Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top
|
|
|
- Cordelia O’Brien’
- 10 years ago
- Views:
Transcription
1 Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis SHOW RUNNING-CONFIG SECURITY NOTIFICATIONS (if any) This process will suggest enhancements to an IP network's first line of defense, the router. Please note the following: 1. This is NOT a substitute for an overall network security policy. Responsible network security management requires careful research, planning, as well as continued vigilance. It is important to develop, document, and maintain standards for appropriate network access and utilization. 2. While a guide to your first steps in securing the TCP/IP operations within a Cisco router running IOS, this process is NO substitute for expertise in IP network security and exploit reduction. It is crucial for network support personnel to cultivate and maintain a base of knowledge in these areas. 3. DO NOT deploy any proposed configuration changes without thorough testing in a non-critical environment. You will want to research any commands with which you are not very familiar. Cisco's web-site has many outstanding resources, documents, templates, and links for further information, to assist you in this effort. Also, the Cisco Technical Assistance Center (TAC) is always available. Product Security Incident Response Team(PSIRT) advisories. SECURING INTERACTIVE SESSIONS: WARNING: Interactive sessions initiated to and from this router are not as secure as they can be. TRY THIS: Consider introducing the following configuration command(s): 'banner login' INFO: In some jurisdictions, civil and/or criminal prosecution of unauthorized users is much easier when you provide a banner warning them that their access is unauthorized. Legal notification requirements are complex and these should be discussed with your own legal counsel. Once the appropriate login warning has been developed for your router, you may incorporate it into your unit for display before all interactive logins with the 'banner login' configuration command. PORT/LINE SECURITY: WARNING: This router's ports/lines are not as secure as they can be. TRY THIS: Consider introducing the following configuration command(s): 'line con 0' 'transport input none' INFO: This command guards against anyone initiating a reverse-telnet session to the router's console port. 'line aux 0' 'transport input none' INFO: This command guards against anyone initiating a reverse-telnet session to the router's aux port. 'exec-timeout' INFO: This command will end an interactive session if it remains inactive for a specified number of minutes. 'line vty 0 4' 'transport input ssh' INFO: This command restricts the session protocols that can be used to only SSH, in order to initiate a session to the router. Using SSH is preferable to TELNET since sessions are encrypted. SSH has been supported since IOS S. REFERENCE: Configuring SSH on Cisco IOS routers 'exec-timeout' INFO: This command will end an interactive session if it remains inactive Back to top
2 for a specified number of minutes. 'access-class... in' INFO: This command, in conjunction with an access-list, restricts interactive sessions to a specific list of source hosts. This parameter can be added to all vty ports or just the last. The later case will allow access to the router from anywhere on the network but holds the last port in reserve for a trusted host should the others 'fill-up' for any reason. ROUTE/PATH INTEGRITY: WARNING: This router does not show any filter against ICMP redirects. INFO: An ICMP redirect is a message to a host to use a specific router as its path to a particular destination. In a properly functioning network, these messages will be sent within a local segment only. If this rule is violated, however, ICMP redirects can become the basis of attack. TRY THIS: Consider the introduction of or addition to an access-list applied to externally facing interfaces to prevent these messages from crossing network segments. Use the 'access-list 100 deny icmp any any redirect' configuration command. REFERENCE: See Extended Access List Examples for more information. WARNING: This router does not show protection against commonly 'spoofed' IP addresses. INFO: Spoofing is the practice of falsifying the source-address of an IP packet so as to disguise it's origin and/or intent. TRY THIS: Consider the introduction of OR addition to an IP access-list applied to incoming packets on all active interfaces. The LAN interface should block all IP source-addresses not specifically permitted to exist on that network segment. The WAN interface should block any traffic attempting to represent itself as from the WAN interface itself, the internal LAN segment, a private network (impossible from the Internet), a loopback address (not permitted on the Internet), or from multicast/experimental address-space (invalid under most circumstances). INFO: Private network addresses are within these ranges: INFO: Loopback and multicast addresses exist within these ranges: NOTE: Research the anti-spoofing requirements of your own network before applying this protection. SERVICE-EXPLOIT REDUCTION: WARNING: One or more services are running that can be exploited. TRY THIS: To reduce possible service-based exploits that may be attempted against this router, consider disabling these services using the following configuration command(s): 'no ip finger' 'no ip domain-lookup' These services are rarely used for legitimate purposes and can be co-opted to launch a denial-of-service as well as other types of attacks. WARNING: NTP (Network Time Protocol) has not been secured. INFO: While not particularly dangerous, can be used to subvert certain security protocols (those that use a time-base) and foul the time-stamps on the router's log messages. TRY THIS: To disable NTP on a per interface basis, use the 'ntp disable' interface configuration command. To use NTP more securely, consider the following configuration command(s): 'ntp server' 'ntp authenticate' TRAFFIC-FLOOD MANAGEMENT: INFO: Many denial-of-service (DOS) attacks are based on sending a flood of useless packets to vulnerable units. WARNING: This router may not respond well in the face of a flood-based attack. TRY THIS: To improve this router's response, consider introducing the following configuration command(s): 'scheduler allocate' INFO: This command guarantees that the router's CPU will respond to
