Edge Router Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which security approach involves creating a non-secure zone between the internet and the internal network?

  • Defense in Depth Approach
  • Routing Hardening
  • DMZ Approach (correct)
  • Single Router Approach

What does ensuring the 'confidentiality of data' achieve within secure administrative access tasks?

  • Authenticating user access
  • Restricting device accessibility
  • Preventing unauthorized disclosure of information (correct)
  • Authorizing administrative actions

Which of the following is NOT a guideline for creating strong passwords?

  • Using a password length of 10 or more characters
  • Using a mix of uppercase and lowercase letters
  • Using passwords based on easily identifiable information (correct)
  • Changing passwords often

Which command is used to enter an unencrypted password with a specified algorithm type?

<p><code>enable algorithm-type</code> (D)</p> Signup and view all the answers

What is privilege level 15 typically reserved for?

<p>Enable mode privileges (B)</p> Signup and view all the answers

In the context of privilege levels, what does the reset command option do?

<p>Resets the privilege level of a command (B)</p> Signup and view all the answers

Which mode grants access to all enable-level commands on a router?

<p>Privileged EXEC mode (privilege level 15) (C)</p> Signup and view all the answers

Which of the following is NOT a limitation of privilege levels?

<p>There's access control to specific interfaces, ports and logical interfaces on a router. (C)</p> Signup and view all the answers

What does a syslog server provide?

<p>A centralized system logging (C)</p> Signup and view all the answers

In a syslog message, which field denotes the source or cause of the system message?

<p>facility (D)</p> Signup and view all the answers

What does the acronym SNMP stand for?

<p>Simple Network Management Protocol (C)</p> Signup and view all the answers

What is the purpose of setting 'traps rules' in SNMP?

<p>To determine what message will be sent to the manager under certain conditions. (A)</p> Signup and view all the answers

Which SNMP version provides secure access to devices by authenticating and encrypting packets?

<p>SNMPv3 (B)</p> Signup and view all the answers

Which of the following BEST describes the advantage of 'message integrity & authentication' in SNMPv3?

<p>Guaranteeing the identity of the sender and the integrity of the message. (A)</p> Signup and view all the answers

When configuring SNMPv3 security, what is the initial step?

<p>Configure an ACL to permit the protected management network (A)</p> Signup and view all the answers

In syslog, if a message has a severity level of 0, what does this indicate?

<p>System Unusable (D)</p> Signup and view all the answers

What does 'routing hardening' refer to in the context of router security?

<p>Securing the router's operating system and configuration. (A)</p> Signup and view all the answers

Which of the following encryption algorithms is NOT an option when configuring a user as a member of the SNMP group in SNMPv3?

<p>rsa (B)</p> Signup and view all the answers

What is the potential risk associated with the SNMP actions 'get' and 'set'?

<p>They are vulnerabilities that can open SNMP to an attack. (C)</p> Signup and view all the answers

You are tasked with configuring a router to forward syslog messages to a central server. However, you need to ensure only critical events are sent. Which syslog severity level should the router be configured to send, at a minimum, to meet this requirement and why?

<p>Level 2 (Critical), because it represents conditions which need immediate attention. (A)</p> Signup and view all the answers

Defense in Depth involves utilizing a single firewall for network protection.

<p>False (B)</p> Signup and view all the answers

A DMZ is a highly secure zone for sensitive data storage.

<p>False (B)</p> Signup and view all the answers

Physical security, router OS security, and routing hardening are key areas of router security.

<p>True (A)</p> Signup and view all the answers

Restricting device accessibility is not a task of secure administrative access.

<p>False (B)</p> Signup and view all the answers

A strong password should be easy to guess.

<p>False (B)</p> Signup and view all the answers

Using a password length of less than 8 characters is a strong password practice.

<p>False (B)</p> Signup and view all the answers

It is recommended to write passwords down and leave them in an obvious place.

<p>False (B)</p> Signup and view all the answers

Configuring type 7 passwords provides stronger encryption than type 8 or type 9.

<p>False (B)</p> Signup and view all the answers

Privilege level 15 is reserved for enable mode.

<p>True (A)</p> Signup and view all the answers

User EXEC mode (privilege level 1) allows all enable-level commands.

<p>False (B)</p> Signup and view all the answers

Commands available at higher privilege levels are also available at lower privilege levels.

