SlideShare a Scribd company logo
1 of 86
1
© 2009 Cisco Learning Institute.
CCNA Security
Chapter Two
Securing Network Devices
2
2
2
© 2009 Cisco Learning Institute.
Lesson Planning
• This lesson should take 3-6 hours to present
• The lesson should include lecture,
demonstrations, discussion and assessment
• The lesson can be taught in person or using
remote instruction
3
3
3
© 2009 Cisco Learning Institute.
Major Concepts
• Discuss the aspects of router hardening
• Configure secure administrative access and
router resiliency
• Configure network devices for monitoring
administrative access
• Demonstrate network monitoring techniques
• Secure IOS-based Routers using automated
features
4
4
4
© 2009 Cisco Learning Institute.
Lesson Objectives
Upon completion of this lesson, the successful participant
will be able to:
1. Describe how to configure a secure network perimeter
2. Demonstrate the configuration of secure router administration
access
3. Describe how to enhance the security for virtual logins
4. Describe the steps to configure an SSH daemon for secure
remote management
5. Describe the purpose and configuration of administrative privilege
levels
6. Configure the role-based CLI access feature to provide
hierarchical administrative access
5
5
5
© 2009 Cisco Learning Institute.
Lesson Objectives
7. Use the Cisco IOS resilient configuration feature to secure the
Cisco IOS image and configuration files
8. Describe the factors to consider when securing the data that
transmits over the network related to the network management
and reporting of device activity
9. Configure syslog for network security
10.Configure SNMP for network security
11.Configure NTP to enable accurate time stamping between all
devices
12.Describe the router services, interfaces, and management
services that are vulnerable to network attacks and perform a
security audit
13.Lock down a router using AutoSecure
14.Lock down a router using SDM
6
6
6
© 2009 Cisco Learning Institute.
Securing Device Access
• Securing the Edge Router
• Configuring Secure Administrative Access
• Configuring Support for Virtual Logins
• Configuring SSH
7
7
7
© 2009 Cisco Learning Institute.
The Edge Router
• What is the edge router?
- The last router between the internal network and an untrusted
network such as the Internet
- Functions as the first and last line of defense
- Implements security actions based on the organization’s security
policies
• How can the edge router be secured?
- Use various perimeter router implementations
- Consider physical security, operating system security, and router
hardening
- Secure administrative access
- Local versus remote router access
8
8
8
© 2009 Cisco Learning Institute.
Perimeter Implementations
• Single Router Approach
A single router connects the
internal LAN to the Internet. All
security policies are
configured on this device.
• Defense-in-depth Approach
Passes everything through to
the firewall. A set of rules
determines what traffic the
router will allow or deny.
• DMZ Approach
The DMZ is set up between
two routers. Most traffic
filtering left to the firewall
LAN 1
192.168.2.0
Router 1 (R1)
Internet
LAN 1
192.168.2.0
R1
Internet
Firewall
LAN 1
192.168.2.0
R1
Internet
R2
Firewall
DMZ
9
9
9
© 2009 Cisco Learning Institute.
Areas of Router Security
• Physical Security
- Place router in a secured, locked room
- Install an uninterruptible power supply
• Operating System Security
- Use the latest stable version that meets network requirements
- Keep a copy of the O/S and configuration file as a backup
• Router Hardening
- Secure administrative control
- Disable unused ports and interfaces
- Disable unnecessary services
10
10
10
© 2009 Cisco Learning Institute.
Securing Administrative Access
• Restrict Device Accessibility - Limit the accessible ports,
restrict the permitted communicators and restrict the
permitted methods of access.
• Log and Account for all Access - Record anyone who
accesses a device.
- Authenticate Access: Ensure access is only granted to
authenticated users, groups, and services.
- Authorize Actions: Restrict the actions and views permitted by any
particular user, group, or service.
• Present Legal Notification - Display legal notice for
interactive sessions.
• Ensure the Confidentiality of Data - Protect locally stored
sensitive data from viewing and copying.
11
11
11
© 2009 Cisco Learning Institute.
Local Versus Remote Access
Internet
LAN 1
R1
Local Access
Administrator
Console Port
LAN 2
R1
Internet
R2
Firewall
LAN 3
Management
LAN
Administration
Host
Logging
Host
Remote Access
Uses Telnet, SSH HTTP or SNMP
connections to the router from a computer
Requires a direct connection to a
console port using a computer
running terminal emulation software
12
12
12
© 2009 Cisco Learning Institute.
Secure Administrative Access
• Passwords
• Access Port Passwords
• Password Security
• Creating Users
13
13
13
© 2009 Cisco Learning Institute.
Passwords
An acceptable password length is 10 or more characters
Complex passwords include a mix
of upper and lowercase letters,
numbers, symbols and spaces
Avoid any password based on repetition,
dictionary words, letter or number
sequences, usernames, relative or pet
names, or biographical information
Deliberately misspell a password
(Security = 5ecur1ty)
Change passwords often
Do not write passwords down and
leave them in obvious places
14
14
14
© 2009 Cisco Learning Institute.
Access Port Passwords
R1
R1(config)# enable secret cisco
R1(config)# line con 0
R1(config-line)# password cisco
R1(config-line)# login
R1(config)# line aux 0
R1(config-line)# password cisco
R1(config-line)# login
R1(config)# line vty 0 4
R1(config-line)# password cisco
R1(config-line)# login
Command to restrict access to
privileged EXEC mode
Commands to establish a
login password on the
console line
Commands to establish a login
password on incoming Telnet sessions
Commands to establish a
login password for dial-up
modem connections
15
15
15
© 2009 Cisco Learning Institute.
Password Security
To increase the security of passwords, use additional
configuration parameters:
- Minimum password lengths should be enforced
- Unattended connections should be disabled
- All passwords in the configuration file should be encrypted
R1(config)# service password-encryption
R1(config)# exit
R1# show running-config
line con 0
exec-timeout 3 30
password 7 094F471A1A0A
login
line aux 0
exec-timeout 3 30
password 7 094F471A1A0A
login
16
16
16
© 2009 Cisco Learning Institute.
Creating Users
Parameter Description
name This parameter specifies the username.
0 (Optional) This option indicates that the plaintext
password is to be hashed by the router using MD5.
password This parameter is the plaintext password to be
hashed using MD5.
5 This parameter indicates that the encrypted-secret
password was hashed using MD5.
encrypted-secret This parameter is the MD5 encrypted-secret
password that is stored as the encrypted user
password.
username name secret {[0]password|5encrypted-secret}
17
17
17
© 2009 Cisco Learning Institute.
Virtual Logins
• Virtual Login Security
• Enhanced Login Features
• System Logging Messages
• Banner Messages
18
18
18
© 2009 Cisco Learning Institute.
Virtual Login Security
Welcome to SPAN
Engineering
User Access Verification
Password: cisco
Password: cisco1
Password: cisco12
Password: cisco123
Password: cisco1234
Password: cisco12345
Password: cisco123456
Implement delays between
successive login attempts
Enable login shutdown if DoS
attacks are suspected
Generate system logging
messages for login detection
Tips:
19
19
19
© 2009 Cisco Learning Institute.
Enhanced Login Features
The following commands are available to configure a Cisco
IOS device to support the enhanced login features:
20
20
20
© 2009 Cisco Learning Institute.
login block-for Command
All login enhancement features are disabled by
default. The login block-for command enables
configuration of the login enhancement features.
- The login block-for feature monitors login device
activity and operates in two modes:
o Normal-Mode (Watch-Mode) —The router keeps count of the
number of failed login attempts within an identified amount of
time.
o Quiet-Mode (Quiet Period) — If the number of failed logins
exceeds the configured threshold, all login attempts made
using Telnet, SSH, and HTTP are denied.
21
21
21
© 2009 Cisco Learning Institute.
System Logging Messages
• To generate log messages for successful/failed logins:
- login on-failure log
- login on-success log
• To generate a message when failure rate is exceeded:
- security authentication failure rate threshold-
rate log
• To verify that the login block-for command is configured
and which mode the router is currently in:
- show login
• To display more information regarding the failed attempts:
- show login failures
22
22
22
© 2009 Cisco Learning Institute.
Banner Messages
• Banners are disabled by default and must be explicitly
enabled.
• There are four valid tokens for use within the message
section of the banner command:
- $(hostname)—Displays the hostname for the router
- $(domain)—Displays the domain name for the router
- $(line)—Displays the vty or tty (asynchronous) line number
- $(line-desc)—Displays the description that is attached to the
line
R1(config)# banner {exec | incoming | login | motd | slip-ppp} d message d
23
23
23
© 2009 Cisco Learning Institute.
