Podcast
Questions and Answers
Which of the following is NOT a primary area to consider when implementing router security?
Which of the following is NOT a primary area to consider when implementing router security?
- Physical Security
- User Account Security (correct)
- Router Hardening
- Router Operating System and Configuration File Security
Which action is a critical task when securing administrative access to a network device?
Which action is a critical task when securing administrative access to a network device?
- Disabling authentication to improve usability.
- Allowing unrestricted access for all users.
- Using default passwords to simplify access.
- Logging and accounting for all access attempts. (correct)
Which of the following is generally considered a characteristic of a strong password?
Which of the following is generally considered a characteristic of a strong password?
- Using a simple dictionary word.
- A password that includes personal information such as a name or birthdate.
- A password that contains a mix of uppercase and lowercase letters, numbers, and symbols. (correct)
- A short password that is easy to remember.
What is the primary purpose of the service password-encryption
command on a Cisco router?
What is the primary purpose of the service password-encryption
command on a Cisco router?
Which command is used to configure a username with a specific privilege level on a Cisco device?
Which command is used to configure a username with a specific privilege level on a Cisco device?
What is the range of privilege levels available on a Cisco IOS device?
What is the range of privilege levels available on a Cisco IOS device?
What is a primary limitation of using privilege levels for command authorization?
What is a primary limitation of using privilege levels for command authorization?
What is the purpose of Role-Based CLI Access (RBAC) in network device management?
What is the purpose of Role-Based CLI Access (RBAC) in network device management?
Which of the following is a key benefit of using the Cisco IOS Resilient Configuration feature?
Which of the following is a key benefit of using the Cisco IOS Resilient Configuration feature?
What is the purpose of configuring syslog in a network environment?
What is the purpose of configuring syslog in a network environment?
Which syslog severity level indicates the most severe condition?
Which syslog severity level indicates the most severe condition?
What does SNMP primarily provide for network management?
What does SNMP primarily provide for network management?
Which of the following is the primary purpose of NTP (Network Time Protocol) in network security?
Which of the following is the primary purpose of NTP (Network Time Protocol) in network security?
What is the function of the Cisco AutoSecure feature?
What is the function of the Cisco AutoSecure feature?
What security measure can mitigate the consequences of routing protocol spoofing?
What security measure can mitigate the consequences of routing protocol spoofing?
What type of attack does Control Plane Policing (CoPP) help to mitigate?
What type of attack does Control Plane Policing (CoPP) help to mitigate?
An engineer wants to configure a Cisco router so that all passwords, including the enable password, are encrypted in the configuration file. Which command globally achieves this?
An engineer wants to configure a Cisco router so that all passwords, including the enable password, are encrypted in the configuration file. Which command globally achieves this?
An administrator needs to configure a router to send syslog messages to a central server with the IP address 192.168.1.10. Additionally, they want to ensure that only informational messages and above are logged. Which set of commands will accomplish this?
An administrator needs to configure a router to send syslog messages to a central server with the IP address 192.168.1.10. Additionally, they want to ensure that only informational messages and above are logged. Which set of commands will accomplish this?
An engineer is tasked with increasing the security of OSPF routing protocol advertisements. They decide to implement SHA authentication. Which set of commands is necessary to achieve this configuration on the interface?
An engineer is tasked with increasing the security of OSPF routing protocol advertisements. They decide to implement SHA authentication. Which set of commands is necessary to achieve this configuration on the interface?
A network administrator wants to harden a Cisco router against common security threats using the AutoSecure feature. However, they want to avoid being prompted for any interactive configuration options during the AutoSecure process. Which command should they use?
A network administrator wants to harden a Cisco router against common security threats using the AutoSecure feature. However, they want to avoid being prompted for any interactive configuration options during the AutoSecure process. Which command should they use?
Flashcards
Edge Router Security Approaches?
Edge Router Security Approaches?
Single Router, Defense in Depth, and DMZ.
Three Areas of Router Security?
Three Areas of Router Security?
Physical, Router Operating System and Configuration File Security and Router Hardening.
