Professional Documents
Culture Documents
Network Security
CCNA4-1
Chapter 4-1
CCNA4-2
Chapter 4-1
CCNA4-3
Chapter 4-1
CCNA4-4
Chapter 4-1
CCNA4-5
Chapter 4-1
Denial of Service
System Penetration
Password sniffing
CCNA4-6
Chapter 4-1
CCNA4-7
Chapter 4-1
CCNA4-8
Chapter 4-1
CCNA4-9
Chapter 4-1
CCNA4-10
Chapter 4-1
CCNA4-11
Chapter 4-1
CCNA4-12
Chapter 4-1
CCNA4-13
Chapter 4-1
CCNA4-14
Chapter 4-1
CCNA4-15
Chapter 4-1
CCNA4-16
Chapter 4-1
CCNA4-17
Chapter 4-1
CCNA4-18
Chapter 4-1
Threats to Networks
Network Threats: Inexperienced individuals with easily available hacking tools.
Social Engineering
The easiest hack involves no computer skill.
If an intruder can trick a member of an organization into giving over information, such as the location of files or passwords, the process of hacking is made much easier.
Phishing:
A type of social engineering attack that involves using e-mail in an attempt to trick others into providing sensitive information, such as credit card numbers or passwords. Phishing can be prevented by educating users and implementing reporting guidelines when they receive suspicious e-mail.
CCNA4-20
Chapter 4-1
CCNA4-21
Chapter 4-1
Reconnaissance:
Reconnaissance - the unauthorized discovery and mapping of systems, services, or vulnerabilities. In most cases, this precedes another type of attack. Can consist of: 1. Internet Information Queries 2. Ping Sweeps 3. Port Scans 4. Packet Sniffers
CCNA4-22
Chapter 4-1
System Access
System access - the ability of an intruder to gain access to a device for which the intruder does not have an account or a password. Usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked.
CCNA4-23
Chapter 4-1
Denial of Service:
Denial of Service (DoS) - when an attacker disables or corrupts networks, systems, or services with the intent to deny services to intended users. DoS attacks involve either crashing the system or slowing it down to the point that it is unusable.
CCNA4-24
Chapter 4-1
CCNA4-25
Chapter 4-1
Internet Queries:
External attackers can use Internet tools, such as the nslookup and whois utilities, to easily determine the IP address space assigned to a given corporation or entity.
CCNA4-26
Chapter 4-1
Ping Sweeps:
After the IP address space is determined, an attacker can then ping the publicly available IP addresses to identify the addresses that are active. To help automate this step, an attacker may use a ping sweep tool, such as fping or gping.
CCNA4-27
Chapter 4-1
Port Scans:
After identifying the active IP addresses, the intruder uses a port scanner to determine which network services or ports are active on the live IP addresses. A port scanner is software, such as Nmap or Superscan, that is designed to search a network host for open ports.
CCNA4-28
Chapter 4-1
Packet Sniffers:
Internal attackers may attempt to "eavesdrop on network traffic.
CCNA4-29
Chapter 4-1
Packet Sniffers:
A common method for eavesdropping is to capture TCP/IP or other protocol packets and decode the contents. Methods for counteracting eavesdropping are: 1. Using switched networks instead of hubs so that traffic is not broadcast to all endpoints or network hosts. 2. Using encryption that meets the data security needs without imposing an excessive burden on system resources or users. 3. Forbid the use of protocols with known susceptibilities to eavesdropping. (e.g. SNMP vs SNMP v3)
CCNA4-30
Chapter 4-1
CCNA4-31
Chapter 4-1
CCNA4-32
Chapter 4-1
CCNA4-33
Chapter 4-1
CCNA4-34
Chapter 4-1
CCNA4-35
Chapter 4-1
CCNA4-36
Chapter 4-1
CCNA4-37
Chapter 4-1
CCNA4-38
Chapter 4-1
CCNA4-39
Chapter 4-1
CCNA4-40
Chapter 4-1
CCNA4-41
Chapter 4-1
By default, Cisco IOS software leaves passwords in plain text when they are entered on a router. service password-encryption enable secret 2ManY-routEs
CCNA4-42
Chapter 4-1
CCNA4-43
Chapter 4-1
CCNA4-44
Chapter 4-1
CCNA4-45
Chapter 4-1
CCNA4-46
Chapter 4-1
CCNA4-47
Chapter 4-1
Cisco recommends a modulus length of 1024. A longer length generates a more secure key but adds some latency.
