enterprise network security

26
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4

Upload: melyssa-bauer

Post on 30-Dec-2015

43 views

Category:

Documents


0 download

DESCRIPTION

Enterprise Network Security. Accessing the WAN – Chapter 4. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks. Sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE I Chapter 6 1

Enterprise Network Security

Accessing the WAN – Chapter 4

Page 2: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 2

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Sophisticated attack tools and open networks have

created an increased need for network security and dynamic security policies

Page 3: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 3

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Common security threats and how they impact

enterprises

Page 4: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 4

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks

Page 5: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 5

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Common mitigation techniques that enterprises use to

protect themselves against threats

Page 6: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 6

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks Network Security Wheel

Page 7: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 7

Describe the General Methods used to Mitigate Security Threats to Enterprise Networks The goals of a comprehensive security policy in an

organization

Page 8: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 8

Configure Basic Router Security Why the security of routers and their configuration

settings is vital to network operation

Page 9: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 9

Configure Basic Router Security The recommended approach to applying Cisco IOS

security features on network routers

Page 10: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 10

Configure Basic Router Security The basic security measures needed to secure Cisco

routers

Page 11: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 11

Explain How to Disable Unused Cisco Router Network Services and Interfaces The router services and interfaces that are vulnerable

to network attack

Page 12: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 12

Explain How to Disable Unused Cisco Router Network Services and Interfaces The vulnerabilities posed by commonly configured

management services

Page 13: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 13

Explain How to Disable Unused Cisco Router Network Services and Interfaces Secure a router with the command-line interface (CLI)

auto secure command

Page 14: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 14

Explain How to Use Cisco SDM

Configure a router to use Cisco SDM

Page 15: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 15

Explain How to Use Cisco SDM

The steps you follow to start SDM

Page 16: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 16

Explain How to Use Cisco SDM

The Cisco SDM Interface

Page 17: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 17

Explain How to Use Cisco SDM

The commonly used Cisco SDM wizards

Page 18: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 18

Explain How to Use Cisco SDM

Use Cisco SDM for locking down your router

Page 19: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 19

Manage Cisco IOS Devices

The file systems used by a Cisco router

Page 20: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 20

Manage Cisco IOS Devices

Backup and upgrade a Cisco IOS image

Page 21: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 21

Manage Cisco IOS Devices

Back up and upgrade Cisco IOS software images using a network server

Page 22: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 22

Manage Cisco IOS Devices

How to recover a Cisco IOS software image

Page 23: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 23

Manage Cisco IOS Devices

How to recover the enable password and the enable secret passwords

Page 24: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 24

Summary Security Threats to an Enterprise network include:

–Unstructured threats

–Structured threats

–External threats

–Internal threats

Methods to lessen security threats consist of:–Device hardening

–Use of antivirus software

–Firewalls

–Download security updates

Page 25: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 25

Summary

Basic router security involves the following:–Physical security

–Update and backup IOS

–Backup configuration files

–Password configuration

–Logging router activity

Disable unused router interfaces & services to minimize their exploitation by intruders

Cisco SDM–A web based management tool for configuring security measures on Cisco routers

Page 26: Enterprise Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicITE 1 Chapter 6 26

Summary

Cisco IOS Integrated File System (IFS)–Allows for the creation, navigation & manipulation of directories on a cisco device