<p>False (B)</p> Signup and view all the answers

A syslog server consolidates system logs in one location.

<p>True (A)</p> Signup and view all the answers

In a Syslog message, the facility field denotes the destination IP address of the log.

<p>False (B)</p> Signup and view all the answers

SNMP is primarily designed to reconfigure physical hardware components within a network device.

<p>False (B)</p> Signup and view all the answers

An SNMP environment can have multiple managers for redundancy.

<p>False (B)</p> Signup and view all the answers

SNMPv1 offers enhanced security features, including encryption.

<p>False (B)</p> Signup and view all the answers

In SNMP, the manager uses 'traps' to request information from agents.

<p>False (B)</p> Signup and view all the answers

The primary advantage of SNMPv3 is reduced network overhead compared to previous versions.

<p>False (B)</p> Signup and view all the answers

Configuring an ACL is an optional step when implementing SNMPv3 security.

<p>False (B)</p> Signup and view all the answers

In SNMPv3 configuration, choosing des, 3des, or aes determines the hashing algorithm used for authentication.

<p>False (B)</p> Signup and view all the answers

Flashcards

Edge Router Security Approaches

Securing edge routers through single router, defense in depth, or DMZ approaches.

Three Areas of Router Security

Physical security, router OS/config file security, and routing hardening.

Secure Admin Access Tasks

Restrict access, log all activity, authenticate users, authorize actions, provide legal notices, and protect data.

Strong Password Guidelines

Use >=10 characters, mix case/numbers/symbols, avoid personal info, misspell, change often, and don't write down.

Signup and view all the flashcards

Secret Password Configuration

Type 8 or 9 passwords should be configured.

Signup and view all the flashcards

Router Privilege Levels

Level 0 (user), Level 1 (default), Levels 2-14 (customizable), Level 15 (enable mode).

Signup and view all the flashcards

Levels of Access Commands

User EXEC mode (level 1) and Privileged EXEC mode (level 15).

Signup and view all the flashcards

Limitations of Privilege Levels

No granular access, lower levels accessible at higher levels, higher levels not available at lower levels, keywords affect access.

Signup and view all the flashcards

Syslog Server Operation

Centralized logging, collects errors/logs, decodes events, aids intrusion detection.

Signup and view all the flashcards

Syslog Severity Levels

System Unusable is level 0, Debugging Message is level 7.

Signup and view all the flashcards

Syslog Message Format Fields

seq no, timestamp, facility, severity, MNEMONIC, description.

Signup and view all the flashcards

SNMP Definition

Collecting/organizing info about devices on IP networks and changing their behavior; monitors device status.

Signup and view all the flashcards

SNMP Devices

SNMP Agent and SNMP Manager (one only).

Signup and view all the flashcards

SNMP Versions

SNMPv1 (no security), SNMPv2c (no security), SNMPv3 (more secure).

Signup and view all the flashcards

SNMP Setup Steps

Set up management console, install agent software, set traps rules.

Signup and view all the flashcards

SNMP Communication Types

Traps (agent to manager) and Get/Set (manager to agent).

Signup and view all the flashcards

Advantages of SNMPv3

Message integrity/authentication, encryption, and access control.

Signup and view all the flashcards

Config Steps for SNMP v3

Configure ACL, SNMP view, SNMP group, and an SNMP account.

Signup and view all the flashcards

DMZ Approach

A security approach where a network is divided into different security zones, with the DMZ acting as a buffer between the internal network and the external, untrusted network.

Signup and view all the flashcards

Defense in Depth

Protecting a system by implementing security measures at multiple layers.

Signup and view all the flashcards

Enable algorithm command use

Use the 'enable algorithm-type' command and specify the encryption type (md5, scrypt, or sha256) and the unencrypted password.

Signup and view all the flashcards

Username Algorithm-type Command

Use the 'username name algorithm-type' command and specify the encryption type (md5, scrypt, or sha256) and the unencrypted password.

Signup and view all the flashcards

Study Notes

Edge Router Security Approaches

  • Single Router Approach: Uses a single router for network security.
  • Defense in Depth Approach: Employs multiple security layers, including firewalls.
  • DMZ Approach: Creates a demilitarized zone separating servers from the internal one; and is neither a military zone, nor secure zone.

