Cisco Router Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a guideline for creating strong passwords?

  • Include a mix of uppercase and lowercase letters, numbers, symbols, and spaces.
  • Use a password length of 10 or more characters.
  • Avoid passwords based on easily identifiable pieces of information.
  • Always write down your password in an obvious place to make sure you don't forget it. (correct)

What is the primary benefit of using the Cisco IOS Resilient Configuration feature?

  • It disables all unused ports to prevent unauthorized access.
  • It secures the Cisco IOS image and configuration files, detecting mismatches. (correct)
  • It automatically backs up the entire IOS image and configuration to a remote TFTP server.
  • It optimizes network performance by prioritizing voice traffic.

Which command is used to configure a router to send syslog messages to a specific syslog server?

  • logging trap level
  • logging host [hostname | ip-address] (correct)
  • logging source-interface interface-type interface-number
  • logging on

What is the purpose of Control Plane Policing (CoPP)?

<p>To mitigate attacks targeting the control plane. (C)</p> Signup and view all the answers

Which of the following is a task associated with securing administrative access to a device?

<p>Restricting device accessibility. (A)</p> Signup and view all the answers

When configuring privilege levels, which level is reserved for enable mode privileges?

<p>Level 15 (B)</p> Signup and view all the answers

Which security approach involves implementing multiple layers of security controls?

<p>Defense in Depth Approach (C)</p> Signup and view all the answers

Which of the following is a potential consequence of routing protocol spoofing?

<p>Redirect traffic so it can be monitored on an insecure link. (A)</p> Signup and view all the answers

What is the primary purpose of using NTP (Network Time Protocol) in network security?

<p>To synchronize time across network devices. (D)</p> Signup and view all the answers

What type of algorithm does the command username Bob algorithm-type scrypt secret cisco54321 specify?

<p>scrypt (A)</p> Signup and view all the answers

Which command is used to enable the secure boot-image feature on a Cisco router?

<p>secure boot-image (B)</p> Signup and view all the answers

Which syslog severity level indicates that a system is unusable?

<p>Emergency (D)</p> Signup and view all the answers

What is the purpose of configuring transport input ssh on a VTY line?

<p>To allow only SSH connections. (B)</p> Signup and view all the answers

After enabling AutoSecure what is the immediate next step?

<p>The wizard gathers information about the outside interfaces (D)</p> Signup and view all the answers

Which of the following is a limitation of privilege levels when configuring command availability?

<p>Commands available at lower privilege levels are always executable at higher privilege levels (C)</p> Signup and view all the answers

What type of attack is mitigated by implementing delays between successive login attempts?

<p>Denial of Service(DoS) attack (A)</p> Signup and view all the answers

A network administrator wants to ensure that all network devices have synchronized time. Which protocol should be configured?

<p>NTP (A)</p> Signup and view all the answers

Which command is utilized to configure OSPF with SHA authentication?

<p><code>ip ospf authentication key-chain name</code> (A)</p> Signup and view all the answers

Which of the following is the most secure method for remote access?

<p>SSH (A)</p> Signup and view all the answers

What is the purpose of the crypto key zeroize rsa command?

<p>To remove all RSA keys. (A)</p> Signup and view all the answers

A single router approach to network security includes a firewall and an intrusion prevention system.

<p>False (B)</p> Signup and view all the answers

Physical security of a router does not influence overall network security.

<p>False (B)</p> Signup and view all the answers

Restricting device accessibility is a key aspect of secure administrative access.

<p>True (A)</p> Signup and view all the answers

Logging and accounting for all access on a network device is unnecessary.

<p>False (B)</p> Signup and view all the answers

Using a password length of less than 8 characters is a good security practice.

<p>False (B)</p> Signup and view all the answers

Password complexity, with a mix of character types, enhances password strength.

<p>True (A)</p> Signup and view all the answers

Cisco devices store passwords in plain text by default.

<p>False (B)</p> Signup and view all the answers

The enable algorithm-type command is used to enter an encrypted password.

