the cli uses a hierarchical structure for the modes. in order from top to bottom, the major modes...
TRANSCRIPT
![Page 1: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/1.jpg)
![Page 2: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/2.jpg)
• The CLI uses a hierarchical structure for the modes.
• In order from top to bottom, the major modes are:• User mode• Privileged mode• Global Configuration mode• Specific Configuration modes
![Page 3: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/3.jpg)
• User Mode – view only• Privileged Mode – used to manage, update
configuration• By default, no authentication required.
![Page 4: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/4.jpg)
![Page 5: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/5.jpg)
Policy – roles, responsibilities, permissions, standard configurationsAccess – Physical and ElectronicIOS - The operating system for the router is a crucial component. Configuration Management – both static and dynamic. Basic hardening should be one of the first steps implemented to minimize the risk of attacks. Logging - log information helps to determine whether the router is working properly of if it has been probed or worst case, compromised.
![Page 6: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/6.jpg)
• Security policy should define:• Roles – define administrator, operator and any user
role.• Permissions – defines how who will be granted
privileges on the device.• Rules of conduct – define how rules will be
configured on the router and who will approve rule implementation.
• Responsibilities – define who will make config changes or who will monitor logs.
• Minimum Configuration Standards – basic hardening requirements.
![Page 7: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/7.jpg)
• Access should be limited 24/7 365 days a year. • Environmental controls - free of electrostatic and
magnetic interference, temperature and humidity controlled, Uninterruptible Power Supply (UPS)
• Some routers offer PC-Card slots or CompactFlash slots
• The Cisco password recovery procedure allows individual to gain privileged access to the device without using a password.
![Page 8: The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration](https://reader034.vdocuments.net/reader034/viewer/2022051114/56649f065503460f94c1c25b/html5/thumbnails/8.jpg)
• There are two types of access: local and remote. • Local access involves a direct connection to a
console port on the router with a dumb terminal or a laptop computer.