ccna 200-301, volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · ccna 200-301, volume 2...

18
CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices

Upload: others

Post on 10-May-2021

23 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

CCNA 200-301, Volume 2Chapter 5Securing Network Devices

Page 2: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Objectives• Explain the Role of Network Components▫ Next-generation firewalls and IPS

• Configure network devices for remote access using SSH

• Configure device access control using local passwords

Page 3: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Example Login Security Configuration

Page 4: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Encryption and the service password-encryption Command

Page 5: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Encryption Is Immediate; Decryption Awaits Next Password Change

Page 6: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

One-Way Nature of MD5 Hash to Create Secret

Page 7: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Creation of the enable secret Command

Page 8: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Timeline of Encryptions/Hashes of Cisco IOS Passwords

Page 9: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Commands and Encoding Types for the enable secret Command Command Type Algorithm

enable [algorithm-type md5] secret password 5 MD5

enable algorithm-type sha256 secret password 8 SHA-256

enable algorithm-type scrypt secret password 9 SHA-256

Page 10: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Cisco IOS Encoding Password “mypass1” as Type 9 (SHA-256)

Page 11: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Commands and Encoding Types for the username secret Command

Command Type Algorithm

username name [algorithm-type md5] secret password

5 MD5

username name algorithm-type sha256 secret password

8 SHA-256

username name algorithm-type scrypt secret password

9 SHA-256

Page 12: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

vty Access Control Using the access-class Command

Page 13: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Firewall as Positioned in the Packet Forwarding Path

Page 14: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Allowing Outbound Connections and Preventing Inbound Connections

Page 15: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Using Security Zones with Firewalls

Page 16: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Using a DMZ for Enterprise Servers That Need to Be Accessible from theInternet

Page 17: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

IPS and Signature Database

Page 18: CCNA 200-301, Volume 2cs3.calstatela.edu/~egean/cs4471/lecture-notes... · CCNA 200-301, Volume 2 Chapter 5 Securing Network Devices. Objectives • Explain the Role of Network Components

Next-Generation Firewall with Next-Generation IPS Module