enterprise network security

30
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4

Upload: hyman

Post on 05-Jan-2016

40 views

Category:

Documents


0 download

DESCRIPTION

Enterprise Network Security. Accessing the WAN – Chapter 4. Objectives. Describe the general methods used to mitigate security threats to Enterprise networks Configure Basic Router Security Explain how to disable unused Cisco router network services and interfaces - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0

Enterprise Network Security

Accessing the WAN – Chapter 4

Page 2: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2

Objectives Describe the general methods used to mitigate

security threats to Enterprise networks

Configure Basic Router Security

Explain how to disable unused Cisco router network services and interfaces

Explain how to use Cisco SDM

Manage Cisco IOS devices

Page 3: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain how sophisticated attack tools and open

networks have created an increased need for network security and dynamic security policies

Page 4: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common security threats and how

they impact enterprises

Page 5: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the most common types of network attacks

and how they impact enterprises

Page 6: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Describe the common mitigation techniques that

enterprises use to protect themselves against threats

Page 7: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the concept of the Network Security Wheel

Page 8: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Explain the goals of a comprehensive security policy in

an organization

Page 9: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Configure Basic Router Security Explain why the security of routers and their

configuration settings is vital to network operation

Page 10: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10

Configure Basic Router Security Describe the recommended approach to applying Cisco

IOS security features on network routers

Page 11: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Configure Basic Router Security Describe the basic security measures needed to secure

Cisco routers

Page 12: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12

Explain How to Disable Unused Cisco Router Network Services and Interfaces Describe the router services and interfaces that are

vulnerable to network attack

Page 13: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain the vulnerabilities posed by commonly

configured management services

Page 14: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14

Explain How to Disable Unused Cisco Router Network Services and Interfaces Explain how to secure a router with the command-line

interface (CLI) auto secure command

Page 15: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Explain How to Use Cisco SDM

Provide an overview of Cisco SDM

Page 16: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16

Explain How to Use Cisco SDM

Explain the steps to configure a router to use Cisco SDM

Page 17: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Explain How to Use Cisco SDM

Explain the steps you follow to start SDM

Page 18: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18

Explain How to Use Cisco SDM

Describe the Cisco SDM Interface

Page 19: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19

Explain How to Use Cisco SDM

Describe the commonly used Cisco SDM wizards

Page 20: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Explain How to Use Cisco SDM

Explain how to use Cisco SDM for locking down your router

Page 21: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Manage Cisco IOS Devices

Describe the file systems used by a Cisco router

Page 22: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22

Manage Cisco IOS Devices

Describe how to backup and upgrade a Cisco IOS image

Page 23: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23

Manage Cisco IOS Devices

Explain how to back up and upgrade Cisco IOS software images using a network server

Page 24: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Manage Cisco IOS Devices

Explain how to recover a Cisco IOS software image

Page 25: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25

Manage Cisco IOS Devices

Compare the use of the show and debug commands when troubleshooting Cisco router configurations

Page 26: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26

Manage Cisco IOS Devices

Explain how to recover the enable password and the enable secret passwords

Page 27: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27

Summary Security Threats to an Enterprise network include:

–Unstructured threats

–Structured threats

–External threats

–Internal threats

Methods to lessen security threats consist of:–Device hardening

–Use of antivirus software

–Firewalls

–Download security updates

Page 28: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28

Summary

Basic router security involves the following:–Physical security

–Update and backup IOS

–Backup configuration files

–Password configuration

–Logging router activity

Disable unused router interfaces & services to minimize their exploitation by intruders

Cisco SDM–A web based management tool for configuring security measures on Cisco routers

Page 29: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29

Summary

Cisco IOS Integrated File System (IFS)–Allows for the creation, navigation & manipulation of directories on a cisco device

Page 30: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30