Cisco 857W - Integrated Services Router Technical Information

Stöbern Sie online oder laden Sie Technical Information nach Vernetzung Cisco 857W - Integrated Services Router herunter. Cisco 857W - Integrated Services Router System information Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 34
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
This chapter covers the following topics:
ISR overview and providing secure
administrative access: This section describes
methods of securely accessing a router prompt for
purposes of administration. Additionally, this
section provides an overview of the Cisco
Integrated Services Router (ISR) line of routers.
Cisco Security Device Manager overview:
This section examines the Cisco Security Device
Manager (SDM) interface. The graphical
interface provided by SDM allows administrators
to configure a variety of router features using a
collection of wizards and other configuration
aids, which use best-practice recommendations
from the Cisco Technical Assistance Center
(TAC).
Seitenansicht 0
1 2 3 4 5 6 ... 33 34

Inhaltsverzeichnis

Seite 1

This chapter covers the following topics:ISR overview and providing secure administrative access: This section describes methods of securely accessin

Seite 2 - Defending the Perimeter

ISR Overview and Providing Secure Administrative Access 85ISR Enhanced FeaturesAlthough traditional Cisco routers (that is, non-ISRs) offer featur

Seite 3

86 Chapter 3: Defending the Perimeter Advanced Integration Modules: Cisco offers a variety of Advanced Integration Modules (AIM), which can offloa

Seite 4

ISR Overview and Providing Secure Administrative Access 87Figure 3-2 Administrative Access to a RouterTelnet sends data in clear text. Therefore,

Seite 5

88 Chapter 3: Defending the Perimeter Use a mixture of alphabetic (both uppercase and lowercase), numeric, and special characters. The password

Seite 6 - Foundation Topics

ISR Overview and Providing Secure Administrative Access 89To configure a password for a router’s console, the administrator enters line configuratio

Seite 7

90 Chapter 3: Defending the PerimeterThe enable secret password appears in the running configuration as an MD5 hash value. However, the console, au

Seite 8

ISR Overview and Providing Secure Administrative Access 91Aside from having a single password for all administrators, individual user accounts can

Seite 9

92 Chapter 3: Defending the PerimeterLimiting the Number of Failed Login AttemptsIf an attacker uses a brute-force attack or a dictionary attack w

Seite 10

ISR Overview and Providing Secure Administrative Access 93Configuring Privilege LevelsLarger enterprise environments might need to support multipl

Seite 11 - Password-Protecting a Router

94 Chapter 3: Defending the Perimeterexactly what commands an administrator has access to. Following are the steps required to configure these view

Seite 12

C H A P T E R3Defending the PerimeterIn addition to Cisco firewall, virtual private network (VPN), and intrusion prevention system (IPS) appliances tha

Seite 13 - Password Type Description

ISR Overview and Providing Secure Administrative Access 95Step 5Add available commands to the view: The commands parser_mode {include | include-ex

Seite 14

96 Chapter 3: Defending the PerimeterEnabling Cisco IOS Login Enhancements for Virtual ConnectionsAdministrators, and therefore attackers, can cre

Seite 15

ISR Overview and Providing Secure Administrative Access 97Consider the enhanced support for virtual logins configuration shown in Example 3-17. Aft

Seite 16

98 Chapter 3: Defending the PerimeterCreating a Banner MessageWhen someone connects to one of your routers, he sees some sort of message or prompt

Seite 17

Cisco Security Device Manager Overview 99Cisco Security Device Manager OverviewCisco IOS routers support many features (including security feature

Seite 18 - Configuring Privilege Levels

100 Chapter 3: Defending the PerimeterFigure 3-3 SDM Home ScreenSome newer Cisco routers come with SDM preinstalled, but SDM needs to be installed

Seite 19 - Example 3-13 Creating a View

Cisco Security Device Manager Overview 101Preparing to Launch Cisco SDMIf you plan to run SDM on a router that does not already have SDM installed

Seite 20 - Protecting Router Files

102 Chapter 3: Defending the PerimeterIf you run SDM from a router’s flash, as opposed to running SDM from a PC, the first time you connect to the r

Seite 21 - Step Description

Cisco Security Device Manager Overview 103After clicking the Configure button, you see a screen similar to the one shown in Figure 3-5. Notice the

Seite 22 - Command Description

104 Chapter 3: Defending the PerimeterIn addition to the configuration wizards, notice the Additional Tasks button, as shown in Figure 3-6.Figure 3

Seite 23 - Creating a Banner Message

78 Chapter 3: Defending the Perimeter1. Which of the following are considered IOS security features? (Choose four.)a. Stateful firewallb. MARSc. IP

Seite 24 - Introducing SDM

Cisco Security Device Manager Overview 105Advanced administrators can use graphical interfaces to configure these additional tasks. Examples of the

Seite 25 - Figure 3-3 SDM Home Screen

106 Chapter 3: Defending the PerimeterExam Preparation TasksReview All the Key TopicsReview the most important topics from this chapter, denoted w

Seite 26 - Preparing to Launch Cisco SDM

Command Reference to Check Your Memory 107Command Reference to Check Your MemoryThis section includes the most important configuration and EXEC com

Seite 27 - Figure 3-4 SDM Toolbar

108 Chapter 3: Defending the PerimeterCommand Descriptionsecure boot-image A global configuration mode command used to enable image resiliencesecur

Seite 28 - Cisco SDM Wizards

Command Reference to Check Your Memory 109Table 3-14 Chapter 3 EXEC Command ReferenceCommand Descriptionenable view Enables the root view, which i

Seite 29 - Cisco SDM Wizards (Continued)

“Do I Know This Already?” Quiz 795. What line configuration mode command would you enter to prevent a line (such as a console, aux, or vty line) co

Seite 30 - Figure 3-7 Monitoring Tasks

80 Chapter 3: Defending the Perimeter9. When you configure Cisco IOS login enhancements for virtual connections, what is the “quiet period”?a. The

Seite 31 - Exam Preparation Tasks

ISR Overview and Providing Secure Administrative Access 81Foundation TopicsISR Overview and Providing Secure Administrative AccessThis section beg

Seite 32

82 Chapter 3: Defending the Perimeterthe router architecture. Although Cisco offers a wide range of router platforms, ISR models are easy to ident

Seite 33

ISR Overview and Providing Secure Administrative Access 83Cisco 1800 SeriesThe Cisco 1800 series of ISRs is designed for small businesses and smal

Seite 34

84 Chapter 3: Defending the PerimeterCisco 2800 SeriesThe Cisco 2800 series of ISRs is designed for small-to-medium businesses and enterprise bran

Kommentare zu diesen Handbüchern

Keine Kommentare