Previous Chapter Next Chapter 

Module 5: Cisco Device Hardening

5.1 Thinking Like a Hacker
5.1.1 Seven Steps to Hacking a Network
5.1.2 Step 1: Footprint Analysis
5.1.3 Step 2: Enumerate Information
5.1.4 Step 3: Manipulate Users to Gain Access
5.1.5 Step 4: Escalate Privileges
5.1.6 Step 5: Gather Additional Passwords and Secrets
5.1.7 Step 6: Install Back Doors and Port Redirectors
5.1.8 Step 7: Leverage the Compromised System
5.1.9 Best Practices to Defeat Hackers
5.2 Mitigating Network Attacks
5.2.1 Types of Network Attacks
5.2.2 Reconnaissance Attacks
5.2.3 Packet Sniffers
5.2.4 Port Scans and Ping Sweeps
5.2.5 Access Attacks and Mitigation
5.2.6 Trust Exploitation
5.2.7 DoS and DDoS Attacks and Mitigation
5.2.8 IP Spoofing in DoS and DDoS
5.3 Network Attacks Using Intelligence
5.3.1 End Station Vulnerabilities: Worm, Virus, and Trojan Horses
5.3.2 Worm Attack, Mitigation and Response
5.3.3 Application Layer Attacks and Mitigation
5.3.4 Management Protocols and Vulnerabilities
5.3.5 Management Protocol Best Practices
5.3.6 Determining Vulnerabilities and Threats
5.4 Disabling Unused Cisco Router Network Services and Interfaces
5.4.1 Vulnerable Router Services and Interfaces
5.4.2 Locking Down Routers with AutoSecure
5.4.3 AutoSecure Process Overview
5.4.4 AutoSecure Processing
5.4.5 Display AutoSecure Configuration
5.4.6 Locking Down Routers with Cisco SDM
5.5 Securing Cisco Router Administrative Access
5.5.1 Cisco Router Passwords
5.5.2 Initial Password Configuration
5.5.3 Protecting Line Access
5.5.4 Additional Password Security
5.5.5 Protecting Your Router by Securing ROMMON
5.5.6 Setting Login Failure Rates and Conditions
5.5.7 Setting Timeouts
5.5.8 Setting Multiple Privilege Levels
5.5.9 Configuring Banner Messages
5.6 Configuring Role-Based CLI
5.6.1 Role-Based CLI Overview
5.6.2 Getting Started with Role-Based CLI
5.6.3 Configuring CLI Views
5.6.4 Configuring Superviews
5.6.5 Role-Based CLI Monitoring
5.6.6 Role-Based CLI Configuration Example
5.6.7 Secure Configuration Files
5.7 Mitigating Threats and Attacks with Access Lists
5.7.1 Overview of Cisco ACL
5.7.2 Applying ACLs to Router Interfaces
5.7.3 Using Traffic Filtering with ACLs
5.7.4 Filtering Network Traffic to Mitigate Threats
5.7.5 Mitigating DDoS with ACLs
5.7.6 Combining Access Functions
5.7.7 Caveats
5.8 Securing Management and Reporting Features
5.8.1 Secure Management and Reporting Planning Considerations
5.8.2 Secure Management and Reporting Architecture
5.8.3 Configuring an SSH Server for Secure Management and Reporting
5.8.4 Using Syslog Logging for Network Security
5.8.5 Configuring Syslog Logging
5.9 Configuring SNMP
5.9.1 SNMP Version 1 and 2
5.9.2 SNMPv3
5.9.3 Configuring an SNMP Managed Node
5.9.4 Task 1: Configuring the SNMP-Server Engine ID
5.9.5 Task 2: Configuring the SNMP-Server Group Names
5.9.6 Task 3: Configuring the SNMP-Server Users
5.9.7 Task 4: Configuring the SNMP-Server Hosts
5.10 Configuring the NTP Client
5.10.1 Understanding NTP
5.10.2 Configuring NTP Authentication
5.10.3 Configuring NTP Associations
5.10.4 Configuring Additional NTP Options
5.10.5 Implementing the NTP Server
5.10.6 Configuring NTP Server
5.11 Configuring AAA on Cisco Routers
5.11.1 Introduction to AAA
5.11.2 Router Access Modes
5.11.3 AAA Protocols: RADIUS and TACACS+
5.11.4 Configure AAA Login Authentication on Cisco Routers Using CLI
5.11.5 Configure AAA Login Authentication on Cisco Routers Using SDM
5.11.6 Troubleshoot AAA Login Authentication on Cisco Routers
5.11.7 AAA Authorization Commands
5.11.8 AAA Accounting Commands
5.11.9 Troubleshooting Accounting
5.12 Cisco Device Hardening Lab Exercises
5.12.1 Lab 5.1 Using SDM One-Step Lockdown
5.12.2 Lab 5.2 Securing a Router with Cisco AutoSecure
5.12.3 Lab 5.3 Disabling Unneeded Services
5.12.4 Lab 5.4 Enhancing Router Security
5.12.5 Lab 5.5 Configuring Logging
5.12.6 Lab 5.6 Configuring AAA Authentication
5.12.7 Lab 5.7 Configuring Role-Based CLI Views
5.12.8 Lab 5.8 Configuring NTP
 Previous Chapter Next Chapter 

netacad.kiev.ua