CCNA4-48 Chapter 4-1
Makes SSH the only method. NO TELNET Use the login local command to search the local database and assign ssh to the vty lines.
CCNA4-49
Chapter 4-1
CCNA4-50
Chapter 4-1
CCNA4-51
Chapter 4-1
0: 1: 2: 3: 4: 5: 6: 7:
CCNA4-52
CCNA4-53
Chapter 4-1
CCNA4-54
Chapter 4-1
CCNA4-55
Chapter 4-1
Cisco routers and other hosts use NTP to keep their time-of-day clocks accurate.
Network administrators should configure all routers as part of an NTP hierarchy. One Router is the Master Timer--provides its time to other routers on the network. If an NTP hierarchy is not available on the network, you should disable NTP.
CCNA4-57
Chapter 4-1
CCNA4-58
Chapter 4-1
CCNA4-59
Chapter 4-1
2.Prevent unauthorized reception of RIP updates by implementing MD5 authentication with a specific key.
3.Verify RIP routing. While the commands are different, the same basic process is used for other protocols.
CCNA4-60
Chapter 4-1
CCNA4-61
Chapter 4-1
CCNA4-62
Chapter 4-1
CCNA4-63
Chapter 4-1
It simplifies Router, firewall, IPS, VPN, unified communications, WAN, LAN and basic wireless configuration through easy-to-use wizards.
CCP is a valuable productivity-enhancing tool for network administrators and channel partners for deploying routers in medium-sized businesses and enterprise branch offices with increased confidence and ease. CCP has configuration checks built into the application thereby reducing errors. The new device manager for Cisco integrated services routers, CCP will replace Cisco Router and Security Device Manager (SDM) over time. Like SDM, Cisco Configuration Professional assumes a general understanding of networking technologies and terms but assists individuals unfamiliar with the Cisco CLI. http://www.cisco.com/go/ciscocp
Chapter 4-1
CCNA4-64
CCNA4-65
Chapter 4-1
Many times that release is not stable. It may include new features or technologies that are not needed in your enterprise.
CCNA4-66
Chapter 4-1
1. Plan: Set goals, identify resources, profile network hardware and software, and create a schedule for migrating to new releases. 2. Design: Choose new Cisco IOS releases. 3. Implement: Schedule and execute the migration. 4. Operate: Monitor the migration progress and make backup copies of images that are running on your network.
CCNA4-67
Chapter 4-1
Some tools require valid Cisco.com login accounts: Download Software. Bug Toolkit. Software Advisor. Cisco IOS Upgrade Planner.
http://www.cisco.com/en/US/support/tsd_most_requested_tools.html
CCNA4-68 Chapter 4-1
It provides information such as the amount of available and free memory, type of file system and its permissions.
Permissions include read only (ro), write only (wo), and read and write (rw).
CCNA4-69
Chapter 4-1
* = current default
CCNA4-70
Chapter 4-1
CCNA4-72
Chapter 4-1
CCNA4-73
Chapter 4-1
1. Determine the memory required for the update. 2. Set up and test the file transfer capability. 3. Schedule the required downtime.
CCNA4-74
Chapter 4-1
1. Shut down all interfaces not needed to perform the update. 2. Back up the current operating system AND the current configuration file to a TFTP server. 3. Load the update for either the operating system or the configuration file. 4. Test to confirm that the update works properly.
CCNA4-75
Chapter 4-1
CCNA4-76
Chapter 4-1
CCNA4-77
Chapter 4-1
CCNA4-78
Chapter 4-1
CCNA4-79
CCNA4-80
Chapter 4-1
CCNA4-82
Chapter 4-1
CCNA4-83
Chapter 4-1
By default, the router sends the output from debug commands to the console but it can be redirected to a logging server.
CCNA4-84
Chapter 4-1
This register is like the BIOS on a PC. When a router boots, it will check the register and boot in the manner specified by the value in the register. For this course, we will only concern ourselves with two registry values. 0x2102: the default registry value. 0x2142: instructs the router to bypass any startup configuration.
CCNA4-85
Chapter 4-1
CCNA4-86
Chapter 4-1
CCNA4-87
Chapter 4-1
Router(config)#config-register 0x2102
8. Copy the running configuration to the startup configuration and reload or power cycle the router. copy run start (what we normally do)
CCNA4-88
Chapter 4-1