SSH version 1, 2
• Configuring Router
• SSH Commands
• Connecting to Router
• Using SDM to configure the SSH Daemon
What's the difference between versions 1
and 2 of the SSH protocol?
24
24
24
© 2009 Cisco Learning Institute.
Preliminary Steps
Complete the following prior to configuring routers for
the SSH protocol:
1. Ensure that the target routers are running a Cisco IOS Release
12.1(1)T image or later to support SSH.
2. Ensure that each of the target routers has a unique hostname.
3. Ensure that each of the target routers is using the correct
domain name of the network.
4. Ensure that the target routers are configured for local
authentication, or for authentication, authorization, and
accounting (AAA) services for username or password
authentication, or both. This is mandatory for a router-to-router
SSH connection.
25
25
25
© 2009 Cisco Learning Institute.
Configuring the Router for SSH
R1# conf t
R1(config)# ip domain-name span.com
R1(config)# crypto key generate rsa general-keys
modulus 1024
The name for the keys will be: R1.span.com
% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-
exportable...[OK]
R1(config)#
*Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has
been enabled
R1(config)# username Bob secret cisco
R1(config)# line vty 0 4
R1(config-line)# login local
R1(config-line)# transport input ssh
R1(config-line)# exit
1. Configure the IP domain
name of the network
2. Generate one way
secret key
3. Verify or create a local
database entry
4. Enable VTY inbound
SSH sessions
26
26
26
© 2009 Cisco Learning Institute.
Optional SSH Commands
R1# show ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication
retries: 3
R1#
R1# conf t
Enter configuration commands, one per line. End
with CNTL/Z.
R1(config)# ip ssh version 2
R1(config)# ip ssh time-out 60
R1(config)# ip ssh authentication-retries 2
R1(config)# ^Z
R1#
R1# show ip ssh
SSH Enabled - version 2.0
Authentication timeout: 60 secs; Authentication
retries: 2
R1#
27
27
27
© 2009 Cisco Learning Institute.
Connecting to the Router
There are two different ways to
connect to an SSH-enabled router:
- Connect using an SSH-enabled Cisco
router
- Connect using an SSH client running
on a host.
R1# sho ssh
Connection Version Mode Encryption Hmac State Username
0 2.0 IN aes128-cbc hmac-sha1 Session started Bob
0 2.0 OUT aes128-cbc hmac-sha1 Session started Bob
%No SSHv1 server connections running.
R1#
R1# sho ssh
%No SSHv2 server connections running.
%No SSHv1 server connections running.
R1#
R2# ssh -l Bob 192.168.2.101
Password:
R1>
1
2
3
There are no current SSH sessions ongoing with R1.
R2 establishes an SSH connection with R1.
There is an incoming and outgoing SSHv2 session user Bob.
28
28
28
© 2009 Cisco Learning Institute.
Using SDM
1. Choose Configure > Additional Tasks > Router Access > SSH
2. Possible status options:
- RSA key is not set on this router
- RSA key is set on this router
3. Enter a modulus size and
generate a key, if there is
no key configured
4. To configure SSH on the vty lines,
choose Configure > Additional
Tasks > Router Access > VTY
29
29
29
© 2009 Cisco Learning Institute.
Assigning Administrative Roles
• Configuring Privilege Levels
• Configuring Role-Based CLI Access
30
30
30
© 2009 Cisco Learning Institute.
Configuring Privilege Levels
• Introduction
• Privilege CLI Command
• Privilege Level for Users
• Assigning Usernames
• Disadvantages
31
31
31
© 2009 Cisco Learning Institute.
Config AAA, Show,
Firewall, IDS/IPS,
NetFlow
Configuring for Privilege Levels
• By default:
- User EXEC mode (privilege level 1)
- Privileged EXEC mode (privilege level 15)
• Sixteen privilege levels available
• Methods of providing privileged level access
infrastructure access:
- Privilege Levels
- Role-Based CLI Access
32
32
32
© 2009 Cisco Learning Institute.
Privilege CLI Command
router(config)# privilege mode {level level command | reset command}
Command Description
mode Specifies the configuration mode. Use the privilege ?
command to see a complete list of router configuration
modes available
level (Optional) Enables setting a privilege level with a
specified command
level command (Optional) The privilege level associated with a
command (specify up to 16 privilege levels, using
numbers 0 to 15)
reset (Optional) Resets the privilege level of a command
Command (Optional) Resets the privilege level
33
33
33
© 2009 Cisco Learning Institute.
Privilege Levels for Users
• A USER account with normal, Level 1 access.
• A SUPPORT account with Level 1 and ping command access.
• A JR-ADMIN account with the same privileges as the SUPPORT
account plus access to the reload command.
• An ADMIN account which has all of the regular privileged EXEC
commands.
R1# conf t
R1(config)# username USER privilege 1 secret cisco
R1(config)#
R1(config)# privilege exec level 5 ping
R1(config)# enable secret level 5 cisco5
R1(config)# username SUPPORT privilege 5 secret cisco5
R1(config)#
R1(config)# privilege exec level 10 reload
R1(config)# enable secret level 10 cisco10
R1(config)# username JR-ADMIN privilege 10 secret cisco10
R1(config)#
R1(config)# username ADMIN privilege 15 secret cisco123
R1(config)#
34
34
34
© 2009 Cisco Learning Institute.
Privilege Levels
R1> enable 5
Password:
R1# <cisco5>
R1# show privilege
Current privilege level is 5
R1#
R1# reload
Translating "reload"
Translating "reload"
% Unknown command or computer name, or unable to find computer
address
R1#
The enable level command is used to switch
from Level 1 to Level 5
The show privilege command displays
The current privilege level
The user cannot us the reload command
35
35
35
© 2009 Cisco Learning Institute.
Privilege Level Limitations
• There is no access control to specific interfaces, ports,
logical interfaces, and slots on a router
• Commands available at lower privilege levels are always
executable at higher levels.
• Commands specifically set on a higher privilege level are
not available for lower-privileged users.
• Assigning a command with multiple keywords to a
specific privilege level also assigns any commands
associated with the first keywords to the same privilege
level.
36
36
36
© 2009 Cisco Learning Institute.
Configuring Role-Based CLI Access
• Role-Based CLI
• Types of Views
• Creating and Managing a View
• View Commands
• Verifying a View
37
37
37
© 2009 Cisco Learning Institute.
Role-Based CLI
• Controls which commands are available to specific roles
• Different views of router configurations created for
different users providing:
- Security: Defines the set of CLI commands that is accessible by
a particular user by controlling user access to configure specific
ports, logical interfaces, and slots on a router
- Availability: Prevents unintentional execution of CLI commands
by unauthorized personnel
- Operational Efficiency: Users only see the CLI commands
applicable to the ports and CLI to which they have access
38
38
38
© 2009 Cisco Learning Institute.
Role-Based Views
• Root View
To configure any view for the system, the administrator must be in
the root view. Root view has all of the access privileges as a user
who has level 15 privileges.
• View
A specific set of commands can be bundled into a “CLI view”.
Each view must be assigned all commands associated with that
view and there is no inheritance of commands from other views.
Additionally, commands may be reused within several views.
• Superview
Allow a network administrator to assign users and groups of users
multiple CLI views at once instead of having to assign a single
CLI view per user with all commands associated to that one CLI
view.
39
39
39
© 2009 Cisco Learning Institute.
Creating and Managing a View
1. Enable aaa with the global configuration command aaa new-
model. Exit, and enter the root view with the command enable
view command.
2. Create a view using the parser view view-name command.
3. Assign a secret password to the view using the secret
encrypted-password command.
4. Assign commands to the selected view using the parser-mode
{include | include-exclusive | exclude} [all]
[interface interface-name | command] command in view
configuration mode.
5. Exit the view configuration mode by typing the command exit.
40
40
40
© 2009 Cisco Learning Institute.
View Commands
router# enable [view [view-name]]
Command is used to enter the CLI view.
Parameter Description
view Enters view, which enables users to configure CLI views.
This keyword is required if you want to configure a CLI view.
view-name (Optional) Enters or exits a specified CLI view.
This keyword can be used to switch from one CLI view to
another CLI view.
router(config)# parser view view-name
Creates a view and enters view configuration mode.
router(config-view)# secret encrypted-password
• Sets a password to protect access to the View.
