enterprise network security
DESCRIPTION
Enterprise Network Security. Accessing the WAN – Chapter 4. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks. Sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/1.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE I Chapter 6 1
Enterprise Network Security
Accessing the WAN – Chapter 4
![Page 2: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/2.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 2
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Sophisticated attack tools and open networks have
created an increased need for network security and dynamic security policies
![Page 3: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/3.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 3
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Common security threats and how they impact
enterprises
![Page 4: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/4.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 4
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks
![Page 5: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/5.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 5
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Common mitigation techniques that enterprises use to
protect themselves against threats
![Page 6: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/6.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 6
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Network Security Wheel
![Page 7: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/7.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 7
Describe the General Methods used to Mitigate Security Threats to Enterprise Networks The goals of a comprehensive security policy in an
organization
![Page 8: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/8.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 8
Configure Basic Router Security Why the security of routers and their configuration
settings is vital to network operation
![Page 9: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/9.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 9
Configure Basic Router Security The recommended approach to applying Cisco IOS
security features on network routers
![Page 10: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/10.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 10
Configure Basic Router Security The basic security measures needed to secure Cisco
routers
![Page 11: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/11.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 11
Explain How to Disable Unused Cisco Router Network Services and Interfaces The router services and interfaces that are vulnerable
to network attack
![Page 12: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/12.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 12
Explain How to Disable Unused Cisco Router Network Services and Interfaces The vulnerabilities posed by commonly configured
management services
![Page 13: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/13.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 13
Explain How to Disable Unused Cisco Router Network Services and Interfaces Secure a router with the command-line interface (CLI)
auto secure command
![Page 14: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/14.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 14
Explain How to Use Cisco SDM
Configure a router to use Cisco SDM
![Page 15: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/15.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 15
Explain How to Use Cisco SDM
The steps you follow to start SDM
![Page 16: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/16.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 16
Explain How to Use Cisco SDM
The Cisco SDM Interface
![Page 17: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/17.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 17
Explain How to Use Cisco SDM
The commonly used Cisco SDM wizards
![Page 18: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/18.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 18
Explain How to Use Cisco SDM
Use Cisco SDM for locking down your router
![Page 19: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/19.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 19
Manage Cisco IOS Devices
The file systems used by a Cisco router
![Page 20: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/20.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 20
Manage Cisco IOS Devices
Backup and upgrade a Cisco IOS image
![Page 21: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/21.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 21
Manage Cisco IOS Devices
Back up and upgrade Cisco IOS software images using a network server
![Page 22: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/22.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 22
Manage Cisco IOS Devices
How to recover a Cisco IOS software image
![Page 23: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/23.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 23
Manage Cisco IOS Devices
How to recover the enable password and the enable secret passwords
![Page 24: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/24.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 24
Summary Security Threats to an Enterprise network include:
–Unstructured threats
–Structured threats
–External threats
–Internal threats
Methods to lessen security threats consist of:–Device hardening
–Use of antivirus software
–Firewalls
–Download security updates
![Page 25: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/25.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 25
Summary
Basic router security involves the following:–Physical security
–Update and backup IOS
–Backup configuration files
–Password configuration
–Logging router activity
Disable unused router interfaces & services to minimize their exploitation by intruders
Cisco SDM–A web based management tool for configuring security measures on Cisco routers
![Page 26: Enterprise Network Security](https://reader030.vdocuments.mx/reader030/viewer/2022032313/56812c61550346895d90f2b9/html5/thumbnails/26.jpg)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 26
Summary
Cisco IOS Integrated File System (IFS)–Allows for the creation, navigation & manipulation of directories on a cisco device