<p>False (B)</p> Signup and view all the answers

Applying transport input ssh on VTY lines restricts access to only SSH connections.

<p>True (A)</p> Signup and view all the answers

Login delays can help mitigate brute-force password attacks.

<p>True (A)</p> Signup and view all the answers

Using login delay 0 disables login delay.

<p>True (A)</p> Signup and view all the answers

It is impossible to configure logging messages for successful login attempts.

<p>False (B)</p> Signup and view all the answers

SSH provides an unencrypted channel for remote device management.

<p>False (B)</p> Signup and view all the answers

The crypto key zeroize rsa command generates new RSA key pairs.

<p>False (B)</p> Signup and view all the answers

Privilege levels cannot be used to restrict user access to specific show commands.

<p>False (B)</p> Signup and view all the answers

Role-Based CLI Access allows for more granular control over command availability compared to privilege levels.

<p>True (A)</p> Signup and view all the answers

Cisco IOS Resilient Configuration feature requires extra storage space to secure the primary Cisco IOS image files.

<p>False (B)</p> Signup and view all the answers

Syslog messages with a severity level of 0 indicate debugging information.

<p>False (B)</p> Signup and view all the answers

AutoSecure is a tool that guarantees complete security from all attacks.

<p>False (B)</p> Signup and view all the answers

Control Plane Policing (CoPP) is used to protect the data plane from malicious traffic.

<p>False (B)</p> Signup and view all the answers

Flashcards

Secure Administrative Access

Securing devices by restricting access, logging activity, authenticating users, authorizing actions, legal notifications, and data confidentiality.

Strong Password Guidelines

Guidelines include length of 10+ characters, mixed-case letters, numbers, symbols, spaces, avoid identifiable info, misspell, change and don't write down.

Privilege Levels

Limiting command availability for customized user-level privileges

SNMP

A network management protocol used for collecting and organizing information about managed devices on IP networks.

Signup and view all the flashcards

NTP

A protocol that enables accurate timestamping by synchronizing device clocks.

Signup and view all the flashcards

Cisco AutoSecure

Automated tool to assess and improve router security.

Signup and view all the flashcards

Routing Protocol Authentication

Using authentication methods to prevent spoofing and unauthorized route updates.

Signup and view all the flashcards

Routing Protocol Spoofing

Traffic is redirected creating routing loops, traffic is monitored on an insecure link, traffic is discarded

Signup and view all the flashcards

Cisco IOS Resilient Configuration

It secures the Cisco IOS image and configuration files.

Signup and view all the flashcards

Syslog

A standard protocol for network logging, especially on Cisco devices, for network security.

Signup and view all the flashcards

Single Router Approach

An edge router setup using a single router to administer network security policies.

Signup and view all the flashcards

Defense in Depth

An edge router setup strategy involving multiple layers of security using routers and a firewall.

Signup and view all the flashcards

DMZ Approach

An edge router setup that includes a firewall and a DMZ to isolate traffic.

Signup and view all the flashcards

Router Security Areas

Physical security, router OS and config file security, and router hardening.

Signup and view all the flashcards

Local Access

Connecting via console or AUX ports directly to a network device.

Signup and view all the flashcards

Remote Access

Connecting using Telnet/SSH or a modem and aux port.

Signup and view all the flashcards

Password Encryption

A method where the enable password is known, but easily cracked.

Signup and view all the flashcards

Secret Passwords

Type 8 or 9 passwords using MD5, SHA256 or Scrypt encryption.

Signup and view all the flashcards

Legal banner

A banner displayed before login to warn of legal prosecution.

Signup and view all the flashcards

Login Delay

Command that adds a delay time after successive login attempts.

Signup and view all the flashcards

Login Block-For

A security feature that freezes login attempts to slow down attackers.

Signup and view all the flashcards

Login Success

Command syntax is: login on-success log [every login]

Signup and view all the flashcards

Login Failures

Command syntax is: login on-failure log [every login]

Signup and view all the flashcards

SSH

A protocol providing secure, encrypted remote access. Replaces Telnet.