• Password must be created immediately after creating a view
41
41
41
© 2009 Cisco Learning Institute.
Creating and Managing a Superview
1. Create a view using the parser view view-
name superview command and enter
superview configuration mode.
2. Assign a secret password to the view using the
secret encrypted-password command.
3. Assign an existing view using the view view-
name command in view configuration mode.
4. Exit the superview configuration mode by typing
the command exit.
42
42
42
© 2009 Cisco Learning Institute.
Verifying a View
R1# show parser view
No view is active ! Currently in Privilege Level Context
R1#
R1# enable view
Password:
*Mar 1 10:38:56.233: %PARSER-6-VIEW_SWITCH: successfully set to view 'root'.
R1#
R1# show parser view
Current view is 'root'
R1#
R1# show parser view all
Views/SuperViews Present in System:
SHOWVIEW
VERIFYVIEW
43
43
43
© 2009 Cisco Learning Institute.
Monitoring and Managing Devices
• Securing the IOS Image and Configuration Files
• Secure Management and Reporting
• Using syslog
• Using SNMP
• Using NTP
44
44
44
© 2009 Cisco Learning Institute.
Securing the Image and Configuration
Files
• Resilient Configuration Facts
• Restoring Primary bootset
• Password Recovery Procedures
• Preventing Password Recovery
45
45
45
© 2009 Cisco Learning Institute.
Resilient Configuration Facts
• The configuration file in the primary
bootset is a copy of the running
configuration that was in the router when
the feature was first enabled.
• The feature secures the smallest working
set of files to preserve persistent storage
space. No extra space is required to
secure the primary IOS image file.
• The feature automatically detects image
or configuration version mismatch.
• Only local storage is used for securing
files.
• The feature can be disabled only through
a console session.
R1# erase
startup-config
Erasing the
nvram filesystem
will remove all
configuration
files! Continue?
[confirm]
46
46
46
© 2009 Cisco Learning Institute.
CLI Commands
router(config)#
secure boot-image
 Enables Cisco IOS image resilience
secure boot-config
router(config)#
 Takes a snapshot of the router running configuration and securely
archives it in persistent storage
47
47
47
© 2009 Cisco Learning Institute.
Restoring Primary bootset
To restore a primary bootset from a secure archive:
1. Reload the router using the reload command.
2. From ROMMON mode, enter the dir command to list the contents
of the device that contains the secure bootset file. The device name
can be found in the output of the show secure bootset
command.
3. Boot up the router using the secure bootset image using the boot
command with the filename found in step 2. Once the compromised
router boots, proceed to privileged EXEC mode and restore the
configuration.
4. Enter global configuration mode using conf t.
5. Restore the secure configuration to the supplied filename using the
secure boot-config restore filename.
48
48
48
© 2009 Cisco Learning Institute.
Password Recovery Procedures
1. Connect to the console port.
2. Use the show version command to view and record the
configuration register
3. Use the power switch to turn off the router, and then turn the router
back on.
4. Press Break on the terminal keyboard within 60 seconds of power
up to put the router into ROMmon.
5. At the rommon 1> prompt Type config 0x2142.
6. Type reset at the rommon 2> prompt. The router reboots, but
ignores the saved configuration.
7. Type no after each setup question, or press Ctrl-C to skip the initial
setup procedure.
8. Type enable at the Router> prompt.
49
49
49
© 2009 Cisco Learning Institute.
Password Recovery Procedures, 2
9. Type copy startup-config running-config to copy the
NVRAM into memory.
10. Type show running-config.
11. Enter global configuration and type the enable secret command
to change the enable secret password.
12. Issue the no shutdown command on every interface to be used.
Once enabled, issue a show ip interface brief command.
Every interface to be used should display ‘up up’.
13. Type config-register configuration_register_setting.
The configuration_register_setting is either the value recorded in
Step 2 or 0x2102 .
14. Save configuration changes using the copy running-config
startup-config command.
50
50
50
© 2009 Cisco Learning Institute.
Preventing Password Recovery
R1(config)# no service password-recovery
WARNING:
Executing this command will disable password recovery mechanism.
Do not execute this command without another plan for password recovery.
Are you sure you want to continue? [yes/no]: yes
R1(config)
R1# sho run
Building configuration...
Current configuration : 836 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
no service password-recovery
System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2006 by cisco Systems, Inc.
PLD version 0x10
GIO ASIC version 0x127
c1841 platform with 131072 Kbytes of main memory
Main memory is configured to 64 bit mode with parity disabled
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED
program load complete, entry point: 0x8000f000, size: 0xcb80
51
51
51
© 2009 Cisco Learning Institute.
Secure Management and Reporting
• Implementing Secure Management
• Planning
• Factors to Consider
52
52
52
© 2009 Cisco Learning Institute.
Implementing Secure Management
• Configuration Change Management
- Know the state of critical network devices
- Know when the last modifications occurred
- Ensure the right people have access when new management
methodologies are adopted
- Know how to handle tools and devices no longer used
• Automated logging and reporting of information from
identified devices to management hosts
• Available applications and protocols like SNMP
53
53
53
© 2009 Cisco Learning Institute.
Planning
• When logging and managing information, the
information flow between management hosts and
the managed devices can take two paths:
- Out-of-band (OOB): Information flows on a
dedicated management network on which no
production traffic resides.
- In-band: Information flows across an enterprise
production network, the Internet, or both using regular
data channels.
54
54
54
© 2009 Cisco Learning Institute.
Factors to Consider
• OOB management appropriate for large
enterprise networks
• In-band management recommended in smaller
networks providing a more cost-effective security
deployment
• Be aware of security vulnerabilities of using
remote management tools with in-band
management
55
55
55
© 2009 Cisco Learning Institute.
Using Syslog
• Implementing Router Logging
• Syslog
• Configuring System Logging
• Enabling Syslog using SDM/CCP
56
56
56
© 2009 Cisco Learning Institute.
Implementing Router Logging
Configure the router to send log messages to:
• Console: Console logging is used when modifying or
testing the router while it is connected to the console.
Messages sent to the console are not stored by the
router and, therefore, are not very valuable as security
events.
• Terminal lines: Configure enabled EXEC sessions to
receive log messages on any terminal lines. Similar to
console logging, this type of logging is not stored by the
router and, therefore, is only valuable to the user on that
line.
57
57
57
© 2009 Cisco Learning Institute.
Implementing Router Logging
• Buffered logging: Store log messages in router memory.
Log messages are stored for a time, but events are
cleared whenever the router is rebooted.
• SNMP traps: Certain thresholds can be preconfigured.
Events can be processed by the router and forwarded as
SNMP traps to an external SNMP server. Requires the
configuration and maintenance of an SNMP system.
• Syslog: Configure routers to forward log messages to an
external syslog service. This service can reside on any
number of servers, including Microsoft Windows and
UNIX-based systems, or the Cisco Security MARS
appliance.
58
58
58
© 2009 Cisco Learning Institute.
Syslog
• Syslog servers: Known as log hosts, these systems
accept and process log messages from syslog clients.
• Syslog clients: Routers or other types of equipment that
generate and forward log messages to syslog servers.
e0/0
10.2.1.1 e0/1
10.2.2.1
e0/2
10.2.3.1
User 10.2.3.3
Public Web
Server
10.2.2.3
Mail
Server
10.2.2.4
Administrator
Server
10.2.2.5
Syslog
Server 10.2.3.2
Protected LAN
10.2.3.0/24
DMZ LAN 10.2.2.0/24
Syslog Client
R3
59
59
59
© 2009 Cisco Learning Institute.
Configuring System Logging
R3(config)# logging 10.2.2.6
R3(config)# logging trap informational
R3(config)# logging source-interface loopback 0
R3(config)# logging on
1. Set the destination logging host
2. Set the log severity (trap) level
3. Set the source interface
4. Enable logging
Turn logging on and off using the
logging buffered, logging
monitor, and logging commands
60
60
60
© 2009 Cisco Learning Institute.
Enabling Syslog Using SDM/CCP
1. Choose Configure > Additional Tasks > Router Properties > Logging
2. Click Edit
3. Check Enable Logging
Level and choose the
desired logging level
4. Click Add, and enter
an IP address of a
logging host
5. Click OK
61
61
61
© 2009 Cisco Learning Institute.
