• Save
CCNA Discovery 2 - Chapter 8
Upcoming SlideShare
Loading in...5
×
 

CCNA Discovery 2 - Chapter 8

on

  • 2,092 views

 

Statistics

Views

Total Views
2,092
Views on SlideShare
2,092
Embed Views
0

Actions

Likes
2
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

CCNA Discovery 2 - Chapter 8 CCNA Discovery 2 - Chapter 8 Presentation Transcript

  • ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8Version 4.1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • Objectives Describe ISP security policies and procedures. Describe the tools used in implementing security at the ISP. Describe the monitoring and managing of the ISP. Describe the responsibilities of the ISP with regard to maintenance and recovery. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • ISP Security Considerations Helping clients to create secure passwords Securing applications Removing vulnerabilities Configuring firewalls Performing security scans © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • ISP Security ConsiderationsCommon security practices: Encrypting data stored on servers Using permissions to secure access Implement user accounts Assign levels of access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • ISP Security ConsiderationsThree steps used to reduce network vulnerability: Authentication Authorization Accounting © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • ISP Security Considerations Encryption: use the secure version of a protocol whenever confidential data is being exchanged © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • Security Tools Access control lists and port filtering protect against DoS and DDoS attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • Security Tools Firewalls use ACLs to control which traffic is passed or blocked © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • Security Tools Intrusion Detection System (IDS) Intrusion Prevention System (IPS) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • Security ToolsWireless security: Changing default settings Enabling authentication MAC filtering Encryption © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • Security Tools Host-based firewalls control inbound and outbound network traffic © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • Security ToolsTargets of host security: Known attacks Exploitable services Worms and viruses Back doors and Trojans © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • Monitoring and Managing the ISP Typical features of a Service Level Agreement (SLA): © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • Monitoring and Managing the ISP Monitoring network link performance © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • Monitoring and Managing the ISPIn-band management: Telnet Virtual Terminal (VTY) session Secure Shell (SSH): preferred for security © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • Monitoring and Managing the ISP SNMP enables administrators to gather data about the network Syslog uses syslog clients to generate and forward log messages to syslog servers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • Backups and Disaster RecoveryFactors in choosing backup media: Amount of data Cost of media Performance Reliability Ease of offsite storage © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • Backups and Disaster RecoveryMethods of file backup: Normal Differential Incremental © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • Backups and Disaster RecoveryHow to ensure successful backups: Swap media Review backup logs Trial restores Drive maintenance © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • Backups and Disaster Recovery Use TFTP to protect configurations and Cisco IOS software Restore a Cisco IOS image using TFTP in ROMmon mode © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • Backups and Disaster Recovery Steps to designing an effective recovery plan: © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • Backups and Disaster Recovery Phases to creating and implementing a disaster recovery plan: © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • Summary ISPs provide desktop security services for customers, such as creating passwords, implementing patches and updates, and assigning permissions. Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential. Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic. Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network. ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24