Introduction to Cisco router configuration



Similar documents
3.1 Connecting to a Router and Basic Configuration

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Cisco Router Configuration Basics. Scalable Infrastructure Workshop

8 steps to protect your Cisco router

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Comware versus Cisco IOS Command Guide

Applicazioni Telematiche

- Basic Router Security -

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Configuring Access Service Security

Basic Configuration of the Cisco Series Internet Router

Connecting to the Firewall Services Module and Managing the Configuration

Lab 2 - Basic Router Configuration

Basic Router and Switch Instructions (Cisco Devices)

Firewall Authentication Proxy for FTP and Telnet Sessions

HOW TO CONFIGURE CISCO FIREWALL PART I

Lab Configure Syslog on AP

- Advanced IOS Functions -

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Lab 5.3.9b Managing Router Configuration Files Using TFTP

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Lab Configure Basic AP Security through IOS CLI

Lab Configuring Syslog and NTP (Instructor Version)

Lab Advanced Telnet Operations

Configuring a Router

Configuring System Message Logging

CCNA 2 Chapter 5. Managing Cisco IOS Software

Configuring CSS Remote Access Methods

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Configuring a Cisco 2509-RJ Terminal Router

Center for Internet Security Gold Standard Benchmark for Cisco IOS

Network Security and AAA

Lab Introductory Lab 1 Getting Started and Building Start.txt

Router Lab Reference Guide

Skills Assessment Student Training Exam

CISCO CATALYST 3550 Series Switches

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Securing Networks with PIX and ASA

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?

Password Recovery Procedure for the Cisco 3600 and 3800 Series Routers

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Troubleshooting the Firewall Services Module

Remote Access VPN Business Scenarios


Configuring System Message Logging

Lab Load Balancing Across Multiple Paths

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Cisco ASA. Administrators

Brocade to Cisco Comparisons

Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...

Troubleshooting the Firewall Services Module

Cisco IOS Switch Security Configuration Guide

BRI to PRI Connection Using Data Over Voice

Password Recovery Procedure for the Cisco 806, 826, 827, 828, 831, 836, 837 and 881 Series Routers

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Configuring Modem Transport Support for VoIP

Enhanced Password Security - Phase I

Backing Up and Restoring Data

ICND IOS CLI Study Guide (CCENT)

Objectives. Background. Required Resources. CCNA Security

Chapter 2 Using the Command Line Interface

Password Recovery Procedure for the Cisco Catalyst 2948G L3, 4840G, and 4908G L3 Switch Routers

RADIUS Authentication and Accounting

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

LAB THREE STATIC ROUTING

DPS Telecom Your Partners in Network Alarm Management

Lab Configure Cisco IOS Firewall CBAC

Cisco Routers and Switches

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

TACACS+ Authentication

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Enhanced Password Security - Phase I

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Using the Command-Line Interface

Chapter 4 Managing Your Network

Lab Exercise Configure the PIX Firewall and a Cisco Router

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls

Lab Load Balancing Across Multiple Paths Instructor Version 2500

Configuring the Cisco Secure PIX Firewall with a Single Intern

RADIUS Server Load Balancing

Cisco Configuration Professional Quick Start Guide

Cisco Router Configuration Tutorial

Cisco IOS Firewall. Executive Summary

Virtual Fragmentation Reassembly

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

- The PIX OS Command-Line Interface -

Lab Developing ACLs to Implement Firewall Rule Sets

Lab 8.4.3a Managing Cisco IOS Images with TFTP

HTTP 1.1 Web Server and Client

One-Step Lockdown with Cisco SDM

Lab: Basic Router Configuration

Transcription:

Introduction to Cisco router configuration AFNOG 2001 Workshop 07 to 11 May 2001 Accra - GHANA By: Adiel AKPLOGAN CAFE Informatique S. A. - TOGO E-mail: adiel@akplogan.net - Web: http://www.akplogan.net