Monitor Logging with SDM
1. Choose Monitor > Logging
4. Monitor the messages, update the
screen to show the most current log
entries, and clear all syslog
messages from the router log buffer
2. See the logging hosts to which
the router logs messages
3. Choose the minimum severity level
62
62
62
© 2009 Cisco Learning Institute.
Monitor Logging Remotely
• Logs can easily be viewed
through the SDM, or for easier
use, through a syslog viewer on
any remote system.
• There are numerous Free
remote syslog viewers, Kiwi is
relatively basic and free.
• Configure the router/switch/etc
to send logs to the PC’s ip
address that has kiwi installed.
• Kiwi automatically listens for
syslog messages and displays
them.
63
63
63
© 2009 Cisco Learning Institute.
Using SNMP for Network Security
• SNMP
• Community Strings
• SNMPv3
• Security Levels
• Trap Receivers
64
64
64
© 2009 Cisco Learning Institute.
SNMP
• Developed to manage nodes, such as servers,
workstations, routers, switches, hubs, and security
appliances on an IP network
• All versions are Application Layer protocols that facilitate
the exchange of management information between
network devices
• Part of the TCP/IP protocol suite
• Enables network administrators to manage network
performance, find and solve network problems, and plan
for network growth
• Three separate versions of SNMP
65
65
65
© 2009 Cisco Learning Institute.
Community Strings
Provides read-only access to all
objects in the MIB except the
community strings.
Provides read-write access to
all objects in the MIB except the
community strings.
A text string that can authenticate messages
between a management station and an SNMP
agent and allow access to the information in MIBs
66
66
66
© 2009 Cisco Learning Institute.
SNMPv3
Agent may enforce access
control to restrict each principal
to certain actions on certain
portions of its data.
Managed
Node
Managed
Node
Managed
Node
Managed
Node
Messages may be
encrypted to ensure
privacy
NMS
NMS
Transmissions from manager to
agent may be authenticated to
guarantee the identity of the sender
and the integrity and timeliness of a
message.
Encrypted Tunnel
67
67
67
© 2009 Cisco Learning Institute.
Security Levels
• noAuth: Authenticates a packet by a string match of the
username or community string
• auth: Authenticates a packet by using either the Hashed
Message Authentication Code (HMAC) with Message
Digest 5 (MD5) method or Secure Hash Algorithms
(SHA) method.
• Priv: Authenticates a packet by using either the HMAC
MD5 or HMAC SHA algorithms and encrypts the packet
using the Data Encryption Standard (DES), Triple DES
(3DES), or Advanced Encryption Standard (AES)
algorithms.
68
68
68
© 2009 Cisco Learning Institute.
Trap Receivers
1. Click Edit
2. Click Add
3. Enter the IP address or
the hostname of the
trap receiver and the
password
4. Click OK
6. When the trap receiver list
is complete, click OK
5. To edit or delete an existing trap receiver,
choose a trap receiver from the trap
receiver list and click Edit or Delete
69
69
69
© 2009 Cisco Learning Institute.
Using NTP
• Uses
• Timekeeping
• Features/Functions
• Enabling NTP using SDM/CCP
70
70
70
© 2009 Cisco Learning Institute.
Uses
• Clocks on hosts and network devices must be
maintained and synchronized to ensure that log
messages are synchronized with one another
• The date and time settings of the router can be
set using one of two methods:
- Manually edit the date and time
- Configure Network Time Protocol
71
71
71
© 2009 Cisco Learning Institute.
Timekeeping
• Pulling the clock time from the Internet means that unsecured
packets are allowed through the firewall
• Many NTP servers on the Internet do not require any authentication
of peers
• Devices are given the IP address of NTP masters. In an NTP
configured network, one or more routers are designated as the
master clock keeper (known as an NTP Master) using the ntp
master global configuration command.
• NTP clients either contact the master or listen for messages from the
master to synchronize their clocks. To contact the server, use the
ntp server ntp-server-address command.
• In a LAN environment, NTP can be configured to use IP broadcast
messages instead, by using the ntp broadcast client command.
72
72
72
© 2009 Cisco Learning Institute.
Features/Functions
• There are two security mechanisms available:
- An ACL-based restriction scheme
- An encrypted authentication mechanism such as offered by NTP
version 3 or higher
• Implement NTP version 3 or higher. Use the following
commands on both NTP Master and the NTP client.
- ntp authenticate
- ntp authentication key md5 value
- ntp trusted-key key-value
73
73
73
© 2009 Cisco Learning Institute.
Enabling NTP
1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP
2. Click Add
3. Add an NTP server by
name or by IP address
4. Choose the interface
that the router will use
to communicate with
the NTP server
5. Check Prefer if this
NTP server is a
preferred server (more
than one is allowed)
6. If authentication is used,
check Authentication
Key and enter the key
number, the key value,
and confirm the key value.
7. Click OK
74
74
74
© 2009 Cisco Learning Institute.
Automated Security Features
• Performing Security Audits
• Using Automated Tools
• Locking Down a Router Using SDM
75
75
75
© 2009 Cisco Learning Institute.
Performing a Security Audit
• Security Practices
• Security Audit
• Security Audit Wizard
76
76
76
© 2009 Cisco Learning Institute.
Security Practices
• Determine what devices should use CDP
• To ensure a device is secure:
- Disable unnecessary services and interfaces
- Disable and restrict commonly configured management
services, such as SNMP
- Disable probes and scans, such as ICMP
- Ensure terminal access security
- Disable gratuitous and proxy Address Resolution Protocol (ARP)
- Disable IP-directed broadcast
77
77
77
© 2009 Cisco Learning Institute.
SDM Security Audit
Perform Security Audit
letting the
administrator choose
configuration changes
to implement
One-Step Lockdown
automatically makes
all recommended
security-related
configuration changes
78
78
78
© 2009 Cisco Learning Institute.
Security Audit Wizard
Compares router configuration
against recommended settings:
• Shut down unneeded servers
• Disable unneeded services
• Apply the firewall to the outside
interfaces
• Disable or harden SNMP
• Shut down unused interfaces
• Check password strength
• Enforce the use of ACLs
79
79
79
© 2009 Cisco Learning Institute.
Using Automated Tools
• Cisco AutoSecure
• AutoSecure Command
80
80
80
© 2009 Cisco Learning Institute.
Cisco AutoSecure
• Initiated from CLI and executes a script. The
AutoSecure feature first makes
recommendations for fixing security
vulnerabilities, and then modifies the security
configuration of the router.
• Can lockdown the management plane functions
and the forwarding plane services and functions
of a router
• Used to provide a baseline security policy on a
new router
81
81
81
© 2009 Cisco Learning Institute.
Auto Secure Command
• Command to enable the Cisco AutoSecure
feature setup:
auto secure [no-interact]
• In Interactive mode, the router prompts with
options to enable and disable services and other
security features. This is the default mode but
can also be configured using the auto secure
full command.
82
82
82
© 2009 Cisco Learning Institute.
Auto Secure Command
R1# auto secure ?
firewall AutoSecure Firewall
forwarding Secure Forwarding Plane
full Interactive full session of AutoSecure
login AutoSecure Login
management Secure Management Plane
no-interact Non-interactive session of AutoSecure
ntp AutoSecure NTP
ssh AutoSecure SSH
tcp-intercept AutoSecure TCP Intercept
<cr>
R1#
auto secure [no-interact | full] [forwarding | management ]
[ntp | login | ssh | firewall | tcp-intercept]
router#
83
83
83
© 2009 Cisco Learning Institute.
Locking Down a Router
• Cisco One-step Lockdown
• Limitations
84
84
84
© 2009 Cisco Learning Institute.
Cisco One-step Lockdown
Tests router configuration
for any potential security
problems and
automatically makes the
necessary configuration
changes to correct any
problems found
85
85
85
© 2009 Cisco Learning Institute.
AutoSecure Versus SDM Security
Audit One-Step Lockdown
R1# auto secure
--- AutoSecure Configuration ---
*** AutoSecure configuration enhances the
security of the router, but it will not make
it absolutely resistant to all security
attacks ***
AutoSecure will modify the configuration of
your device.
All configuration changes will be shown. For a
detailed explanation of how the configuration
changes enhance security and any possible side
effects, please refer to Cisco.com for
Autosecure documentation.
Cisco AutoSecure also:
• Disables NTP
• Configures AAA
• Sets SPD values
• Enables TCP intercepts
• Configures anti-spoofing ACLs on
outside-facing interfaces
SDM implements some the
following features differently:
• SNMP is disabled but will not
configure SNMPv3
• SSH is enabled and configured with
images that support this feature.
