege Levels
Signup and view all the flashcards
Role-Based CLI Access
Role-Based CLI Access
Signup and view all the flashcards
Security Audit Tools
Security Audit Tools
Signup and view all the flashcards
AutoSecure
AutoSecure
Signup and view all the flashcards
Network Time Protocol (NTP)
Network Time Protocol (NTP)
Signup and view all the flashcards
Single Router Approach
Single Router Approach
Signup and view all the flashcards
Defense in Depth Approach
Defense in Depth Approach
Signup and view all the flashcards
DMZ Approach
DMZ Approach
Signup and view all the flashcards
Password Length
Password Length
Signup and view all the flashcards
Password Encryption
Password Encryption
Signup and view all the flashcards
Enable Algorithm-Type Secret
Enable Algorithm-Type Secret
Signup and view all the flashcards
Login Delay
Login Delay
Signup and view all the flashcards
Login Failure Messages
Login Failure Messages
Signup and view all the flashcards
SSH
SSH
Signup and view all the flashcards
Privilege Command
Privilege Command
Signup and view all the flashcards
SNMPv3 Access
SNMPv3 Access
Signup and view all the flashcards
Disable Unnecessary Services
Disable Unnecessary Services
Signup and view all the flashcards
Study Notes
Securing Device Access
- Securing a network perimeter is important
- Configure secure administrative access to Cisco routers
- Enhance security for virtual logins
- Configure an SSH daemon for secure remote management
Edge Router Security
- Security approaches for edge routers include single router, defense in depth, and DMZ
- Single Router: A simple approach using one router to connect the network to the Internet.
- Defense in Depth: Multiple layers of security including firewalls.
- DMZ: Uses a firewall to protect the internal network, while providing controlled external access to specific resources.
- Areas of focus for router security
- Physical Security
- Router Operating System and Configuration File Security
- Router Hardening
Secure Administrative Access
- Restricting device accessibility is crucial
- All access attempts should be logged
- Access authentication is needed
- Authorize user actions
- Present a legal notification
- Ensure the confidentiality of data by encrypting when possible
Local and Remote Access
- Local access involves direct connection to the router
- Remote access can be achieved using Telnet/SSH or Modem and Aux Port
Strong Passwords
- Use a password length of 10 or more characters
- Include a mix of uppercase and lowercase letters, numbers, symbols, and spaces in passwords
- Avoid using easily obtainable personal information for passwords
- Intentionally misspell words in your passwords
- Change passwords frequently
- Never leave passwords in plain view
- Weak passwords, such as dictionary words are easily cracked
Increasing Access Security
- Increase password security by setting a minimum password length and enabling password encryption
Secret Password Algorithms
- Best practice is to configure all secret passwords as type 8 or type 9
- Use the enable algorithm-type command to enter an unencrypted password
- Use the username name algorithm-type command to specify type 9 encryption for usernames
Securing Line Access
- Secure line access prevents unauthorized entry into the network devices
Login Enhancements
- Implementing delays between successive login attempts adds a layer of security
- Enable login shutdown if DoS attacks are suspected
- Generate system-logging messages for login detection
- Can implement delays and shutdowns from the "line" configuration page
- login block-for seconds attempts tries within seconds
- login delay 3
Logging Failed Attempts
- Generate login syslog messages to monitor failed access attempts
- Use commands like login on-success log, login on-failure log, and security authentication failure rate threshold-rate log
Configuring SSH
- SSH can be enabled and used with a Cisco router as either an SSH server or client for secure remote management.