Secure Administrative Access Tasks?
Secure Administrative Access Tasks?
Restrict device access, log all access, authenticate, authorize, present legal notification, ensure data confidentiality.
Strong Password Guidelines?
Strong Password Guidelines?
Signup and view all the flashcards
Secret password algorithms?
Secret password algorithms?
Signup and view all the flashcards
Virtual login security enhancements?
Virtual login security enhancements?
Signup and view all the flashcards
What does banner motd do?
What does banner motd do?
Signup and view all the flashcards
Connecting to an SSH-Enabled Router?
Connecting to an SSH-Enabled Router?
Signup and view all the flashcards
Privilege command mode?
Privilege command mode?
Signup and view all the flashcards
Privilege Levels on a Cisco Router?
Privilege Levels on a Cisco Router?
Signup and view all the flashcards
Security operator privileges?
Security operator privileges?
Signup and view all the flashcards
Cisco IOS Resilient Configuration Feature?
Cisco IOS Resilient Configuration Feature?
Signup and view all the flashcards
Using Syslog for Network Security?
Using Syslog for Network Security?
Signup and view all the flashcards
Syslog Security Levels?
Syslog Security Levels?
Signup and view all the flashcards
Syslog Message?
Syslog Message?
Signup and view all the flashcards
Using SNMP for Network Security?
Using SNMP for Network Security?
Signup and view all the flashcards
Auto Secure Command Parameters?
Auto Secure Command Parameters?
Signup and view all the flashcards
What does the auto secure command wizard gathers information about?
What does the auto secure command wizard gathers information about?
Signup and view all the flashcards
Consequences of routing protocol spoofing?
Consequences of routing protocol spoofing?
Signup and view all the flashcards
Control and Management Planes?
Control and Management Planes?
Signup and view all the flashcards
Study Notes
Securing Network Devices
- Focuses on securing network devices, covering device access, administrative roles, monitoring, automated security features, and control plane security.
Securing the Edge Router
- Edge routers need physical security, OS and config file security, and router hardening.
- Security approaches can be single router, defense in depth with firewalls, or DMZ (Demilitarized Zone) approach.
Secure Administrative Access
- Restrict device accessibility.
- Log and account for all access attempts.
- Both authenticate and authorize access.
- Present legal notification.
- Ensure data confidentiality.
Local and Remote Access
- Local access is from a PC via Serial connection to the router.
- Remote access uses Telnet/SSH or Modem and Aux Port.
Strong Passwords
- Guidelines for strong passwords include using a length of 10+ characters.
- A mix of uppercase and lowercase letters, numbers, symbols, and spaces should be used.
- Passwords which contain easily identifiable pieces of information, should be avoided.
- Misspell passwords deliberately (e.g., Smith = Smyth = 5mYth).
- Change passwords often.
- Do not write passwords down and leave them where they can be seen.
Increasing Access Security
- Minimum password lengths should be configured using the
security passwords min-length
command. - The
service password-encryption
command encrypts passwords in the configuration. - The
exec-timeout
command sets the inactivity timeout for terminal lines.
Secret Password Algorithms
- Configure all secret passwords using type 8 or type 9 passwords
- Use the
enable algorithm-type
command to enter an unencrypted password. - Use the
username name algorithm-type
command to specify type 9 encryption.
Securing Line Access
- Secure console and aux lines by using the
login local
command and removing the password. - Enable SSH and use a local database for authentication on VTY lines.
Enhancing the Login Process
- Implement delays between successive login attempts.
- Enable login shutdown if DoS attacks are suspected.
- Generate system-logging messages for login detection.
Enable Login Enhancements
login block-for seconds attempts tries within seconds
is the command syntax.login delay 3
sets a delay of 3 seconds between login attempts.
Logging Failed Attempts
- Login Syslog messages can be generated with commands such as,
login on-success log [every login]
andlogin on-failure log [every login]
. - Can limit the rate with the command
security authentication failure rate threshold-rate log
- The
show login failures
command shows failed login attempts.