• Secure Copy Protocol (SCP) is not
enabled--unsecure FTP is.
86
86
86
© 2009 Cisco Learning Institute.

More Related Content

Similar to Cisco CCNA Security Chapter Two Securing Network Devices

CCNA_Security_03.ppt
CCNA_Security_03.pptCCNA_Security_03.ppt
CCNA_Security_03.pptveracru1
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideHarris Andrea
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overviewali raza
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2limenih muluneh
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenĐô GiẢn
 
ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptxargost1003
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overviewali raza
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10Chaing Ravuth
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP RoutingSara Rock
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 

Similar to Cisco CCNA Security Chapter Two Securing Network Devices (20)

CCNA_Security_03.ppt
CCNA_Security_03.pptCCNA_Security_03.ppt
CCNA_Security_03.ppt
 
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptxCCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Chapter08
Chapter08Chapter08
Chapter08
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chen
 
ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptx
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overview
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Ccnas v11 ch02_eb
Ccnas v11 ch02_ebCcnas v11 ch02_eb
Ccnas v11 ch02_eb
 
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Cisco CCNA Security Chapter Two Securing Network Devices

  • 1. 1 © 2009 Cisco Learning Institute. CCNA Security Chapter Two Securing Network Devices
  • 2. 2 2 2 © 2009 Cisco Learning Institute. Lesson Planning • This lesson should take 3-6 hours to present • The lesson should include lecture, demonstrations, discussion and assessment • The lesson can be taught in person or using remote instruction
  • 3. 3 3 3 © 2009 Cisco Learning Institute. Major Concepts • Discuss the aspects of router hardening • Configure secure administrative access and router resiliency • Configure network devices for monitoring administrative access • Demonstrate network monitoring techniques • Secure IOS-based Routers using automated features
  • 4. 4 4 4 © 2009 Cisco Learning Institute. Lesson Objectives Upon completion of this lesson, the successful participant will be able to: 1. Describe how to configure a secure network perimeter 2. Demonstrate the configuration of secure router administration access 3. Describe how to enhance the security for virtual logins 4. Describe the steps to configure an SSH daemon for secure remote management 5. Describe the purpose and configuration of administrative privilege levels 6. Configure the role-based CLI access feature to provide hierarchical administrative access
  • 5. 5 5 5 © 2009 Cisco Learning Institute. Lesson Objectives 7. Use the Cisco IOS resilient configuration feature to secure the Cisco IOS image and configuration files 8. Describe the factors to consider when securing the data that transmits over the network related to the network management and reporting of device activity 9. Configure syslog for network security 10.Configure SNMP for network security 11.Configure NTP to enable accurate time stamping between all devices 12.Describe the router services, interfaces, and management services that are vulnerable to network attacks and perform a security audit 13.Lock down a router using AutoSecure 14.Lock down a router using SDM
  • 6. 6 6 6 © 2009 Cisco Learning Institute. Securing Device Access • Securing the Edge Router • Configuring Secure Administrative Access • Configuring Support for Virtual Logins • Configuring SSH
  • 7. 7 7 7 © 2009 Cisco Learning Institute. The Edge Router • What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as the first and last line of defense - Implements security actions based on the organization’s security policies • How can the edge router be secured? - Use various perimeter router implementations - Consider physical security, operating system security, and router hardening - Secure administrative access - Local versus remote router access
  • 8. 8 8 8 © 2009 Cisco Learning Institute. Perimeter Implementations • Single Router Approach A single router connects the internal LAN to the Internet. All security policies are configured on this device. • Defense-in-depth Approach Passes everything through to the firewall. A set of rules determines what traffic the router will allow or deny. • DMZ Approach The DMZ is set up between two routers. Most traffic filtering left to the firewall LAN 1 192.168.2.0 Router 1 (R1) Internet LAN 1 192.168.2.0 R1 Internet Firewall LAN 1 192.168.2.0 R1 Internet R2 Firewall DMZ
  • 9. 9 9 9 © 2009 Cisco Learning Institute. Areas of Router Security • Physical Security - Place router in a secured, locked room - Install an uninterruptible power supply • Operating System Security - Use the latest stable version that meets network requirements - Keep a copy of the O/S and configuration file as a backup • Router Hardening - Secure administrative control - Disable unused ports and interfaces - Disable unnecessary services
  • 10. 10 10 10 © 2009 Cisco Learning Institute. Securing Administrative Access • Restrict Device Accessibility - Limit the accessible ports, restrict the permitted communicators and restrict the permitted methods of access. • Log and Account for all Access - Record anyone who accesses a device. - Authenticate Access: Ensure access is only granted to authenticated users, groups, and services. - Authorize Actions: Restrict the actions and views permitted by any particular user, group, or service. • Present Legal Notification - Display legal notice for interactive sessions. • Ensure the Confidentiality of Data - Protect locally stored sensitive data from viewing and copying.
  • 11. 11 11 11 © 2009 Cisco Learning Institute. Local Versus Remote Access Internet LAN 1 R1 Local Access Administrator Console Port LAN 2 R1 Internet R2 Firewall LAN 3 Management LAN Administration Host Logging Host Remote Access Uses Telnet, SSH HTTP or SNMP connections to the router from a computer Requires a direct connection to a console port using a computer running terminal emulation software
  • 12. 12 12 12 © 2009 Cisco Learning Institute. Secure Administrative Access • Passwords • Access Port Passwords • Password Security • Creating Users
  • 13. 13 13 13 © 2009 Cisco Learning Institute. Passwords An acceptable password length is 10 or more characters Complex passwords include a mix of upper and lowercase letters, numbers, symbols and spaces Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information Deliberately misspell a password (Security = 5ecur1ty) Change passwords often Do not write passwords down and leave them in obvious places
  • 14. 14 14 14 © 2009 Cisco Learning Institute. Access Port Passwords R1 R1(config)# enable secret cisco R1(config)# line con 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line aux 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login Command to restrict access to privileged EXEC mode Commands to establish a login password on the console line Commands to establish a login password on incoming Telnet sessions Commands to establish a login password for dial-up modem connections
  • 15. 15 15 15 © 2009 Cisco Learning Institute. Password Security To increase the security of passwords, use additional configuration parameters: - Minimum password lengths should be enforced - Unattended connections should be disabled - All passwords in the configuration file should be encrypted R1(config)# service password-encryption R1(config)# exit R1# show running-config line con 0 exec-timeout 3 30 password 7 094F471A1A0A login line aux 0 exec-timeout 3 30 password 7 094F471A1A0A login
  • 16. 16 16 16 © 2009 Cisco Learning Institute. Creating Users Parameter Description name This parameter specifies the username. 0 (Optional) This option indicates that the plaintext password is to be hashed by the router using MD5. password This parameter is the plaintext password to be hashed using MD5. 5 This parameter indicates that the encrypted-secret password was hashed using MD5. encrypted-secret This parameter is the MD5 encrypted-secret password that is stored as the encrypted user password. username name secret {[0]password|5encrypted-secret}
  • 17. 17 17 17 © 2009 Cisco Learning Institute. Virtual Logins • Virtual Login Security • Enhanced Login Features • System Logging Messages • Banner Messages
  • 18. 18 18 18 © 2009 Cisco Learning Institute. Virtual Login Security Welcome to SPAN Engineering User Access Verification Password: cisco Password: cisco1 Password: cisco12 Password: cisco123 Password: cisco1234 Password: cisco12345 Password: cisco123456 Implement delays between successive login attempts Enable login shutdown if DoS attacks are suspected Generate system logging messages for login detection Tips:
  • 19. 19 19 19 © 2009 Cisco Learning Institute. Enhanced Login Features The following commands are available to configure a Cisco IOS device to support the enhanced login features:
  • 20. 20 20 20 © 2009 Cisco Learning Institute. login block-for Command All login enhancement features are disabled by default. The login block-for command enables configuration of the login enhancement features. - The login block-for feature monitors login device activity and operates in two modes: o Normal-Mode (Watch-Mode) —The router keeps count of the number of failed login attempts within an identified amount of time. o Quiet-Mode (Quiet Period) — If the number of failed logins exceeds the configured threshold, all login attempts made using Telnet, SSH, and HTTP are denied.
