Podcast
Questions and Answers
Which of the following is NOT a guideline for creating strong passwords?
Which of the following is NOT a guideline for creating strong passwords?
- Include a mix of uppercase and lowercase letters, numbers, symbols, and spaces.
- Use a password length of 10 or more characters.
- Avoid passwords based on easily identifiable pieces of information.
- Always write down your password in an obvious place to make sure you don't forget it. (correct)
What is the primary benefit of using the Cisco IOS Resilient Configuration feature?
What is the primary benefit of using the Cisco IOS Resilient Configuration feature?
- It disables all unused ports to prevent unauthorized access.
- It secures the Cisco IOS image and configuration files, detecting mismatches. (correct)
- It automatically backs up the entire IOS image and configuration to a remote TFTP server.
- It optimizes network performance by prioritizing voice traffic.
Which command is used to configure a router to send syslog messages to a specific syslog server?
Which command is used to configure a router to send syslog messages to a specific syslog server?
- logging trap level
- logging host [hostname | ip-address] (correct)
- logging source-interface interface-type interface-number
- logging on
What is the purpose of Control Plane Policing (CoPP)?
What is the purpose of Control Plane Policing (CoPP)?
Which of the following is a task associated with securing administrative access to a device?
Which of the following is a task associated with securing administrative access to a device?
When configuring privilege levels, which level is reserved for enable mode privileges?
When configuring privilege levels, which level is reserved for enable mode privileges?
Which security approach involves implementing multiple layers of security controls?
Which security approach involves implementing multiple layers of security controls?
Which of the following is a potential consequence of routing protocol spoofing?
Which of the following is a potential consequence of routing protocol spoofing?
What is the primary purpose of using NTP (Network Time Protocol) in network security?
What is the primary purpose of using NTP (Network Time Protocol) in network security?
What type of algorithm does the command username Bob algorithm-type scrypt secret cisco54321
specify?
What type of algorithm does the command username Bob algorithm-type scrypt secret cisco54321
specify?
Which command is used to enable the secure boot-image feature on a Cisco router?
Which command is used to enable the secure boot-image feature on a Cisco router?
Which syslog severity level indicates that a system is unusable?
Which syslog severity level indicates that a system is unusable?
What is the purpose of configuring transport input ssh
on a VTY line?
What is the purpose of configuring transport input ssh
on a VTY line?
After enabling AutoSecure
what is the immediate next step?
After enabling AutoSecure
what is the immediate next step?
Which of the following is a limitation of privilege levels when configuring command availability?
Which of the following is a limitation of privilege levels when configuring command availability?
What type of attack is mitigated by implementing delays between successive login attempts?
What type of attack is mitigated by implementing delays between successive login attempts?
A network administrator wants to ensure that all network devices have synchronized time. Which protocol should be configured?
A network administrator wants to ensure that all network devices have synchronized time. Which protocol should be configured?
Which command is utilized to configure OSPF with SHA authentication?
Which command is utilized to configure OSPF with SHA authentication?
Which of the following is the most secure method for remote access?
Which of the following is the most secure method for remote access?
What is the purpose of the crypto key zeroize rsa
command?
What is the purpose of the crypto key zeroize rsa
command?
A single router approach to network security includes a firewall and an intrusion prevention system.
A single router approach to network security includes a firewall and an intrusion prevention system.
Physical security of a router does not influence overall network security.
Physical security of a router does not influence overall network security.
Restricting device accessibility is a key aspect of secure administrative access.
Restricting device accessibility is a key aspect of secure administrative access.
Logging and accounting for all access on a network device is unnecessary.
Logging and accounting for all access on a network device is unnecessary.
Using a password length of less than 8 characters is a good security practice.
Using a password length of less than 8 characters is a good security practice.
Password complexity, with a mix of character types, enhances password strength.
Password complexity, with a mix of character types, enhances password strength.
Cisco devices store passwords in plain text by default.
Cisco devices store passwords in plain text by default.
The enable algorithm-type
command is used to enter an encrypted password.
The enable algorithm-type
command is used to enter an encrypted password.
Applying transport input ssh
on VTY lines restricts access to only SSH connections.
Applying transport input ssh
on VTY lines restricts access to only SSH connections.
Login delays can help mitigate brute-force password attacks.
Login delays can help mitigate brute-force password attacks.
Using login delay 0
disables login delay.
Using login delay 0
disables login delay.
It is impossible to configure logging messages for successful login attempts.
It is impossible to configure logging messages for successful login attempts.
SSH provides an unencrypted channel for remote device management.
SSH provides an unencrypted channel for remote device management.
The crypto key zeroize rsa
command generates new RSA key pairs.
The crypto key zeroize rsa
command generates new RSA key pairs.
Privilege levels cannot be used to restrict user access to specific show commands.
Privilege levels cannot be used to restrict user access to specific show commands.
Role-Based CLI Access allows for more granular control over command availability compared to privilege levels.
Role-Based CLI Access allows for more granular control over command availability compared to privilege levels.
