exploration accessing wan chapter4
TRANSCRIPT
![Page 1: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/1.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE I Chapter 6 1
Enterprise Network Security
Accessing the WAN – Chapter 4
![Page 2: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/2.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 2
Objectives Describe the general methods used to mitigate
security threats to Enterprise networks
Configure Basic Router Security
Explain how to disable unused Cisco router network services and interfaces
Explain how to use Cisco SDM
Manage Cisco IOS devices
![Page 3: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/3.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 3
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain how sophisticated attack tools and open
networks have created an increased need for network security and dynamic security policies
![Page 4: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/4.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 4
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common security threats and how
they impact enterprises
![Page 5: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/5.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 5
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common types of network attacks
and how they impact enterprises
![Page 6: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/6.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 6
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the common mitigation techniques that
enterprises use to protect themselves against threats
![Page 7: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/7.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 7
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the concept of the Network Security Wheel
![Page 8: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/8.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 8
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the goals of a comprehensive security policy in
an organization
![Page 9: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/9.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 9
Configure Basic Router Security Explain why the security of routers and their
configuration settings is vital to network operation
![Page 10: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/10.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 10
Configure Basic Router Security Describe the recommended approach to applying Cisco
IOS security features on network routers
![Page 11: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/11.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 11
Configure Basic Router Security Describe the basic security measures needed to secure
Cisco routers
![Page 12: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/12.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 12
Explain How to Disable Unused Cisco Router Network Services and Interfaces Describe the router services and interfaces that are
vulnerable to network attack
![Page 13: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/13.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 13
Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain the vulnerabilities posed by commonly
configured management services
![Page 14: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/14.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 14
Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain how to secure a router with the command-line
interface (CLI) auto secure command
![Page 15: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/15.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 15
Explain How to Use Cisco SDM
Provide an overview of Cisco SDM
![Page 16: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/16.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 16
Explain How to Use Cisco SDM
Explain the steps to configure a router to use Cisco SDM
![Page 17: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/17.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 17
Explain How to Use Cisco SDM
Explain the steps you follow to start SDM
![Page 18: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/18.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 18
Explain How to Use Cisco SDM
Describe the Cisco SDM Interface
![Page 19: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/19.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 19
Explain How to Use Cisco SDM
Describe the commonly used Cisco SDM wizards
![Page 20: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/20.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 20
Explain How to Use Cisco SDM
Explain how to use Cisco SDM for locking down your router
![Page 21: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/21.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 21
Manage Cisco IOS Devices
Describe the file systems used by a Cisco router
![Page 22: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/22.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 22
Manage Cisco IOS Devices
Describe how to backup and upgrade a Cisco IOS image
![Page 23: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/23.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 23
Manage Cisco IOS Devices
Explain how to back up and upgrade Cisco IOS software images using a network server
![Page 24: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/24.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 24
Manage Cisco IOS Devices
Explain how to recover a Cisco IOS software image
![Page 25: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/25.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 25
Manage Cisco IOS Devices
Compare the use of the show and debug commands when troubleshooting Cisco router configurations
![Page 26: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/26.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 26
Manage Cisco IOS Devices
Explain how to recover the enable password and the enable secret passwords
![Page 27: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/27.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 27
Summary Security Threats to an Enterprise network include:
–Unstructured threats
–Structured threats
–External threats
–Internal threats
Methods to lessen security threats consist of:–Device hardening
–Use of antivirus software
–Firewalls
–Download security updates
![Page 28: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/28.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 28
Summary
Basic router security involves the following:–Physical security
–Update and backup IOS
–Backup configuration files
–Password configuration
–Logging router activity
Disable unused router interfaces & services to minimize their exploitation by intruders
Cisco SDM–A web based management tool for configuring security measures on Cisco routers
![Page 29: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/29.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 29
Summary
Cisco IOS Integrated File System (IFS)–Allows for the creation, navigation & manipulation of directories on a cisco device
![Page 30: Exploration Accessing WAN Chapter4](https://reader035.vdocuments.us/reader035/viewer/2022070318/55725c27497959da6be8bb8d/html5/thumbnails/30.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 30