  • 21. 21 21 21 © 2009 Cisco Learning Institute. System Logging Messages • To generate log messages for successful/failed logins: - login on-failure log - login on-success log • To generate a message when failure rate is exceeded: - security authentication failure rate threshold- rate log • To verify that the login block-for command is configured and which mode the router is currently in: - show login • To display more information regarding the failed attempts: - show login failures
  • 22. 22 22 22 © 2009 Cisco Learning Institute. Banner Messages • Banners are disabled by default and must be explicitly enabled. • There are four valid tokens for use within the message section of the banner command: - $(hostname)—Displays the hostname for the router - $(domain)—Displays the domain name for the router - $(line)—Displays the vty or tty (asynchronous) line number - $(line-desc)—Displays the description that is attached to the line R1(config)# banner {exec | incoming | login | motd | slip-ppp} d message d
  • 23. 23 23 23 © 2009 Cisco Learning Institute. SSH version 1, 2 • Configuring Router • SSH Commands • Connecting to Router • Using SDM to configure the SSH Daemon What's the difference between versions 1 and 2 of the SSH protocol?
  • 24. 24 24 24 © 2009 Cisco Learning Institute. Preliminary Steps Complete the following prior to configuring routers for the SSH protocol: 1. Ensure that the target routers are running a Cisco IOS Release 12.1(1)T image or later to support SSH. 2. Ensure that each of the target routers has a unique hostname. 3. Ensure that each of the target routers is using the correct domain name of the network. 4. Ensure that the target routers are configured for local authentication, or for authentication, authorization, and accounting (AAA) services for username or password authentication, or both. This is mandatory for a router-to-router SSH connection.
  • 25. 25 25 25 © 2009 Cisco Learning Institute. Configuring the Router for SSH R1# conf t R1(config)# ip domain-name span.com R1(config)# crypto key generate rsa general-keys modulus 1024 The name for the keys will be: R1.span.com % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non- exportable...[OK] R1(config)# *Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has been enabled R1(config)# username Bob secret cisco R1(config)# line vty 0 4 R1(config-line)# login local R1(config-line)# transport input ssh R1(config-line)# exit 1. Configure the IP domain name of the network 2. Generate one way secret key 3. Verify or create a local database entry 4. Enable VTY inbound SSH sessions
  • 26. 26 26 26 © 2009 Cisco Learning Institute. Optional SSH Commands R1# show ip ssh SSH Enabled - version 1.99 Authentication timeout: 120 secs; Authentication retries: 3 R1# R1# conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip ssh version 2 R1(config)# ip ssh time-out 60 R1(config)# ip ssh authentication-retries 2 R1(config)# ^Z R1# R1# show ip ssh SSH Enabled - version 2.0 Authentication timeout: 60 secs; Authentication retries: 2 R1#
  • 27. 27 27 27 © 2009 Cisco Learning Institute. Connecting to the Router There are two different ways to connect to an SSH-enabled router: - Connect using an SSH-enabled Cisco router - Connect using an SSH client running on a host. R1# sho ssh Connection Version Mode Encryption Hmac State Username 0 2.0 IN aes128-cbc hmac-sha1 Session started Bob 0 2.0 OUT aes128-cbc hmac-sha1 Session started Bob %No SSHv1 server connections running. R1# R1# sho ssh %No SSHv2 server connections running. %No SSHv1 server connections running. R1# R2# ssh -l Bob 192.168.2.101 Password: R1> 1 2 3 There are no current SSH sessions ongoing with R1. R2 establishes an SSH connection with R1. There is an incoming and outgoing SSHv2 session user Bob.
  • 28. 28 28 28 © 2009 Cisco Learning Institute. Using SDM 1. Choose Configure > Additional Tasks > Router Access > SSH 2. Possible status options: - RSA key is not set on this router - RSA key is set on this router 3. Enter a modulus size and generate a key, if there is no key configured 4. To configure SSH on the vty lines, choose Configure > Additional Tasks > Router Access > VTY
  • 29. 29 29 29 © 2009 Cisco Learning Institute. Assigning Administrative Roles • Configuring Privilege Levels • Configuring Role-Based CLI Access
  • 30. 30 30 30 © 2009 Cisco Learning Institute. Configuring Privilege Levels • Introduction • Privilege CLI Command • Privilege Level for Users • Assigning Usernames • Disadvantages
  • 31. 31 31 31 © 2009 Cisco Learning Institute. Config AAA, Show, Firewall, IDS/IPS, NetFlow Configuring for Privilege Levels • By default: - User EXEC mode (privilege level 1) - Privileged EXEC mode (privilege level 15) • Sixteen privilege levels available • Methods of providing privileged level access infrastructure access: - Privilege Levels - Role-Based CLI Access
  • 32. 32 32 32 © 2009 Cisco Learning Institute. Privilege CLI Command router(config)# privilege mode {level level command | reset command} Command Description mode Specifies the configuration mode. Use the privilege ? command to see a complete list of router configuration modes available level (Optional) Enables setting a privilege level with a specified command level command (Optional) The privilege level associated with a command (specify up to 16 privilege levels, using numbers 0 to 15) reset (Optional) Resets the privilege level of a command Command (Optional) Resets the privilege level
  • 33. 33 33 33 © 2009 Cisco Learning Institute. Privilege Levels for Users • A USER account with normal, Level 1 access. • A SUPPORT account with Level 1 and ping command access. • A JR-ADMIN account with the same privileges as the SUPPORT account plus access to the reload command. • An ADMIN account which has all of the regular privileged EXEC commands. R1# conf t R1(config)# username USER privilege 1 secret cisco R1(config)# R1(config)# privilege exec level 5 ping R1(config)# enable secret level 5 cisco5 R1(config)# username SUPPORT privilege 5 secret cisco5 R1(config)# R1(config)# privilege exec level 10 reload R1(config)# enable secret level 10 cisco10 R1(config)# username JR-ADMIN privilege 10 secret cisco10 R1(config)# R1(config)# username ADMIN privilege 15 secret cisco123 R1(config)#
  • 34. 34 34 34 © 2009 Cisco Learning Institute. Privilege Levels R1> enable 5 Password: R1# <cisco5> R1# show privilege Current privilege level is 5 R1# R1# reload Translating "reload" Translating "reload" % Unknown command or computer name, or unable to find computer address R1# The enable level command is used to switch from Level 1 to Level 5 The show privilege command displays The current privilege level The user cannot us the reload command
  • 35. 35 35 35 © 2009 Cisco Learning Institute. Privilege Level Limitations • There is no access control to specific interfaces, ports, logical interfaces, and slots on a router • Commands available at lower privilege levels are always executable at higher levels. • Commands specifically set on a higher privilege level are not available for lower-privileged users. • Assigning a command with multiple keywords to a specific privilege level also assigns any commands associated with the first keywords to the same privilege level.
  • 36. 36 36 36 © 2009 Cisco Learning Institute. Configuring Role-Based CLI Access • Role-Based CLI • Types of Views • Creating and Managing a View • View Commands • Verifying a View
  • 37. 37 37 37 © 2009 Cisco Learning Institute. Role-Based CLI • Controls which commands are available to specific roles • Different views of router configurations created for different users providing: - Security: Defines the set of CLI commands that is accessible by a particular user by controlling user access to configure specific ports, logical interfaces, and slots on a router - Availability: Prevents unintentional execution of CLI commands by unauthorized personnel - Operational Efficiency: Users only see the CLI commands applicable to the ports and CLI to which they have access
  • 38. 38 38 38 © 2009 Cisco Learning Institute. Role-Based Views • Root View To configure any view for the system, the administrator must be in the root view. Root view has all of the access privileges as a user who has level 15 privileges. • View A specific set of commands can be bundled into a “CLI view”. Each view must be assigned all commands associated with that view and there is no inheritance of commands from other views. Additionally, commands may be reused within several views. • Superview Allow a network administrator to assign users and groups of users multiple CLI views at once instead of having to assign a single CLI view per user with all commands associated to that one CLI view.
  • 39. 39 39 39 © 2009 Cisco Learning Institute. Creating and Managing a View 1. Enable aaa with the global configuration command aaa new- model. Exit, and enter the root view with the command enable view command. 2. Create a view using the parser view view-name command. 3. Assign a secret password to the view using the secret encrypted-password command. 4. Assign commands to the selected view using the parser-mode {include | include-exclusive | exclude} [all] [interface interface-name | command] command in view configuration mode. 5. Exit the view configuration mode by typing the command exit.