Configuring SSH
- Assign a hostname and domain name.
- Generate RSA keys with
crypto key generate rsa general-keys modulus 1024
. - Enable SSH
ip ssh version 2
. - Create a local user account with secured password.
- Configure VTY lines to use local login and SSH transport with commands such as,
login local
andtransport input ssh
.
Connecting to an SSH-Enabled Router
- SSH can be enabled, and a Cisco router can be used either as an SSH server or an SSH client.
- As a client, the router can connect via SSH to another SSH-enabled router
- An SSH client can be used if it's running on a host, such as PuTTY, OpenSSH, or TeraTerm.
Configuring Privilege Levels
- Privilege levels can be configured to control command availability.
- Levels range from 0 (user) to 15 (enable).
- The
privilege mode {level level | reset} command
command is used to set privilege levels for specific commands.
Limitations of Privilege Levels
No access control to specific interfaces, ports, logical interfaces, and slots on a router
- Commands available at lower privilege levels are always executable at higher privilege levels
- Commands specifically set at higher privilege levels are not available for lower privilege users
- Assigning a command with multiple keywords allows access to all commands that use those
Role-Based CLI Access
- Helps configure AAA, issue show commands, configure the firewall etc.
- Helps configure routing and interfaces.
Role-Based Views
- Views help configure interfaces.
- Superviews contain Views but not commands, two Superviews can use the same View.
Securing Cisco IOS Image and Configuration Files
- The Cisco IOS resilient configuration feature can be used.
- Feature is only available for systems that support a PCMCIA Advanced Technology Attachment (ATA) flash interface.
Cisco IOS Resilient Configuration Feature
- Configuration is copied to the bootset.
- Secures files to preserve storage, does not require extra space.
- Automatically detects image or configuration version mismatch.
- Disabling the feature can only be performed through a console session.
Enabling the IOS Image Resilience Feature
- Use the command,
secure boot-image
command to secure the running image. - Use the command,
secure boot-config
to secure the config archive. - Use the command,
show secure bootset
to show the image resilience router.
Using Syslog for Network Security
- Syslog is capable of logging system events.
Introduction to Syslog
- A Syslog server is required, and Router and Switch can send system messages to the Syslog server.
Syslog Message
- Various security levels exist from “emergencies” to “debugging”.
- Syslog messages contain a sequence number, timestamp, facility code, severity level, mnemonic, and description.
Configuring System Logging
logging host [hostname | ip-address]
configures the Syslog serverlogging trap level
sets the severity level to log.logging source-interface interface-type interface-number
specifies the source interface for Syslog messages.logging on
enables logging.
Introduction to SNMP
- Manages nodes through SNMP.
Using NTP
- Network Time Protocol (NTP) should be used for accurate timestamping between devices.
NTP Server
- Requires configuration with an NTP master.
NTP Authentication
- Requires authentication set.
Performing a Security Audit
- Security settings need to be verified for protocols and services.
- Unneccessary services/interfaces should be disabled.
- Management services must be disabled and restricted.
- Disable probes and scans and enable terminal access security.
- Disable Gratuitous and Proxy ARPs.
- Disable IP-directed broadcasts.
Locking Down a Router Using AutoSecure
- Auto Secure is for enhancing the security of the router.
Using the Cisco AutoSecure Feature
Important command parameters include: no-interact
, full
, forwarding
, management
, ntp
, login
, ssh
, firewall
and tcp-intercept
.
Using the auto secure Command
- An auto secure command is entered.
- A wizard gathers information about the outside interfaces.
- Management and forwarding planes are secured.
- A banner is prompted for.
- Password and login features are prompted for.
- Interfaces are secured.
Routing Protocol Spoofing
- Spoofing will redirect traffic to create routing loops.
- Traffic redirects could allow monitoring on an insecure link.
- Traffic redirects could allow discard.
OSPF MD5 Routing Protocol Authentication
- Requires setup and configuration.
OSPF SHA Routing Protocol Authentication
- Requires interface set and number.
Control Plane Policing
- The goal of policing is to protect the control plane.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.