‫الطالب‬ ‫اسماء‬:1-‫الدين‬ ‫بدر‬ ‫ابوبكر‬2-‫العزيز‬ ‫عبد‬ ‫احمد‬
‫المدرب‬ ‫اسم‬:‫العديني‬ ‫ابراهيم‬
Introduction
 It is a set of actions which can provide maximum
protection of information and data in the networks of
all the risks that are threatened, and by providing the
necessary tools and means available to protect the
information from internal or external risks.
Three Areas of Router Security
 Physical security
 Operating system
 Router hardening
Cisco Router Passwords :
 All routers need a locally configured password for
privileged access and other access.
Cisco Router Passwords
 To steal passwords, attackers :
 Shoulder surf.
 Guess passwords based on the user's personal
information.
 Sniff TFTP packets containing plaintext configuration
files.
 Use readily available brute force attack tools such as
L0phtCrack or Cain & Abel.
 Strong passwords are the primary defense against
unauthorized access to a router!
Strong Passwords
 Passwords should NOT use dictionary words
 Dictionary words are vulnerable to dictionary attacks.
 Passwords may include the following:
 Any alphanumeric character.
 A mix of uppercase and lowercase characters.
 Symbols and spaces.
 A combination of letters, numbers, and symbols.
Disabling Unused Cisco
Router Network Services
and Interfaces
Vulnerable Router Services
 Medium size and large networks typically use a
firewall appliance (PIX / ASA) behind the perimeter
router, which adds security features and performs user
authentication and more advanced packet filtering.
 Firewall installations also facilitate the creation of
Demilitarized Zones (DMZs), where the firewall
‘places’ hosts that are commonly accessed from the
Internet.
CCP Security Audit Overview
 Security Audit compares router configuration against
recommended settings.
 Examples of the audit include:
 Shut down unneeded servers.
 Disable unneeded services.
 Apply the firewall to the outside interfaces.
 Disable or harden SNMP.
 Shut down unused interfaces.
 Check password strength.
 Enforce the use of ACLs.

Securing network devices

  • 1.
    ‫الطالب‬ ‫اسماء‬:1-‫الدين‬ ‫بدر‬‫ابوبكر‬2-‫العزيز‬ ‫عبد‬ ‫احمد‬ ‫المدرب‬ ‫اسم‬:‫العديني‬ ‫ابراهيم‬
  • 2.
    Introduction  It isa set of actions which can provide maximum protection of information and data in the networks of all the risks that are threatened, and by providing the necessary tools and means available to protect the information from internal or external risks.
  • 3.
    Three Areas ofRouter Security  Physical security  Operating system  Router hardening
  • 4.
    Cisco Router Passwords:  All routers need a locally configured password for privileged access and other access.
  • 5.
    Cisco Router Passwords To steal passwords, attackers :  Shoulder surf.  Guess passwords based on the user's personal information.  Sniff TFTP packets containing plaintext configuration files.  Use readily available brute force attack tools such as L0phtCrack or Cain & Abel.  Strong passwords are the primary defense against unauthorized access to a router!
  • 6.
    Strong Passwords  Passwordsshould NOT use dictionary words  Dictionary words are vulnerable to dictionary attacks.  Passwords may include the following:  Any alphanumeric character.  A mix of uppercase and lowercase characters.  Symbols and spaces.  A combination of letters, numbers, and symbols.
  • 7.
    Disabling Unused Cisco RouterNetwork Services and Interfaces
  • 8.
    Vulnerable Router Services Medium size and large networks typically use a firewall appliance (PIX / ASA) behind the perimeter router, which adds security features and performs user authentication and more advanced packet filtering.  Firewall installations also facilitate the creation of Demilitarized Zones (DMZs), where the firewall ‘places’ hosts that are commonly accessed from the Internet.
  • 9.
    CCP Security AuditOverview  Security Audit compares router configuration against recommended settings.  Examples of the audit include:  Shut down unneeded servers.  Disable unneeded services.  Apply the firewall to the outside interfaces.  Disable or harden SNMP.  Shut down unused interfaces.  Check password strength.  Enforce the use of ACLs.