  • 40. 40 40 40 © 2009 Cisco Learning Institute. View Commands router# enable [view [view-name]] Command is used to enter the CLI view. Parameter Description view Enters view, which enables users to configure CLI views. This keyword is required if you want to configure a CLI view. view-name (Optional) Enters or exits a specified CLI view. This keyword can be used to switch from one CLI view to another CLI view. router(config)# parser view view-name Creates a view and enters view configuration mode. router(config-view)# secret encrypted-password • Sets a password to protect access to the View. • Password must be created immediately after creating a view
  • 41. 41 41 41 © 2009 Cisco Learning Institute. Creating and Managing a Superview 1. Create a view using the parser view view- name superview command and enter superview configuration mode. 2. Assign a secret password to the view using the secret encrypted-password command. 3. Assign an existing view using the view view- name command in view configuration mode. 4. Exit the superview configuration mode by typing the command exit.
  • 42. 42 42 42 © 2009 Cisco Learning Institute. Verifying a View R1# show parser view No view is active ! Currently in Privilege Level Context R1# R1# enable view Password: *Mar 1 10:38:56.233: %PARSER-6-VIEW_SWITCH: successfully set to view 'root'. R1# R1# show parser view Current view is 'root' R1# R1# show parser view all Views/SuperViews Present in System: SHOWVIEW VERIFYVIEW
  • 43. 43 43 43 © 2009 Cisco Learning Institute. Monitoring and Managing Devices • Securing the IOS Image and Configuration Files • Secure Management and Reporting • Using syslog • Using SNMP • Using NTP
  • 44. 44 44 44 © 2009 Cisco Learning Institute. Securing the Image and Configuration Files • Resilient Configuration Facts • Restoring Primary bootset • Password Recovery Procedures • Preventing Password Recovery
  • 45. 45 45 45 © 2009 Cisco Learning Institute. Resilient Configuration Facts • The configuration file in the primary bootset is a copy of the running configuration that was in the router when the feature was first enabled. • The feature secures the smallest working set of files to preserve persistent storage space. No extra space is required to secure the primary IOS image file. • The feature automatically detects image or configuration version mismatch. • Only local storage is used for securing files. • The feature can be disabled only through a console session. R1# erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
  • 46. 46 46 46 © 2009 Cisco Learning Institute. CLI Commands router(config)# secure boot-image  Enables Cisco IOS image resilience secure boot-config router(config)#  Takes a snapshot of the router running configuration and securely archives it in persistent storage
  • 47. 47 47 47 © 2009 Cisco Learning Institute. Restoring Primary bootset To restore a primary bootset from a secure archive: 1. Reload the router using the reload command. 2. From ROMMON mode, enter the dir command to list the contents of the device that contains the secure bootset file. The device name can be found in the output of the show secure bootset command. 3. Boot up the router using the secure bootset image using the boot command with the filename found in step 2. Once the compromised router boots, proceed to privileged EXEC mode and restore the configuration. 4. Enter global configuration mode using conf t. 5. Restore the secure configuration to the supplied filename using the secure boot-config restore filename.
  • 48. 48 48 48 © 2009 Cisco Learning Institute. Password Recovery Procedures 1. Connect to the console port. 2. Use the show version command to view and record the configuration register 3. Use the power switch to turn off the router, and then turn the router back on. 4. Press Break on the terminal keyboard within 60 seconds of power up to put the router into ROMmon. 5. At the rommon 1> prompt Type config 0x2142. 6. Type reset at the rommon 2> prompt. The router reboots, but ignores the saved configuration. 7. Type no after each setup question, or press Ctrl-C to skip the initial setup procedure. 8. Type enable at the Router> prompt.
  • 49. 49 49 49 © 2009 Cisco Learning Institute. Password Recovery Procedures, 2 9. Type copy startup-config running-config to copy the NVRAM into memory. 10. Type show running-config. 11. Enter global configuration and type the enable secret command to change the enable secret password. 12. Issue the no shutdown command on every interface to be used. Once enabled, issue a show ip interface brief command. Every interface to be used should display ‘up up’. 13. Type config-register configuration_register_setting. The configuration_register_setting is either the value recorded in Step 2 or 0x2102 . 14. Save configuration changes using the copy running-config startup-config command.
  • 50. 50 50 50 © 2009 Cisco Learning Institute. Preventing Password Recovery R1(config)# no service password-recovery WARNING: Executing this command will disable password recovery mechanism. Do not execute this command without another plan for password recovery. Are you sure you want to continue? [yes/no]: yes R1(config) R1# sho run Building configuration... Current configuration : 836 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption no service password-recovery System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 2006 by cisco Systems, Inc. PLD version 0x10 GIO ASIC version 0x127 c1841 platform with 131072 Kbytes of main memory Main memory is configured to 64 bit mode with parity disabled PASSWORD RECOVERY FUNCTIONALITY IS DISABLED program load complete, entry point: 0x8000f000, size: 0xcb80
  • 51. 51 51 51 © 2009 Cisco Learning Institute. Secure Management and Reporting • Implementing Secure Management • Planning • Factors to Consider
  • 52. 52 52 52 © 2009 Cisco Learning Institute. Implementing Secure Management • Configuration Change Management - Know the state of critical network devices - Know when the last modifications occurred - Ensure the right people have access when new management methodologies are adopted - Know how to handle tools and devices no longer used • Automated logging and reporting of information from identified devices to management hosts • Available applications and protocols like SNMP
  • 53. 53 53 53 © 2009 Cisco Learning Institute. Planning • When logging and managing information, the information flow between management hosts and the managed devices can take two paths: - Out-of-band (OOB): Information flows on a dedicated management network on which no production traffic resides. - In-band: Information flows across an enterprise production network, the Internet, or both using regular data channels.
  • 54. 54 54 54 © 2009 Cisco Learning Institute. Factors to Consider • OOB management appropriate for large enterprise networks • In-band management recommended in smaller networks providing a more cost-effective security deployment • Be aware of security vulnerabilities of using remote management tools with in-band management
  • 55. 55 55 55 © 2009 Cisco Learning Institute. Using Syslog • Implementing Router Logging • Syslog • Configuring System Logging • Enabling Syslog using SDM/CCP
  • 56. 56 56 56 © 2009 Cisco Learning Institute. Implementing Router Logging Configure the router to send log messages to: • Console: Console logging is used when modifying or testing the router while it is connected to the console. Messages sent to the console are not stored by the router and, therefore, are not very valuable as security events. • Terminal lines: Configure enabled EXEC sessions to receive log messages on any terminal lines. Similar to console logging, this type of logging is not stored by the router and, therefore, is only valuable to the user on that line.
  • 57. 57 57 57 © 2009 Cisco Learning Institute. Implementing Router Logging • Buffered logging: Store log messages in router memory. Log messages are stored for a time, but events are cleared whenever the router is rebooted. • SNMP traps: Certain thresholds can be preconfigured. Events can be processed by the router and forwarded as SNMP traps to an external SNMP server. Requires the configuration and maintenance of an SNMP system. • Syslog: Configure routers to forward log messages to an external syslog service. This service can reside on any number of servers, including Microsoft Windows and UNIX-based systems, or the Cisco Security MARS appliance.
  • 58. 58 58 58 © 2009 Cisco Learning Institute. Syslog • Syslog servers: Known as log hosts, these systems accept and process log messages from syslog clients. • Syslog clients: Routers or other types of equipment that generate and forward log messages to syslog servers. e0/0 10.2.1.1 e0/1 10.2.2.1 e0/2 10.2.3.1 User 10.2.3.3 Public Web Server 10.2.2.3 Mail Server 10.2.2.4 Administrator Server 10.2.2.5 Syslog Server 10.2.3.2 Protected LAN 10.2.3.0/24 DMZ LAN 10.2.2.0/24 Syslog Client R3
  • 59. 59 59 59 © 2009 Cisco Learning Institute. Configuring System Logging R3(config)# logging 10.2.2.6 R3(config)# logging trap informational R3(config)# logging source-interface loopback 0 R3(config)# logging on 1. Set the destination logging host 2. Set the log severity (trap) level 3. Set the source interface 4. Enable logging Turn logging on and off using the logging buffered, logging monitor, and logging commands
  • 60. 60 60 60 © 2009 Cisco Learning Institute. Enabling Syslog Using SDM/CCP 1. Choose Configure > Additional Tasks > Router Properties > Logging 2. Click Edit 3. Check Enable Logging Level and choose the desired logging level 4. Click Add, and enter an IP address of a logging host 5. Click OK
  • 61. 61 61 61 © 2009 Cisco Learning Institute. Monitor Logging with SDM 1. Choose Monitor > Logging 4. Monitor the messages, update the screen to show the most current log entries, and clear all syslog messages from the router log buffer 2. See the logging hosts to which the router logs messages 3. Choose the minimum severity level
  • 62. 62 62 62 © 2009 Cisco Learning Institute. Monitor Logging Remotely • Logs can easily be viewed through the SDM, or for easier use, through a syslog viewer on any remote system. • There are numerous Free remote syslog viewers, Kiwi is relatively basic and free. • Configure the router/switch/etc to send logs to the PC’s ip address that has kiwi installed. • Kiwi automatically listens for syslog messages and displays them.
