ROLE-BASED COMMAND-LINE INTERFACE ACCESS
|
|
|
- Henry Barnett
- 10 years ago
- Views:
Transcription
1 ROLE-BASED COMMAND-LINE INTERFACE ACCESS DENISE HELFRICH MARCH
2 Agenda Role-Based Command-Line Interface (CLI) Access Overview Configuration Tasks CLI Views Lawful Intercept View How to access and use a view Resources Summary 2
3 ROLE-BASED CLI ACCESS 3
4 Role-Based User Views Administrator LAN Engineer DBMS/Application Engineer Service Desk Capacity Planner Show Etc Customized Access To Match Operational Needs WAN Engineer Config Show Etc 4
5 Role-Based CLI Access Benefits Security Enhances the security of a device by defining the set of CLI commands accessible to a user Availability Avoids unintentional executions of CLI commands by unauthorized personnel Operational Efficiency Greatly improves usability by prohibiting users from viewing CLI commands that are inaccessible to them 5
6 Role-Based CLI Access Functions Available in Cisco IOS Software Release 12.3(7)T Up to sixteen CLI Views Role-based views One root view Up to fifteen custom views Standard feature in all Cisco IOS Software images Lawful Intercept view Confidential electronic surveillance view One Lawful Intercept view Available in 3DES K9 images Export restrictions apply 6
7 How it Works An administrator must define views using the root view No default views Must have privilege level fifteen to access the root view Must create a view and specify the allowed commands A user can access a view Manually enter a view name and password View is automatically assigned via username login When users are in a view, they can only use commands specified for that view Users can switch between views if they know the view name and password 7
8 CLI VIEWS CONFIGURATION 8
9 How CLI View Relates to Other Configurations Authentication Authorization and Accounting (AAA) AAA must first be enabled with the aaa new-model command One view name is associated with a user in the local database or external AAA server At login, a user is placed in a view after the usual user authentication Privilege Level View name takes precedence over the privilege level User is placed in the privilege level if the view does not exist View Name Only one view name can be configured for a user If the view name is not configured, the user is set to existing privilege level View names and passwords are case sensitive 9
10 CLI View Configuration Tasks Prerequisite Configuration Task 1: login to Root view Task 2: configure a new view Task 3: access a CLI view Task 4: assign username view level 10
11 Prerequisite Configuration The enable password must exist Password encryption is recommended For better security, use enable secret password To access root view the passwords are: Enable secret (if present) Enable password (if enable secret is not present) AAA must first be enabled with the aaa new-model command Root view user must have privilege fifteen level assigned via the privilege command 11
12 Task 1: Login to Root View Router# enable view Router# enable view Password: enter enable or enable secret password *Mar 18 00:04:28.891: %PARSER-6-VIEW_SWITCH: successfully set to view 'root' Router# Note: % Authentication failed message returns if a user unsuccessfully authenticates 12
13 Task 2: Configure a New View Step 1: Create the New View and Enter Config-View Mode Router(config)# parser view view-name Router# configure terminal Router(config)# parser view Admin123 *Mar 18 01:07:56.167: %PARSER-6-VIEW_CREATED: view Admin123' successfully created. Router(config-view)# Notes: The no form of parser view view-name is used to delete the view View name is case sensitive 13
14 Task 2: Configure a New View (Cont.) Step 2: Create the View Password Router(config-view)# password 5 view-password Router(config-view)# password 5 Admin@Pswd Note: Password is case sensitive 14
15 Task 2: Configure a New View (Cont.) Step 3: Add Commands Allowed to Use for this View Router(config-view)# commands parser-mode {include include-exclusive} [all] command Router(config-view)# commands exec include show interfaces Router(config-view)# commands exec include all Router(config-view)# commands configure includeexclusive crypto Notes: Implicit deny all Must include the command Include-exclusive command includes command for this view while excluding it in all other views 15
16 Task 3: Access a CLI View Step 1: Manually Access a View Router# enable view view-name Router# enable view Admin123 Password: Admin@Pswd *Mar 18 02:15:18.035: %PARSER-6-VIEW_SWITCH: successfully set to view Admin123' Router# 16
17 Example: Acme Company Access Roles Network OPS Administrator Some EXEC Some Router Config No Security Config Security OPS Administrator Show Everything EXEC Copy Run only EXEC Crypto Security Config Operator Ping Show Hardware Show Interfaces Show Version WAN Engineer Everything 17
18 Acme Company Operator View Sample Configuration Router# enable view Password:secretpswd *Mar 18 02:15:18.035: %PARSER-6-VIEW_SWITCH: successfully set to view root' Router# configure Terminal Router(config)# parser view operator Router(config-view)#password 5 Oper@torPswd Router(config-view)#commands exec include ping Router(config-view)#commands exec include show hardware Router(config-view)#commands exec include show interfaces Router(config-view)#commands exec include show version Router(config-view)#exit Router(config)# 18
19 Acme Company Network Administrator View Sample Configuration Router(config)# parser view NetOps Router(config-view)#password 5 NetOps@Pswd Router(config-view)#commands exec include clear Router(config-view)#commands exec include copy Router(config-view)#commands exec include ping Router(config-view)#commands exec include all show Router(config-view)#commands exec include configure Router(config-view)#commands configure include access-list Router(config-view)#commands configure include clock Router(config-view)#commands configure include hostname Router(config-view)#commands configure include interface Router(config-view)#commands configure include ip Router(config-view)#commands configure include line Router(config-view)#exit Router(config)# 19
