Enterprise Network Security: Accessing The WAN - Chapter 4

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 44

Enterprise Network Security

Accessing the WAN Chapter 4

ITE I Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Objectives

Describe the general methods used to mitigate security threats to Enterprise networks
Configure Basic Router Security Explain how to disable unused Cisco router network services and interfaces Explain how to use Cisco SDM Manage Cisco IOS devices

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Why is Network Security important?

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

General Methods used to Mitigate Security Threats to Enterprise Networks


Sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Technological, Configuration & Security policy weaknesses

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Threats to physical infraestructure

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Threats to physical infraestructure

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Most common security threats and how they impact enterprises

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Most common types of network attacks and how they impact enterprises

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Common mitigation techniques

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14

Network Security Wheel

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15

The goals of a comprehensive security policy in an organization

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16

Security Policy

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17

The Role of Routers in Network Security


Advertise networks and filter who can use them. Provide access to network segments and subnetworks.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Configure Basic Router Security

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19

Approach to applying Cisco IOS security features on network routers

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Configure Basic Router Security

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21

Administrative Access

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23

Configuring SSH

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Router services and interfaces that are vulnerable to network attack

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25

Vulnerabilities posed by commonly configured management services

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27

How to Disable Unused Cisco Router Network Services and Interfaces

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28

Configuring RIP Authentication

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

29

EIGRP & OSPF authentication

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

30

Explain How to Use Cisco SDM

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

31

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

32

Steps you follow to start SDM

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

33

Cisco SDM Interface

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

34

Cisco SDM wizards

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

35

File systems used by a Cisco router

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

36

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

37

How to back up and upgrade Cisco IOS software

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

38

How to back up and upgrade Cisco IOS software

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

39

How to recover a Cisco IOS software image

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

40

How to recover a Cisco IOS software image

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

41

show and debug commands

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

42

How to recover the enable password and the enable secret passwords

Show version

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

43

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

44

You might also like