3 interactive sessions regardless of heavy traffic loads. 'ip verify unicast reverse-path' INFO: This interface command examines each packet received as input on that interface. If the source IP address does not have a route in the CEF tables that points back to the same interface on which the packet arrived, the router drops the packet. The feature should be applied to internet facing interfaces and CEF (Cisco Express Forwarding) should be enabled on the router. REFERENCE: Configuring Unicast Reverse Path Forwarding INFO: If this router is a 2600 series or higher (this includes Catalyst 5000 series units configured with an RSM), you may wish to investigate the TCP Intercept feature introduced in IOS Version This is a powerful feature designed to protect selected hosts from SYN-flood attacks common to the Internet. There is some cost, however, with regard to the router's performance. REFERENCE: For more information, see Cisco IOS TCP Intercept and TCP Intercept INFO: You may consider enabling the 'committed access rate' (CAR) feature to limit the bandwidth consumed by certain traffic types such as ICMP, TCP 'SYN', UDP and multicast packets. These should be applied to internet facing interfaces using the 'rate-limit' interface configuration command and an appropriate access-list. This can be helpful in limiting the effect of denial of service attacks. CAR is a functionality that works with Cisco Express Forwarding, found in 11.1CC and releases from REFERENCE: For more information, see Configuring Committed Access Rate LOGGING: WARNING: This router is not taking full advantage of its logging capabilities. INFO: The router is capable of logging accesses and other significant events using a variety of methods. These logs, when detailed over a significant interval, are invaluable in identifying/responding to attacks and other abuses. TRY THIS: To take advantage of these logging activities consider introducing the following configuration command(s): 'logging (IP address of syslog server)' 'logging trap' INFO: These commands set up communication between the router's logging process and a syslog server. A syslog server is an inexpensive and widely available application/agent that stores log entries from network devices. This facility allows you permanent storage for logging information, which is especially valuable when physical access to the router is impractical. A syslog server also affords greater detail within the logs themselves (less reliance on the router's logging buffer). The level of 'urgency' (detail) of the syslog server-stored logs is set via the 'logging trap' command. There is minimal performance impact to the router, regardless of the level of logging detail. Like any component of a network-management system, the syslog server application should be run only from a secured, trusted host. 'no logging console' INFO: This command disables all logging to the console terminal. Excessive debugs to the console port of a router can cause it to hang. This is because the router automatically prioritizes console output ahead of other router functions. Hence, if the router is processing a large debug output to the console port, it may hang. Hence, if the debug output is excessive, use the vty (telnet) ports or the log buffers to obtain your debugs. REFERENCE: Important Information on Debug Commands 'aaa accounting' INFO: The best, most detailed logging is done in conjunction with a TACACS+ or RADIUS server. While this option would require some setup, configuration, and ongoing support, the benefits to your overall network security are considerable and extend well beyond logging functions. 'exception dump' INFO: When a router crashes, a copy of the core memory is kept. Before the memory is erased on reboot, the router can be set up to copy the core dump out to a UNIX server. These dumps can be extremely useful in identifying the cause of a crash. An account (ftp, tftp, or rcp) and sufficient disk space (equal to the amount of memory on the router per dump) needs to be set up and allocated. One example, using FTP to export the dump: ip ftp source-interface Loopback0 ip ftp username [enter username here]
4 ip ftp password [enter password here] exception protocol ftp exception dump [enter IP address of FTP Server here] REFERENCE: For more information on configuring core dumps, see: Configuring Core Dumps 'ip ftp source-interface Loopback0' INFO: The commands above will enable services on your router to send messages sourced from a loopback interface (Loopback0 in these examples). Using a loopback address as a source interface will keep your messages consistent and simplify access-list statements for security purposes. 'ip accounting access-violations' INFO: This command enables IP accounting on an interface with the ability to identify IP traffic that fails IP access lists. The following interfaces could benefit from this: FastEthernet0/0 FastEthernet0/1 Once enabled, violations may be viewed with the 'show ip accounting access-violations' command. REFERENCE: For additional information see: Practical Reading: Improving Security on Cisco Routers Characterizing and Tracing Packet Floods Using Cisco Routers Cisco Security Solutions: Security Solutions SHOW RUNNING-CONFIG - FW NOTIFICATIONS (if any) LOCK AND KEY: Lock and Key is not configured. For additional information, visit: Configuring Lock-and-Key Security IP SESSION FILTERING (REFLEXIVE ACCESS LISTS): IP Session Filtering (Reflexive Access Lists) is not configured. For additional information, visit: Configuring IP Session Filtering TCP INTERCEPT: TCP Intercept is not configured. For additional information, visit: Configuring TCP Intercept CONTEXT-BASED ACCESS CONTROL (CBAC): WARNING: The following protocols are not being inspected by their respective firewalls. autosec_inspect(inbound): h323 H.323 Protocol (e.g, MS NetMeeting, Intel Video Phone) netshow Microsoft NetShow Protocol rpc Remote Prodedure Call Protocol rtsp Real Time Streaming Protocol sqlnet SQL Net Protocol streamworks StreamWorks Protocol vdolive VDOLive Protocol TRY THIS: Ensure that the proper protocols are being inspected. While inspecting TCP and UDP allows connections for non-inspected protocols, TCP and UDP inspection does not recognize application-specific commands, and therefore might not permit all return packets for an application, particularly if the return packets have a different port number than the previous exiting packet. If any of above the protocols should be inspected, use the respective 'ip inspect name {fw_name} {protocol}' global configuration command. If these protocols should be inspected, packets for that protocol should be permitted to exit the firewall (by configuring the correct ACL), and packets for that protocol will only be allowed back in through the firewall if they belong to a valid existing session. Each protocol packet is inspected to maintain information about the session state. Back to top
5 WARNING: The following timeouts have been changed from their defaults: Inspection rule autosec_inspect: UDP Timeouts (default 30 seconds): udp User Datagram Protocol TRY THIS: Ensure that the timeout values for these protocols are the desired values. If they are too low, sessions will be closed too quickly. If they are too high, sessions may never end. Use the 'ip inspect name {inspection_name} {protocol} timeout {timeout_value}' global configuration command to alter these values (if desired). ERROR: The 'http' protocol is being inspected by the autosec_inspect firewall, but a java-list is not defined. The 'http' protocol does not inspect web traffic but rather is used for Java applet blocking. TRY THIS: Define a standard IP access-list to be used for Java applet inspection. Then use the 'ip inspect name autosec_inspect http java-list {standard_acl}' global configuration command to allow Java applets to be inspected. WARNING: The following access-list lines may be permitting traffic they should not be: Access-List autosec_complete_bogon permit ip any any TRY THIS: Ensure that these access-lists are configured properly. Since this is an inbound access-list on an external interface, only specific connections should be permitted while more general traffic is denied. The inspection rule will create temporary access-list entries that will allow inbound traffic from sessions originating internally. Reconfigure these access-lists as necessary. WARNING: Using CBAC uses less than approximately 600 bytes of memory per connection. There is also a slight amount of additional processing that occurs whenever packets are inspected. TRY THIS: Because of the memory and processor usage, CBAC should only be used when needed. WARNING: CBAC does not provide intelligent filtering for all protocols; it only works for the protocols that are specified. If a protocol is not specified for CBAC, the existing access lists will determine how that protocol is filtered. No temporary openings will be created for protocols not specified for CBAC inspection. TRY THIS: Ensure that CBAC has been configured for the proper protocols. INFO: CBAC does not protect against attacks originating from within the protected network. CBAC only detects and protects against attacks that travel through the firewall. INFO: CBAC protects against certain attacks but should not be considered a perfect, impenetrable defense. Determined, skilled attackers might be able to launch effective attacks. While there is no such thing as a perfect defense, CBAC detects and prevents most of the popular attacks on your network. INFO: Use the following show commands to monitor CBAC operation: show ip inspect name inspection-name show ip inspect config show ip inspect interfaces show ip inspect session [detail] show ip inspect all
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Security Audit CHAPTER21. Perform Security Audit
CHAPTER21 Perform is a feature that examines your existing router configurations and then updates your router in order to make your router and network more secure. is based on the Cisco IOS AutoSecure
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Network Security 1. Module 8 Configure Filtering on a Router
Network Security 1 Module 8 Configure Filtering on a Router Module 8 Configure Filtering on a Router 8.1 Filtering Technologies Packet Filtering Stateful Packet Filtering URL Filtering Module 8 Configure
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Objective Scenario Topology Estimated Time: 35 minutes Number of Team Members: Two teams with four students per team In this lab exercise,
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei
Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei Firewall
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.
Lab 7-3 Configuring Cisco IOS Firewall In this activity, you will configure various types of ACLs, to achieve the desired filtering objectives. After completing this activity, you will be able to meet
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Table of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Lab 8.3.13 Configure Cisco IOS Firewall CBAC
Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Network Security Knowledge is Everything! Network Operations
Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer [email protected] Agenda What is Network Security General Configuration Security Logging and
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Remote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Center for Internet Security Gold Standard Benchmark for Cisco IOS
Center for Internet Security Gold Standard Benchmark for Cisco IOS Level 1 and 2 Benchmarks Version 2.1 http://www.cisecurity.org [email protected] September 2, 2003 Abstract This document defines
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
How To Secure Network Threads, Network Security, And The Universal Security Model
BUILDING AN UNIVERSAL NETWORK SECURITY MODEL Zahari Todorov Slavov, Valentin Panchev Hristov Department of Computer Systems and Technology, South-West University Neofit Rilski, Blagoevgrad, Bulgaria, e-mail:
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls
Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A S1 FA0/5
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Introduction to Network Address Translation
1 Introduction to Network Address Translation Session 2 Agenda Basic Concept of Network Address Translation (NAT) and PAT Definition, Benefits, Availability and Application Support NAT Concepts and Terminology
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
One-Step Lockdown with Cisco SDM
One-Step Lockdown with Cisco SDM Router Hardening Automagically The process of turning off unnecessary services is called hardening a router to prevent attacks or exploits. The basic steps of router hardening
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention
1 1 Network Security 2 Module 2 Configure Network Intrusion Detection and Prevention 2 Learning Objectives 2.1 Cisco IOS Intrusion Prevention System 2.2 Configure Attack Guards on the PIX Security Appliance
Firewall Technologies. Access Lists Firewalls
Firewall Technologies Access Lists Firewalls ACLs Standard Extended Numbered Named Stateful Tables to track real-time state of end-end sessions Session oriented nature of network traffic TCP established
ACL Compliance Director FAQ
Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
Cisco IOS Firewall. Executive Summary
Design Guide Cisco IOS Firewall Executive Summary Cisco IOS Firewall is a stateful security software component of Cisco IOS Software. The benefits of integration into Cisco IOS routers include: leveraging
Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers
Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Abstract Hang Chau DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web
Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security
City Guatemala 30 January - 1 February 07 Pedro Lorga ([email protected]) Simon Muyal ([email protected]) Piers O'Hanlon ([email protected]) Laboratory Exercise: Objectives In this laboratory exercise
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Introduction to Cisco router configuration
Introduction to Cisco router configuration AFNOG 2001 Workshop 07 to 11 May 2001 Accra - GHANA By: Adiel AKPLOGAN CAFE Informatique S. A. - TOGO E-mail: [email protected] - Web: http://www.akplogan.net
Internet Infrastructure Security Technology Details. Merike Kaeo [email protected]
Internet Infrastructure Security Technology Details Merike Kaeo [email protected] Securing The Device Agenda Item Think of ALL Devices The following problem was reported last year and affects
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Adding an Extended Access List
CHAPTER 11 This chapter describes how to configure extended access lists (also known as access control lists), and it includes the following topics: Information About Extended Access Lists, page 11-1 Licensing
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel
itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Integrated Cisco Products
Installation Guide Supplement for use with Integrated Cisco Products Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