Three Areas of Router Security

  • Physical security: Protection of the physical router device.
  • Router operating system and security configuration file: Secure the router's software and settings.
  • Routing hardening: Enhance the router's security through configurations.

Secure Administrative Access Tasks

  • Restrict device accessibility: Limit access to the router.
  • Log and account for all access: Track and monitor access.
  • Authenticate access: Verify user identity.
  • Authorize actions: Control user actions.
  • Present legal notification: Display legal notices during login.
  • Ensure data confidentiality: Protect sensitive information.

Strong Passwords Guidelines

  • Password length should be at least 10 characters.
  • Include uppercase, lowercase letters, numbers, symbols, and spaces.
  • Passwords should not be based on easily identifiable information.
  • Deliberate misspelling enhances password complexity (e.g., Smith = Smyth = 5mYth).
  • Change passwords regularly.
  • Avoid recording passwords in easily discoverable places.
  • Examples of weak passwords include simple dictionary words, mother's maiden names, car make or model, names and birthdays, or simple numbers.
  • Strong passwords combine alphanumeric characters, symbols, and spaces.

Secret Password Algorithms Guidelines

  • Type 8 or type 9 passwords should be used for all secret passwords.
  • Use the enable algorithm-type command syntax to enter an unencrypted password.
  • Specifies type 9 encryption with the username name algorithm-type command.

Privilege Levels

  • Level 0: Predefined for user-level access privileges.
  • Level 1: Default level for login with the router prompt.
  • Levels 2-14: Customizable for user-level privileges.
  • Level 15: Reserved for enable mode privileges.
  • User EXEC mode (privilege level 1) grants access to the lowest EXEC mode user privileges, enabling only user-level commands at the router prompt.
  • Privileged EXEC mode (privilege level 15) grants access to all enable-level commands at the router# prompt.

Limitations of Privilege Levels

  • No access control to specific interfaces, ports, logical interfaces, and slots on a router.
  • Commands available at lower privilege levels remain executable at higher privilege levels.
  • Commands specifically set at higher privilege levels are not available for lower privilege users.
  • Multiple keywords assigned to a command grants access to all commands using those keywords.

Syslog Server

  • Syslog servers offer centralized system logging.
  • Collects errors and system logs in one location.
  • Coordinate and decode system events across multiple systems.
  • Forwards event logs to an IDS/IPS for intrusion detection.
  • Monitor and keep records of network events.

Syslog Severity Levels

  • Emergency (Level 0): System Unusable.
  • Alert (Level 1): Immediate Action Needed.
  • Critical (Level 2): Critical Condition.
  • Error (Level 3): Error Condition.
  • Warning (Level 4): Warning Condition.
  • Notification (Level 5): Normal, but Significant Condition.
  • Informational (Level 6): Informational Message.
  • Debugging (Level 7): Debugging Message.

Syslog Message Format

  • Seq no: Stamps log messages with a sequence number if the service sequence-numbers command is configured.
  • Timestamp: Date and time of the message, appearing only if the service timestamps command is configured.
  • Facility: Refers to where the message originated.
  • Severity: Severity is indicated as a single-digit code from 0 to 7.
  • MNEMONIC: A unique text string describing the message.
  • Description: Provides detailed information about the event being reported through a text string.

Simple Network Management Protocol (SNMP)

  • SNMP collects, organizes, and modifies managed device information on IP networks
  • Monitors status of devices in a network.
  • Consists of one SNMP Manager and multiple agents.

Steps for SNMP

  • Management console setup on the management server
  • Install agent software on all network devices
  • Set trap rules to send messages to the manager i.e anytime the the memory utilization is >30 then notification, and when a memory is infected on the agents
  • SNMP versions include SNMPv1 (No security), SNMPv2c (No security), and SNMPv3 (More secured).
  • SNMPv3 uses authentication and packet encryption for secure device access.

Advantages of SNMPv3

  • Message integrity and authentication: Sender identity and integrity are guaranteed through authenticated transmissions
  • Encryption: Preserves privacy of SNMPv3 messages through encryption.
  • Access control: Allows agents to enforce access control to restrict each principal to certain actions on specific portions of data.

Configuring SNMPv3 Security

  • Step 1: Configure an ACL to permit the protected management network.
  • Step 2: Configure an SNMP view.
  • Step 3: Configure an SNMP group.
  • Step 4: Configure a user as a member of the SNMP group.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser