D. M. K. M dissanayake


Part 5: Configure Automated Security Features



Download 409.56 Kb.
View original pdf
Page3/27
Date16.12.2020
Size409.56 Kb.
#54802
1   2   3   4   5   6   7   8   9   ...   27
LABS 1-4 ans 1 2
Part 5: Configure Automated Security Features
• Lock down a router using AutoSecure and verify the configuration.
• Use the CCP Security Audit tool to identify vulnerabilities and to lock down services.
• Contrast the AutoSecure configuration with CCP.

Background / Scenario
The router is a key component that controls the movement of data into and out of the network and between devices within the network. It is particularly important to protect network routers because the failure of a routing device could make sections of the network, or the entire network, inaccessible. Controlling access to routers and enabling reporting on routers are critical to network security and should be part of a comprehensive security policy. In this lab, you build a multi-router network and configure the routers and hosts. Use various CLI and
CCP tools to secure local and remote access to the routers, analyze potential vulnerabilities, and take steps to mitigate them. Enable management reporting to monitor router configuration changes.

The router commands and output in this lab are from a Cisco 1841 router using Cisco IOS software, release M (Advanced IP Services image. Other routers and Cisco IOS versions can be used. Seethe Router Interface Summary Table at the end of the lab to determine which interface identifiers to use based on the equipment in the lab. Depending on the model of the router, the commands available and output produced may vary from what is shown in this lab.
Note: Make sure that the routers and the switches have been erased and have no startup configurations.


Download 409.56 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   27




The database is protected by copyright ©ininet.org 2024
send message

    Main page