Signup and view all the flashcards

Role-Based CLI

Specifies admin roles and access rather than a privilege level.

Signup and view all the flashcards

Command Availability

A router configuration using privilege levels to control command availability.

Signup and view all the flashcards

Secure Bootset

A command that secures both images and configurations.

Signup and view all the flashcards

Security Audit

Tool used to analyze device configs, identifies potential vulnerabilities.

Signup and view all the flashcards

Routing Protocol SHA Authentication

Use a key chain to specify an SHA authentication key.

Signup and view all the flashcards

Study Notes

Securing Device Access

  • Securing the network perimeter is a key component
  • Configuring secure administrative access to Cisco routers is crucial
  • Enhanced security for virtual logins improves overall security
  • Configuring an SSH daemon enables secure remote management

Edge Router Security

  • Single Router Approach: A basic setup using one router to connect the LAN to the Internet
  • Defense in Depth Approach: Employs multiple layers of security, including firewalls and multiple routers
  • DMZ Approach: Uses a demilitarized zone to isolate public-facing servers from the internal network
  • Router security involves physical security, securing the router operating system and config files, and router hardening

Secure Administrative Access

  • Tasks include restricting device accessibility, logging all access, authentication, and authorization
  • Present legal notification and ensure data confidentiality

Local and Remote Access

  • Local Access: Direct connection to the router, typically using a console cable
  • Remote Access via Telnet/SSH: Enables access over a network connection
  • Remote Access via Modem: Allows connections through an auxiliary port

Strong Passwords

  • Passwords should exceed 10 characters and use a mix of upper/lowercase letters, numbers, symbols and spaces
  • Should not be easily identifiable and be changed often
  • Never write passwords down in plain sight
  • secret is a Weak Password because it is a Simple dictionary password
  • b67n42d39c is a Strong Password because it Combines alphanumeric characters
  • smith is a Weak Password because it is a Mother’s maiden name
  • 12^h u4@1p7 is a Strong Password because it Combines alphanumeric characters,symbols, and includes a space
  • toyota is a Weak Password because it is a Make of car
  • bob1967 is a Weak Password because it is a Name and birthday of user
  • Blueleaf23 is a Weak Password because it is Simple words and numbers

Increasing Access Security

  • It is possible to enforce a minimum password length of 10 characters
  • Enable password encryption
  • Configure login timeouts

Secret Password Algorithms

  • Use either type 8 or type 9 password encryption
  • The enable algorithm-type command along with the username algorithm-type command is to specify encryption

Securing Line Access

  • Commands can be configured on a router, specifically for console, AUX, and VTY lines
  • Using a username database in conjunction with SSH for virtual terminal lines

Enhancing Login Security

  • Delays between login attempts can slow down brute-force attacks
  • Login shutdown can be enabled if DoS attacks are suspected
  • System-logging messages can be configured for login detection

Login Enhancements

  • The command syntax "login block-for seconds attempts tries within seconds" is how to set the lockout
  • The command syntax "login delay seconds" sets a delay between login attempts

Logging Failed Attempts

  • Login Syslog Messages can be generated

SSH Configuration

  • Configuration of domain-name, key generation, SSH version, username and related terminal configs
  • SSH can be enabled on a Cisco router to function as an SSH server or client
  • A client can connect through programs like PuTTY, OpenSSH, or TeraTerm

Assigning Administrative Roles

  • Administrative privilege levels can control command availability
  • Role-based CLI access can also control command availability

Privilege Levels

  • Level 0 is for user-level access, Level 1 is the default for router login, levels 2-14 are customizable, and Level 15 is for enable mode
  • User EXEC mode (level 1): User-level commands at the router> prompt
  • Privileged EXEC mode (level 15): Enable-level commands at the router# prompt

Privilege Level Syntax

  • privilege mode {level level | reset} command

Limitations of Privilege Levels

  • No access control is possible to specific interfaces, ports, logical interfaces, and slots on a router
  • Lower privilege levels are executable at higher privilege levels
  • Setting Commands at higher privilege levels does not make them available for lower privilege users