Introduction Router are intelligent equipments used for packet forwarding and network interconnection. Description Front panel Back panel Need to process information and data For that purpose they run a real operating system IOS: Internetworking Operating System 2

Router components Like a computer they are composed of: Microprocessor to run the IOS RAM to store data, run programs and buffer data. NVRAM to store instruction for performing the self test of the device. It also contain a subset of of the l'ios. Flash memory: like an NVRAM that can be erase and rewrite electronically (used like PC use disk storage). The copy of IOS the router run is store on it. Network Interfaces: Primary for the router. 3

CISCO IOS 4 Accessing the router: By the Console port Or from network Login to the router: With a password stored in the config file. Password: Through access server (TACACS +, RADIUS) TACACS (Terminal Access Controller Access Control System) RADIUS (Remote Access Dial-In User Service) two mode user exec mode routeur-t2> privilege exec mode (enable/disable) Routeur-t2#

CISCO IOS 5 the command are automatically interpreted by the user interface. Routeur-t2>show version You can abbreviate the commands Routeur-t2>sh ver help available at any level E.g.: routeur>? Access command history trough direction key on your keyboard (up and down) show history to see what is in the buffer Filter the output of command ex: routeur>sh ver include exclude begin key

CISCO IOS 6 Editing feature on Cisco IOS Cursor Movement: Ctrl+A cursor to the beginning of the line Ctrl+E cursor to the end of the line Ctrl+B cursor to the beginning of the previous word Ctrl+K delete all characters from the cursor to the end of the command line Ctrl+U or X delete from the cursor to the beginning You can recall deletions and past them on the line of the cursor Ctrl+Y paste the most recent deletion at the cursor Esc+Y recall the next buffer entry and pas at the cursor You can turn off terminal editing # terminal no editing

Router configuration Three possible method to configure a router: Terminal (entering the commands directly) From memory (copy config. from RAM to NVRAM) From network (copy configuration from an tftp server) For this track we will address mostly terminal configuration by accessing the routers through the console port 7

Router configuration user exec mode ">" privilege exec mode "#" configuration "(conf)#" interface "(conf-if)#" line "(conf-li)#" router "(config-router)#" 8

Terminal configuration mode Enter configuration mode from your FreeBSD machine connect to the router using the serial interface and configuration cable provide (to be connect to the console port) /etc/remote (to see the device configure to be used with "tip") you will see at the end, a line begin with cuaa0c (you can change it to cisco) bash$ tip cuaa0c (or cisco) 9 router> router>enable routeur#

Configuration (cont'd) 10 Read the router configuration routeur#show running-config Summary of interfaces routeur#show interface routeur#show interface brief The first thing we should do is to set the name of our router. routeur# configure terminal routeur(config)# hostname router-x (where X stand for you table letter) router-x(config)# You may optionally want to add a banner router-x(config)#banner motd #AFNOG success#

Interface configuration 11 Set the enable password: router-x(config)# enable password t2@afnog If you see in your config file, you will see that the enable password is displayed in clear text -- that is not safe, you have to encrypt it. router-x(config)# service password-encryption router-x(config)# enable secret "your pswd"(md5 encryption) To configure interface you should go to interface config menu router-x(config) interface ethernet0 (or 0/x) router-x(config-if)# Save your config router-x #copy running-config startup-config

Manage configuration file You can manipulate file in router. The most common manipulation is the copy. router-x#copy run star router-x#copy running-config tftp Copy the active config file to a tftp server on the network router-x#copy tftp running-config Copy the backup config file from tftp server to the active configuration file. You can specify on your configuration file where you want the router to boot from router-x# boot system flash afnog.ios You can have many boot method set on your config file 12

Configuration wizard It is possible to configure Cisco router through an interactive configuration mode. Automatically start on router without config store on the NVRAM From the command line interface router-x#setup 13