  • 63. 63 63 63 © 2009 Cisco Learning Institute. Using SNMP for Network Security • SNMP • Community Strings • SNMPv3 • Security Levels • Trap Receivers
  • 64. 64 64 64 © 2009 Cisco Learning Institute. SNMP • Developed to manage nodes, such as servers, workstations, routers, switches, hubs, and security appliances on an IP network • All versions are Application Layer protocols that facilitate the exchange of management information between network devices • Part of the TCP/IP protocol suite • Enables network administrators to manage network performance, find and solve network problems, and plan for network growth • Three separate versions of SNMP
  • 65. 65 65 65 © 2009 Cisco Learning Institute. Community Strings Provides read-only access to all objects in the MIB except the community strings. Provides read-write access to all objects in the MIB except the community strings. A text string that can authenticate messages between a management station and an SNMP agent and allow access to the information in MIBs
  • 66. 66 66 66 © 2009 Cisco Learning Institute. SNMPv3 Agent may enforce access control to restrict each principal to certain actions on certain portions of its data. Managed Node Managed Node Managed Node Managed Node Messages may be encrypted to ensure privacy NMS NMS Transmissions from manager to agent may be authenticated to guarantee the identity of the sender and the integrity and timeliness of a message. Encrypted Tunnel
  • 67. 67 67 67 © 2009 Cisco Learning Institute. Security Levels • noAuth: Authenticates a packet by a string match of the username or community string • auth: Authenticates a packet by using either the Hashed Message Authentication Code (HMAC) with Message Digest 5 (MD5) method or Secure Hash Algorithms (SHA) method. • Priv: Authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and encrypts the packet using the Data Encryption Standard (DES), Triple DES (3DES), or Advanced Encryption Standard (AES) algorithms.
  • 68. 68 68 68 © 2009 Cisco Learning Institute. Trap Receivers 1. Click Edit 2. Click Add 3. Enter the IP address or the hostname of the trap receiver and the password 4. Click OK 6. When the trap receiver list is complete, click OK 5. To edit or delete an existing trap receiver, choose a trap receiver from the trap receiver list and click Edit or Delete
  • 69. 69 69 69 © 2009 Cisco Learning Institute. Using NTP • Uses • Timekeeping • Features/Functions • Enabling NTP using SDM/CCP
  • 70. 70 70 70 © 2009 Cisco Learning Institute. Uses • Clocks on hosts and network devices must be maintained and synchronized to ensure that log messages are synchronized with one another • The date and time settings of the router can be set using one of two methods: - Manually edit the date and time - Configure Network Time Protocol
  • 71. 71 71 71 © 2009 Cisco Learning Institute. Timekeeping • Pulling the clock time from the Internet means that unsecured packets are allowed through the firewall • Many NTP servers on the Internet do not require any authentication of peers • Devices are given the IP address of NTP masters. In an NTP configured network, one or more routers are designated as the master clock keeper (known as an NTP Master) using the ntp master global configuration command. • NTP clients either contact the master or listen for messages from the master to synchronize their clocks. To contact the server, use the ntp server ntp-server-address command. • In a LAN environment, NTP can be configured to use IP broadcast messages instead, by using the ntp broadcast client command.
  • 72. 72 72 72 © 2009 Cisco Learning Institute. Features/Functions • There are two security mechanisms available: - An ACL-based restriction scheme - An encrypted authentication mechanism such as offered by NTP version 3 or higher • Implement NTP version 3 or higher. Use the following commands on both NTP Master and the NTP client. - ntp authenticate - ntp authentication key md5 value - ntp trusted-key key-value
  • 73. 73 73 73 © 2009 Cisco Learning Institute. Enabling NTP 1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP 2. Click Add 3. Add an NTP server by name or by IP address 4. Choose the interface that the router will use to communicate with the NTP server 5. Check Prefer if this NTP server is a preferred server (more than one is allowed) 6. If authentication is used, check Authentication Key and enter the key number, the key value, and confirm the key value. 7. Click OK
  • 74. 74 74 74 © 2009 Cisco Learning Institute. Automated Security Features • Performing Security Audits • Using Automated Tools • Locking Down a Router Using SDM
  • 75. 75 75 75 © 2009 Cisco Learning Institute. Performing a Security Audit • Security Practices • Security Audit • Security Audit Wizard
  • 76. 76 76 76 © 2009 Cisco Learning Institute. Security Practices • Determine what devices should use CDP • To ensure a device is secure: - Disable unnecessary services and interfaces - Disable and restrict commonly configured management services, such as SNMP - Disable probes and scans, such as ICMP - Ensure terminal access security - Disable gratuitous and proxy Address Resolution Protocol (ARP) - Disable IP-directed broadcast
  • 77. 77 77 77 © 2009 Cisco Learning Institute. SDM Security Audit Perform Security Audit letting the administrator choose configuration changes to implement One-Step Lockdown automatically makes all recommended security-related configuration changes
  • 78. 78 78 78 © 2009 Cisco Learning Institute. Security Audit Wizard Compares router configuration against recommended settings: • Shut down unneeded servers • Disable unneeded services • Apply the firewall to the outside interfaces • Disable or harden SNMP • Shut down unused interfaces • Check password strength • Enforce the use of ACLs
  • 79. 79 79 79 © 2009 Cisco Learning Institute. Using Automated Tools • Cisco AutoSecure • AutoSecure Command
  • 80. 80 80 80 © 2009 Cisco Learning Institute. Cisco AutoSecure • Initiated from CLI and executes a script. The AutoSecure feature first makes recommendations for fixing security vulnerabilities, and then modifies the security configuration of the router. • Can lockdown the management plane functions and the forwarding plane services and functions of a router • Used to provide a baseline security policy on a new router
  • 81. 81 81 81 © 2009 Cisco Learning Institute. Auto Secure Command • Command to enable the Cisco AutoSecure feature setup: auto secure [no-interact] • In Interactive mode, the router prompts with options to enable and disable services and other security features. This is the default mode but can also be configured using the auto secure full command.
  • 82. 82 82 82 © 2009 Cisco Learning Institute. Auto Secure Command R1# auto secure ? firewall AutoSecure Firewall forwarding Secure Forwarding Plane full Interactive full session of AutoSecure login AutoSecure Login management Secure Management Plane no-interact Non-interactive session of AutoSecure ntp AutoSecure NTP ssh AutoSecure SSH tcp-intercept AutoSecure TCP Intercept <cr> R1# auto secure [no-interact | full] [forwarding | management ] [ntp | login | ssh | firewall | tcp-intercept] router#
  • 83. 83 83 83 © 2009 Cisco Learning Institute. Locking Down a Router • Cisco One-step Lockdown • Limitations
  • 84. 84 84 84 © 2009 Cisco Learning Institute. Cisco One-step Lockdown Tests router configuration for any potential security problems and automatically makes the necessary configuration changes to correct any problems found
  • 85. 85 85 85 © 2009 Cisco Learning Institute. AutoSecure Versus SDM Security Audit One-Step Lockdown R1# auto secure --- AutoSecure Configuration --- *** AutoSecure configuration enhances the security of the router, but it will not make it absolutely resistant to all security attacks *** AutoSecure will modify the configuration of your device. All configuration changes will be shown. For a detailed explanation of how the configuration changes enhance security and any possible side effects, please refer to Cisco.com for Autosecure documentation. Cisco AutoSecure also: • Disables NTP • Configures AAA • Sets SPD values • Enables TCP intercepts • Configures anti-spoofing ACLs on outside-facing interfaces SDM implements some the following features differently: • SNMP is disabled but will not configure SNMPv3 • SSH is enabled and configured with images that support this feature. • Secure Copy Protocol (SCP) is not enabled--unsecure FTP is.
  • 86. 86 86 86 © 2009 Cisco Learning Institute.