Cisco IOS Resilient Configuration feature requires extra storage space to secure the primary Cisco IOS image files.
Cisco IOS Resilient Configuration feature requires extra storage space to secure the primary Cisco IOS image files.
Syslog messages with a severity level of 0 indicate debugging information.
Syslog messages with a severity level of 0 indicate debugging information.
AutoSecure is a tool that guarantees complete security from all attacks.
AutoSecure is a tool that guarantees complete security from all attacks.
Control Plane Policing (CoPP) is used to protect the data plane from malicious traffic.
Control Plane Policing (CoPP) is used to protect the data plane from malicious traffic.
Flashcards
Secure Administrative Access
Secure Administrative Access
Securing devices by restricting access, logging activity, authenticating users, authorizing actions, legal notifications, and data confidentiality.
Strong Password Guidelines
Strong Password Guidelines
Guidelines include length of 10+ characters, mixed-case letters, numbers, symbols, spaces, avoid identifiable info, misspell, change and don't write down.
Privilege Levels
Privilege Levels
Limiting command availability for customized user-level privileges
SNMP
SNMP
Signup and view all the flashcards
NTP
NTP
Signup and view all the flashcards
Cisco AutoSecure
Cisco AutoSecure
Signup and view all the flashcards
Routing Protocol Authentication
Routing Protocol Authentication
Signup and view all the flashcards
Routing Protocol Spoofing
Routing Protocol Spoofing
Signup and view all the flashcards
Cisco IOS Resilient Configuration
Cisco IOS Resilient Configuration
Signup and view all the flashcards
Syslog
Syslog
Signup and view all the flashcards
Single Router Approach
Single Router Approach
Signup and view all the flashcards
Defense in Depth
Defense in Depth
Signup and view all the flashcards
DMZ Approach
DMZ Approach
Signup and view all the flashcards
Router Security Areas
Router Security Areas
Signup and view all the flashcards
Local Access
Local Access
Signup and view all the flashcards
Remote Access
Remote Access
Signup and view all the flashcards
Password Encryption
Password Encryption
Signup and view all the flashcards
Secret Passwords
Secret Passwords
Signup and view all the flashcards
Legal banner
Legal banner
Signup and view all the flashcards
Login Delay
Login Delay
Signup and view all the flashcards
Login Block-For
Login Block-For
Signup and view all the flashcards
Login Success
Login Success
Signup and view all the flashcards
Login Failures
Login Failures
Signup and view all the flashcards
SSH
SSH
Signup and view all the flashcards
Role-Based CLI
Role-Based CLI
Signup and view all the flashcards
Command Availability
Command Availability
Signup and view all the flashcards
Secure Bootset
Secure Bootset
Signup and view all the flashcards
Security Audit
Security Audit
Signup and view all the flashcards
Routing Protocol SHA Authentication
Routing Protocol SHA Authentication
Signup and view all the flashcards
Study Notes
Securing Device Access
- Securing the network perimeter is a key component
- Configuring secure administrative access to Cisco routers is crucial
- Enhanced security for virtual logins improves overall security
- Configuring an SSH daemon enables secure remote management
Edge Router Security
- Single Router Approach: A basic setup using one router to connect the LAN to the Internet
- Defense in Depth Approach: Employs multiple layers of security, including firewalls and multiple routers
- DMZ Approach: Uses a demilitarized zone to isolate public-facing servers from the internal network
- Router security involves physical security, securing the router operating system and config files, and router hardening
Secure Administrative Access
- Tasks include restricting device accessibility, logging all access, authentication, and authorization
- Present legal notification and ensure data confidentiality
Local and Remote Access
- Local Access: Direct connection to the router, typically using a console cable
- Remote Access via Telnet/SSH: Enables access over a network connection
- Remote Access via Modem: Allows connections through an auxiliary port
Strong Passwords
- Passwords should exceed 10 characters and use a mix of upper/lowercase letters, numbers, symbols and spaces
- Should not be easily identifiable and be changed often
- Never write passwords down in plain sight
secret
is a Weak Password because it is a Simple dictionary passwordb67n42d39c
is a Strong Password because it Combines alphanumeric characterssmith
is a Weak Password because it is a Mother’s maiden name12^h u4@1p7
is a Strong Password because it Combines alphanumeric characters,symbols, and includes a spacetoyota
is a Weak Password because it is a Make of carbob1967
is a Weak Password because it is a Name and birthday of userBlueleaf23
is a Weak Password because it is Simple words and numbers
Increasing Access Security
- It is possible to enforce a minimum password length of 10 characters
- Enable password encryption
- Configure login timeouts
Secret Password Algorithms
- Use either type 8 or type 9 password encryption
- The enable algorithm-type command along with the username algorithm-type command is to specify encryption
Securing Line Access
- Commands can be configured on a router, specifically for console, AUX, and VTY lines
- Using a username database in conjunction with SSH for virtual terminal lines
Enhancing Login Security
- Delays between login attempts can slow down brute-force attacks
- Login shutdown can be enabled if DoS attacks are suspected