IOS Upgrade The IOS reside in the router as a file stored in flash memory. It is run directly from there (small routers), or from a copy put in the RAM at boot time. For small router: Use of flash load helper utility: The flash load helper will reboot the router using the ROM-based IOS and copy the new IOS to flash. 14

Basic security configuration Some commands used to secure your router configuartion: GENERAL enable secret service password-encription no service tcp-small-server no service udp-small-server no service finger no cdp runing no cdp enable logging no ip source-route access-list no ip proxy-arp route 0.0.0.0 0.0.0.0 null 0 255 INTERFACES no ip-direct-broadcast iacces-group list in LINES acces-class list in transport input login 15

Securing your router login/acces You can secure you router access by using authentification server access login. TACACS+ (proprietary) RADIUS (tiers Lucent, Merit ) They are all available free on the network Secure access by packet filtering 16

Authentication server setup Installation Download the binary source code TACACS+ : ftp-eng.cisco.com/pub/tacacs RADIUS : www.freeradius.org Compile, Install and configure Enable authentication on the router TACACS+ aaa new-model aaa authentication login default group tacac+ enable aaa authentication enable default group tacac+ enable aaa accounting exec start-stop group tacac+ 17 ip tacacs source-interface tacacs-server host 215.20.110.1 port xx tacacs-server key trstech#01

Authentication server setup Activate authentication on the router RADIUS aaa new-model aaa authentication login default group radius enable aaa authentication enable default group radius enable aaa accounting exec start-stop group radius ip radius source-interface xxxx radius-server host 215.20.110.1 auth-port 1812 acct-port 1813 radius-server key t2@afnog 18

Using up access lists The ACL Access Control Lists IP (1-99) IP extend (100 199) Ingress Trafic A Egress Trafic X B 19

Securing with access lists 20 Egress and Ingress filtering IP access-list 4 permit 208.224.122.73 access-list 4 permit 216.226.223.158 IP EXTEND access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny access-list 110 deny ip host 0.0.0.0 any ip 10.0.0.0 0.255.255.255 any ip 172.16.0.0 0.15.255.255 any ip 192.168.0.0 0.0.0.255 any ip 205.224.122.0 0.0.0.255 any ip 127.0.0.0 0.0.0.255 any tcp any host 205.224.122.3 eq telnet tcp any host 205.224.122.3 eq www tcp any host 205.224.122.3 eq finger tcp any host 205.224.122.1 eq ftp access-list 110 permit ip any any access-list 110 permit tcp any any Apply it to interface ip access-group 110 in (serial Interface) access-class 4 in (vty)

Manage router logs Logs Directly on the router To a remote server with syslogd (Unix) Logs formats Mm/dd/yyyy:hh/mm/ss:MLS-Mnemonic:description Oct 30 23:21:13.827: %MLS-3-LINK-3-UPDOWN: Interface Async75, changed state to down Message Log System (MLS) severity 0 Emergency 3 Error 6 Informational 1 Alert 4 Warning 7 Debugging 21 2 Critical 5 Notification

Router logs stup Logging on the router set logging session [console] enable set logging timestamp set logging level all 5 set logging buffer size of the buffer that store logs 22 Logging on a unix server On the server side Verify that syslogd is unstalled and running Add the line bellow to /etc/syslogd.conf user.debug /var/log/cisco.log create the file cisco.log and give it the good right restart syslogd On the router side set logging server ip_adresse

Password recovery 23 Password loss: http://www.cisco.com/warp/public/474/ Save the current register configuration: it is usually 0x2102 or 0x102 Restart the router and press Break (Alt+break depend on witch terminal you are using) within the 60s after the boot process begin to stop the boot process from flash. ROMMON>confreg 0x2142 (boot from flash without loading configuration) Enter reset at the prompt > Answer no to the autoconfig question

Password recovery (cont'd) Router>enable Router# config mem Router#sh run Router#config term Router(config)#enable secret "new passwd" Router(config)# config-register 0x2102 Router#wr mem Reboot the router 24