- As a client, a router can use SSH to connect to another SSH-enabled route where it can accept SSH client connections as a server
- Clients such as PuTTY, OpenSSH, or TeraTerm, can connect via SSH
Administrative Roles
- Configure administrative privilege levels to control command availability
- Configure role-based CLI access to control command availability
Privilege Levels
- Level 0 is predefined for user-level access privileges
- Level 1 is default for login with the router prompt
- Levels 2-14 can be customized for user-level privileges
- Level 15 is reserved for enable mode privileges
- Lower levels are the user EXEC mode (privilege level 1) and privileged EXEC mode (privilege level 15)
- Command syntax: privilege mode {level level | reset) command
Configuring and Assigning Privilege Levels
- Different commands can be configured for different levels of users
Limitations of Privilege Levels
- There is no access control for specific interfaces, ports, logical interfaces, and slots on a router
- Commands available at lower privilege levels are always executable at higher privilege levels
- Commands specifically set at higher privilege levels are not available for lower privilege users
- Assigning a command with multiple keywords allows access to all commands that use those
Role-Based CLI Access
- Security operator privileges can include configurations such as AAA, show commands, firewall, IDS/IPS, and NetFlow
- WAN engineer privileges would configure routing, configure interfaces and issue show commands
- Superviews contain Views but not commands, Two Superviews can use the same View. For example, both Superview 1 and Superview 2 can have CLI View 4 placed inside.
Monitoring and Management
- Use the Cisco IOS resilient configuration feature to secure the Cisco IOS image and configuration files.
- Secure SNMPv3 access using ACL and NTP to enable accurate timestamping between all devices.
- Compare in-band and out-of band management access.
Cisco IOS Resilient Configuration Feature
- Copy of running configuration that was in the router when the feature was first enabled
- Secures working set of files to preserve persistent storage space
- Automatically detects image or configuration version mismatch
- It can be disabled only through a console session and is only available for systems that support a PCMCIA Advanced Technology Attachment (ATA) flash interface.
Enabling the IOS Image Resilience Feature
- This is for systems that need to ensure they can go back to a stable config
Syslog
- Standard logging
- Security logs
Syslog Operation
- Syslog data is routed to
- Console Line
- Logging Buffer
- Terminal Line
- Syslog Server
Syslog Message
- Messages can have different Levels 0-7 where 0 is the highest:
- 0 Emergencies: System unusable
- 1 Alerts: Immediate action needed
- 2 Critical: Critical conditions exist
- 3 Errors: Error conditions exist
- 4 Warnings: Warning conditions exist
- 5 Notifications: Normal but significant condition
- 6 Informational: Informational messages only
- 7 Debugging: Debugging messages
Configuring System Logging
- Set logging host
- Select trap level if needed
- source-interface if needed
- Enable logging
Introduction to SNMP
- SNMP is used to send alerts
- SNMP agents on managed devices communicate with the SNMP Manager
Configuring SNMP Access
- SNMP is used to send alerts
NTP
- NTP is used to keep the systems in sync
NTP Authentication
- Can be authentic
- Add authentication keys as needed
Using Automated Security Features
- Utilize security audit tools to determine IOS-based router vulnerabilities and AutoSecure for security on IOS-based routers
Discovery Protocols CDP and LLDP
- Use discovery protocols to identify any vulnerabilities
Settings for Protocols and Services
- Additional device security measures
- Disable unnecessary services and interfaces
- Disable and restrict commonly configured management services
- Disable probes and scans; ensure terminal access security
- Disable gratuitous and proxy ARPs
- Disable IP-directed broadcasts
Cisco AutoSecure
- AutoSecure helps to greatly reduce the attack vector on Cisco routers
Using the auto secure Command
- Auto Secure helps to greatly reduce the attack vector on Cisco routers
- During operation
- Auto secure command is entered.
- Wizard gathers information about the outside interfaces
- AutoSecure secures the management plane by disabling unnecessary services
- AutoSecure prompts for a banner
- AutoSecure prompts for passwords and enables password and login features
- Interfaces and Forwarding plane are secured
Securing the Control Plane
- Configure routing protocol authentication
- Explain the function of Control Plane Policing
Routing Protocol Spoofing
- Consequences of protocol spoofing: - Redirect traffic to create routing loops - Redirect traffic so it can be monitored on an insecure link - Redirect traffic to discard it
OSPF MD5 Routing Protocol Authentication
- Enhanced security with authentication keys
OSPF SHA Routing Protocol Authentication
- Enhanced security with authentication keys
Network Device Operations
- Management, Control, Data connections all need security considerations
Control and Management Plane Vulnerabilities
- Data plane and devices can potentially target AAA, Syslog, SNMP, OSPF
CoPP Operation
- Control Plane Policing restricts traffic to different planes of the network device
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.