- System-logging messages can be configured for login detection
Login Enhancements
- The command syntax "login block-for seconds attempts tries within seconds" is how to set the lockout
- The command syntax "login delay seconds" sets a delay between login attempts
Logging Failed Attempts
- Login Syslog Messages can be generated
SSH Configuration
- Configuration of domain-name, key generation, SSH version, username and related terminal configs
- SSH can be enabled on a Cisco router to function as an SSH server or client
- A client can connect through programs like PuTTY, OpenSSH, or TeraTerm
Assigning Administrative Roles
- Administrative privilege levels can control command availability
- Role-based CLI access can also control command availability
Privilege Levels
- Level 0 is for user-level access, Level 1 is the default for router login, levels 2-14 are customizable, and Level 15 is for enable mode
- User EXEC mode (level 1): User-level commands at the router> prompt
- Privileged EXEC mode (level 15): Enable-level commands at the router# prompt
Privilege Level Syntax
privilege mode {level level | reset} command
Limitations of Privilege Levels
- No access control is possible to specific interfaces, ports, logical interfaces, and slots on a router
- Lower privilege levels are executable at higher privilege levels
- Setting Commands at higher privilege levels does not make them available for lower privilege users
Role-Based CLI Access
- Security operator privileges: includes configuring AAA, firewall, IDS/IPS, and NetFlow
- WAN engineer privileges: includes configuring routing and interfaces
Role Based Views
- Superviews are a combination of CLI views
Monitoring and Managing Devices
- Use the Cisco IOS resilient configuration feature
- Compare in-band and out-of band management access
- Configure syslog to log system events
- Configure secure SNMPv3 access using ACL
- Configure NTP to enable accurate timestamping
Cisco IOS Resilient Configuration Feature
- Ensures the configuration file in the primary bootset mirrors the router's running configuration when the feature was enabled
- Secures the smallest set of files to save storage space and automatically detects any image or configuration version mismatch
- Local storage is used for securing files, which avoids scalability issues associated with TFTP servers
- Can only be disabled through a console session
Enabling IOS Image Resilience Feature
- With use of the
secure boot-image
command
Syslog
- Syslog is an operation that sends messages to a Syslog server
- Used for network security
Syslog Message
- Level 0 (emergencies): System is unusable
- Level 1 (alerts): Immediate action is needed
- Level 2 (critical): Critical conditions exist
- Level 3 (errors): Error conditions exist
- Level 4 (warnings): Warning conditions exist
- Level 5 (notifications): Normal but significant condition
- Level 6 (informational): Informational messages only
- Level 7 (debugging): Debugging messages
Message Breakdown
- The sequence number is the first item
- The timestamp displays if service timestamps log is configured
- The next items denote the source, cause, or level of system, mnemonic, and message
Configuring System Logging
- Step 1:
logging host [hostname | ip-address]
- Step 2 (optional):
logging trap level
- Step 3:
logging source-interface interface-type interface-number
- Step 4:
logging on
NTP
- Accuracy across a network ensures synchronized operations
NTP Server Config
- Configuration with the
ntp master 1
command
NTP Authentication Config
- Can be configured with using: ntp authenticate, ntp authentication-key, and ntp trusted-key
Using Automated Security Features
- Use security audit tools to determine IOS-based router vulnerabilities while using AutoSecure to enable security on IOS-based routers
Discovery protocols
- Protocols like CDP and LLDP help uncover potential vulnerabilities
Settings For Protocols and Services
- Additional recommendations to ensure a device is secure: disable unnecessary services and interfaces and restrict commonly configured management services
- disable probes and scans and gratuitous aRPs and IP directed broadcasts
Cisco Auto Secure Parameters
- no-interact: Prevents interactive configuration prompts
- full: Prompts for all interactive questions
- forwarding: Secures only the forwarding plane
- management: Secures only the management plane
- ntp, login, ssh, firewall, tcp-intercept: Specifies configuration of each specific feature
Operation of Auto Secure
- AutoSecure command is entered and the wizard gathers info about the outside interfaces
- AutoSecure secures the management plane by disabling unnecessary services
- AutoSecure prompts for a banner and for passwords which then enables password and login features
Securing the Control Plane
- The function of securing control plane involves configuring both routing protocol authentications in conjunction Control Plane Policing to prevent spoofing
Routing Protocol Spoofing
- Consequences can be that traffic is re-directed creating routing loops
- Can be monitored on an insecure link
- Can be re-directed to discard it
Authentication
- This can be implemented on OSPF using both MD5 and SHA algorithms
OSPF MD5 Routing Protocol Authentication
- Configuration required on both interfaces of the routers
OSPF SHA Routing Protocol Authentication
- Step 1: Specify an SHA authentication key chain.
- Step 2: Assign the authentication key chain to the desired interfaces.
CoPP
- Control plane policing protects allows various levels for monitoring on interfaces
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.