20 Acme Company Security Administrator View Sample Configuration Router(config)# parser view SecOps Router(config-view)#password 5 SecOps@Pswd Router(config-view)#commands exec include copy running-config Router(config-view)#commands exec include login Router(config-view)#commands exec include all show Router(config-view)#commands exec include-exclusive show crypto Router(config-view)#commands exec include-exclusive show key Router(config-view)#commands exec include configure terminal Router(config-view)#commands configure include access-list Router(config-view)#commands configure include-exclusive crypto Router(config-view)#commands configure include-exclusive key Router(config-view)#commands configure include-exclusive liview Router(config-view)#exit Router(config)# 20
21 Acme Company Security Engineer Sample Configuration Router(config)#username engineer privilege 15 password engr=9l1 Access to all EXEC and configuration commands Easiest method is to assign them a privilege fifteen level 21
22 View Capabilities Operator NetOps SecOps Router#enable view operator Password: * view 'operator' Router#? Exec commands: exit ping show Router#show? hardware interfaces version Router#enable view NetOps Password: * view NetOps' Router#? Exec commands: clear configure copy enable exit ping show Router#show? controllers hardware interfaces version Router#configure terminal Router(config)#? access-list clock hostname interface ip line Router#enable view SecOps Password: * view SecOps' Router#? Exec commands: configure copy enable exit login ping show Router#show? controllers crypto hardware interfaces key version Router#configure terminal Router(config)#? access-list crypto key li-view 22
23 Task 4: Assign Username View Level Router(config)# username name {privilege privilege-level view view-name] password password} Router(config)# username admin_o view operator password chf&9l$ Router(config)# username admin_n view NetOps password kz7pe%t Router(config)# username admin_s view SecOps password p8ewo*i User automatically enters an assigned view upon successful login User can manually switch views with enable view view-name view-password 23
24 Example: Login and Views for Admin_o User 24
25 LAWFUL INTERCEPT VIEW CONFIGURATION Role-Based Presentation_ID CLI Access 03/ , Cisco Systems, 2004 Inc. Cisco All rights Systems, reserved. Inc. All rights reserved. 25
26 Lawful Intercept View Service Providers should be able to implement authorized and undetectable electronic surveillance Lawful Intercept is available in special 3DES Crypto K9 images found in hardware that supports Cisco IOS Software Release 12.3(7)T Able to monitor packets flowing through a Cisco router Copies packets and sends them to the Mediation Device for further processing Lawful Intercept user can only access lawful intercept commands that are held within the TAP-Management Information Base (MIB) Special set of Simple Network Management Protocol (SNMP) commands Stores information about calls and users One Lawful Intercept view 26
27 Lawful Intercept Configuration Tasks Task 1: login to Root view Task 2: configure a Lawful Intercept view Task 3: access Lawful Intercept view 27
28 Task 1: Login to Root View Router# enable view Router# enable view Password: enter enable or enable secret password *Mar 18 00:04:28.891: %PARSER-6-VIEW_SWITCH: successfully set to view 'root' Router# Note: % Authentication failed message returns if a user unsuccessfully authenticates 28
29 Task 2: Configure a Lawful Intercept View Step 1: Initialize Lawful Intercept View Router(config)# li-view li-password user username password password Router# configure terminal Router(config)# li-view 5eg4w0pi user li_admin password n*s3np7 *Mar 18 13:37:06.907: %PARSER-6-LI_VIEW_INIT: LI-View initialised. Router(config)#exit Notes: Only level fifteen privilege user can initialize a Lawful Intercept view At least one user must be specified 29
30 Task 2: Configure a Lawful Intercept View (Cont.) Step 2: (Optional) Create Users with the Lawful Intercept Option Upon Login Router(config)# username [lawful-intercept name][privilege privilegelevel view view-name] password password] Router# configure terminal Router(config)# username lawful-intercept LI-user1 password c9sq&v1 *Mar 18 13:37:06.907: %PARSER-6-LI_VIEW_INIT: LI-View initialised. Router(config)# 30
31 Task 2: Configure a Lawful Intercept View (Cont.) Step 3: (Optional) Edit Lawful Intercept View Router(config)# Router(config)#parser view view-name Router(config-view)# password 5 password Router(config-view)# name new-name Router(config-view)# commands parser-mode {include include-exclusive} [all] command Router(config-view)# exit Note: Lawful Intercept view defaults with all allowed commands 31
32 Task 3: Access Lawful Intercept View Router# Router# enable view li-view Password: enter li-password *Mar 18 15:38:36.151: %PARSER-6-VIEW_SWITCH: successfully set to view 'li-view' Router# 32
33 Monitoring Views and View Users Displays information about the view that the user is currently in Router# show parser view [all] Router# show parser view Current view is 'li-view' Router# Displays all users, who have access to a Lawful Intercept view Router# show users [lawful-intercept] Router# show users lawful-intercept li_admin LI-user1 Router# 33
34 Resources Cisco IOS Software Release 12.3(7)T Lawful Intercept Design Guides tml Cisco IOS Infrastructure Security Cisco IOS Software Collateral Library 34
35 35
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Configuring Access Service Security
CHAPTER 3 Configuring Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility. Authentication requires
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP address Subnet mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Cisco ISE Command-Line Interface
This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
A Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
USB Disable for Cisco ISRs Feature Module
USB Disable for Cisco ISRs Feature Module First Published: March 28, 2011 Part Number: This guide describes the USB Disable feature in the following major sections: Feature Introduction, page 1 Restrictions,
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Lab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands Device Host Name Interface IP Address Subnet Mask R1 CustomerRouter Serial 0/0/0 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet
Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...