Role-Based CLI Access

  • Security operator privileges: includes configuring AAA, firewall, IDS/IPS, and NetFlow
  • WAN engineer privileges: includes configuring routing and interfaces

Role Based Views

  • Superviews are a combination of CLI views

Monitoring and Managing Devices

  • Use the Cisco IOS resilient configuration feature
  • Compare in-band and out-of band management access
  • Configure syslog to log system events
  • Configure secure SNMPv3 access using ACL
  • Configure NTP to enable accurate timestamping

Cisco IOS Resilient Configuration Feature

  • Ensures the configuration file in the primary bootset mirrors the router's running configuration when the feature was enabled
  • Secures the smallest set of files to save storage space and automatically detects any image or configuration version mismatch
  • Local storage is used for securing files, which avoids scalability issues associated with TFTP servers
  • Can only be disabled through a console session

Enabling IOS Image Resilience Feature

  • With use of the secure boot-image command

Syslog

  • Syslog is an operation that sends messages to a Syslog server
  • Used for network security

Syslog Message

  • Level 0 (emergencies): System is unusable
  • Level 1 (alerts): Immediate action is needed
  • Level 2 (critical): Critical conditions exist
  • Level 3 (errors): Error conditions exist
  • Level 4 (warnings): Warning conditions exist
  • Level 5 (notifications): Normal but significant condition
  • Level 6 (informational): Informational messages only
  • Level 7 (debugging): Debugging messages

Message Breakdown

  • The sequence number is the first item
  • The timestamp displays if service timestamps log is configured
  • The next items denote the source, cause, or level of system, mnemonic, and message

Configuring System Logging

  • Step 1: logging host [hostname | ip-address]
  • Step 2 (optional): logging trap level
  • Step 3: logging source-interface interface-type interface-number
  • Step 4: logging on

NTP

  • Accuracy across a network ensures synchronized operations

NTP Server Config

  • Configuration with the ntp master 1 command

NTP Authentication Config

  • Can be configured with using: ntp authenticate, ntp authentication-key, and ntp trusted-key

Using Automated Security Features

  • Use security audit tools to determine IOS-based router vulnerabilities while using AutoSecure to enable security on IOS-based routers

Discovery protocols

  • Protocols like CDP and LLDP help uncover potential vulnerabilities

Settings For Protocols and Services

  • Additional recommendations to ensure a device is secure: disable unnecessary services and interfaces and restrict commonly configured management services
  • disable probes and scans and gratuitous aRPs and IP directed broadcasts

Cisco Auto Secure Parameters

  • no-interact: Prevents interactive configuration prompts
  • full: Prompts for all interactive questions
  • forwarding: Secures only the forwarding plane
  • management: Secures only the management plane
  • ntp, login, ssh, firewall, tcp-intercept: Specifies configuration of each specific feature

Operation of Auto Secure

  • AutoSecure command is entered and the wizard gathers info about the outside interfaces
  • AutoSecure secures the management plane by disabling unnecessary services
  • AutoSecure prompts for a banner and for passwords which then enables password and login features

Securing the Control Plane

  • The function of securing control plane involves configuring both routing protocol authentications in conjunction Control Plane Policing to prevent spoofing

Routing Protocol Spoofing

  • Consequences can be that traffic is re-directed creating routing loops
  • Can be monitored on an insecure link
  • Can be re-directed to discard it

Authentication

  • This can be implemented on OSPF using both MD5 and SHA algorithms

OSPF MD5 Routing Protocol Authentication

  • Configuration required on both interfaces of the routers

OSPF SHA Routing Protocol Authentication

  • Step 1: Specify an SHA authentication key chain.
  • Step 2: Assign the authentication key chain to the desired interfaces.

CoPP

  • Control plane policing protects allows various levels for monitoring on interfaces

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Modules 8-10 Partie 2
33 questions
Securing Routers with AutoSecure Quiz
29 questions
Cisco Router Security
40 questions
Use Quizgecko on...
Browser
Browser