logging – audit steps

8
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the source interface command has been configured. Verify the IP address of the syslog server.

Upload: irene-ramsey

Post on 02-Jan-2016

144 views

Category:

Documents


1 download

DESCRIPTION

Logging – Audit Steps. Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the source interface command has been configured. Verify the IP address of the syslog server. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Logging – Audit Steps

• Verify that timestamps for debugging and logging messages has been enabled.

• Verify the severity level of events that are being captured.

• Verify that the source interface command has been configured.

• Verify the IP address of the syslog server.

Page 2: Logging – Audit Steps

• ACLs• Routing Protocol Authentication• CDP• VLANs• Switchport Security• VTP• DTP

Page 3: Logging – Audit Steps

• Cisco IOS uses access control lists to separate data traffic into that which it will process (permitted packets) and that which it will not process (denied packets).

• Cisco routers makes very heavy use of access lists:

• restrict access to services

• filter traffic passing through the router.

Page 4: Logging – Audit Steps

• An ACL is a sequential list of permit or deny statements that apply to addresses or upper-layer protocols.

• Static packet filtering controls access to a network by analyzing the incoming and outgoing packets

• By default, a router does not have any ACLs configured and therefore does not filter traffic.

Page 5: Logging – Audit Steps
Page 6: Logging – Audit Steps

• Standard ACLs - Allow you to filter traffic based on source IP address.

• Extended ACLs filter IP packets based on:

• Protocol type,

• Source IP address,

• Destination IP address

• TCP or UDP ports.

Page 7: Logging – Audit Steps

• Extended ACLs are used for more precise traffic-filtering control and are used more often than standard ACLs to provide a greater range of control.

Page 8: Logging – Audit Steps

• ICMP Packet Filtering - filter ICMP messages by name or type and code.

• Filter IP Fragments – Fragmentation is often used in attempts to evade detection by intrusion detection systems, deny IP fragments.

• Anti IP Address Spoofing – Deny any inbound IP packet that contains a source address from the internal network.

• Smurf Attack - deny packets destined for broadcast addresses.