Cisco Inter-network Operating System (IOS) A short guide for the NetAdmin Angelos Stavrou Let's start out at the very beginning with the question: "What is a Command?" The most important thing to understand
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 Customer Serial 0/0/1 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet 0/0 192.168.1.1
Cisco Routers and Switches
Cisco Routers and Switches Phoenix Cisco User Group (PCUG) Tools, tips, and tricks you never knew Hello! Jeremy D. Cioara - CCIE, MCSE, CNE AdTEC Networks - Chief Information Officer Cisco IP Telephony
One-Step Lockdown with Cisco SDM
One-Step Lockdown with Cisco SDM Router Hardening Automagically The process of turning off unnecessary services is called hardening a router to prevent attacks or exploits. The basic steps of router hardening
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Configuring the Content Routing Software
CHAPTER 2 This chapter describes the basic steps for configuring the Content Router software. Performing a Basic Startup Configuration After you physically install the Content Router hardware, configure
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
Table of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
LAB Configuring NAT. Objective. Background/Preparation
LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
ICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.
Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP
Controlling Access to a Virtual Terminal Line
Controlling Access to a Virtual Terminal Line First Published: August 18, 2006 Last Updated: August 18, 2006 You can control who can access the virtual terminal lines (vtys) to a router by applying an
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Cisco Router Configuration Tutorial
Cisco Router Configuration Tutorial Cisco Inter-network Operating System: Cisco IOS Modes of Operation The Cisco IOS software provides access to several different command modes. Each command mode provides
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
Configuring a Router
CHAPTER 3 Configuring a Router This chapter provides information and commands concerning the following topics: Configuring a router, specifically: Names Passwords Interfaces MOTD banners IP host tables
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
How to Configure Web Authentication on a ProCurve Switch
An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve
Lab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Device Interface IP Address Subnet Mask Default Gateway
Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.3
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.3 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected]
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
Sampled NetFlow. Feature Overview. Benefits
Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Triple DES Encryption for IPSec
Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
640-554. http://www.gratisexam.com/ Number: 640-554 Passing Score: 800 Time Limit: 120 min File Version: 1.0. Cisco 640-554. IINS v2.
640-554 Number: 640-554 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Cisco 640-554 IINS v2.0 Sections 1. 1. Common Security Threats 2. 2. Security and Cisco Routers
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches
Configuring TACACS+, RADIUS, and Kerberos on Cisco alyst Switches Document ID: 13847 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Steps
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats
Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats Guidelines for Deploying Cisco IOS SSH with X.509v3 PIV and CAC Smartcards Contents page Introduction 3 Requirements 3 Resolved
Router Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
Configuring Simple Network Management Protocol (SNMP)
Configuring Simple Network Management Protocol (SNMP) This chapter describes the Simple Network Management Protocol (SNMP), SNMP Management Information Bases (MIBs), and how to configure SNMP on Cisco
Remote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
TACACS+ Authentication
4 TACACS+ Authentication Contents Overview...................................................... 4-2 Terminology Used in TACACS Applications:........................ 4-3 General System Requirements....................................
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Management Authentication using Windows IAS as a Radius Server
Management Authentication using Windows IAS as a Radius Server OVERVIEW: In this we are using Radius server Windows IAS as a backend server for the management authentication for the controller. When the
Configuration Guide. Independent T1 Timing. 6AOSCG0025-29A February 2012
6AOSCG0025-29A February 2012 Configuration Guide This configuration guide describes the feature available on certain NetVanta units. This guide explains the differences in configuration settings on all
This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.
Problem: Patton / 240T WAN Setup Platform: NetGuardian 240T This TKP is a guide to setting up a PPP to T1 WAN connection between a Patton Model 2603 Router and a NetGuardian 240T. The example in this guide
RADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
D-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
Configuring Voice over IP
CHAPTER 4 This chapter explains how to configure voice interfaces and ports, which convert telephone voice signals for transmission over an IP network. This chapter presents the following major topics:
Firewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
Comware versus Cisco IOS Command Guide
Technical Marketing Engineering Routing and Switching Technology Routing and Switching Comware versus Cisco IOS Command Guide Technical Marketing Brief Revision v5 March 23, 2009 http://www.3com.com 3Com
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.5-6.2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems
