Cisco 857W - Integrated Services Router Información técnica Pagina 1

Busca en linea o descarga Información técnica para Redes Cisco 857W - Integrated Services Router. Cisco 857W - Integrated Services Router System information Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 34
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
This chapter covers the following topics:
ISR overview and providing secure
administrative access: This section describes
methods of securely accessing a router prompt for
purposes of administration. Additionally, this
section provides an overview of the Cisco
Integrated Services Router (ISR) line of routers.
Cisco Security Device Manager overview:
This section examines the Cisco Security Device
Manager (SDM) interface. The graphical
interface provided by SDM allows administrators
to configure a variety of router features using a
collection of wizards and other configuration
aids, which use best-practice recommendations
from the Cisco Technical Assistance Center
(TAC).
Vista de pagina 0
1 2 3 4 5 6 ... 33 34

Indice de contenidos

Pagina 1

This chapter covers the following topics:ISR overview and providing secure administrative access: This section describes methods of securely accessin

Pagina 2 - Defending the Perimeter

ISR Overview and Providing Secure Administrative Access 85ISR Enhanced FeaturesAlthough traditional Cisco routers (that is, non-ISRs) offer featur

Pagina 3

86 Chapter 3: Defending the Perimeter Advanced Integration Modules: Cisco offers a variety of Advanced Integration Modules (AIM), which can offloa

Pagina 4

ISR Overview and Providing Secure Administrative Access 87Figure 3-2 Administrative Access to a RouterTelnet sends data in clear text. Therefore,

Pagina 5

88 Chapter 3: Defending the Perimeter Use a mixture of alphabetic (both uppercase and lowercase), numeric, and special characters. The password

Pagina 6 - Foundation Topics

ISR Overview and Providing Secure Administrative Access 89To configure a password for a router’s console, the administrator enters line configuratio

Pagina 7

90 Chapter 3: Defending the PerimeterThe enable secret password appears in the running configuration as an MD5 hash value. However, the console, au

Pagina 8

ISR Overview and Providing Secure Administrative Access 91Aside from having a single password for all administrators, individual user accounts can

Pagina 9

92 Chapter 3: Defending the PerimeterLimiting the Number of Failed Login AttemptsIf an attacker uses a brute-force attack or a dictionary attack w

Pagina 10

ISR Overview and Providing Secure Administrative Access 93Configuring Privilege LevelsLarger enterprise environments might need to support multipl

Pagina 11 - Password-Protecting a Router

94 Chapter 3: Defending the Perimeterexactly what commands an administrator has access to. Following are the steps required to configure these view

Pagina 12

C H A P T E R3Defending the PerimeterIn addition to Cisco firewall, virtual private network (VPN), and intrusion prevention system (IPS) appliances tha

Pagina 13 - Password Type Description

ISR Overview and Providing Secure Administrative Access 95Step 5Add available commands to the view: The commands parser_mode {include | include-ex

Pagina 14

96 Chapter 3: Defending the PerimeterEnabling Cisco IOS Login Enhancements for Virtual ConnectionsAdministrators, and therefore attackers, can cre

Pagina 15

ISR Overview and Providing Secure Administrative Access 97Consider the enhanced support for virtual logins configuration shown in Example 3-17. Aft

Pagina 16

98 Chapter 3: Defending the PerimeterCreating a Banner MessageWhen someone connects to one of your routers, he sees some sort of message or prompt

Pagina 17

Cisco Security Device Manager Overview 99Cisco Security Device Manager OverviewCisco IOS routers support many features (including security feature

Pagina 18 - Configuring Privilege Levels

100 Chapter 3: Defending the PerimeterFigure 3-3 SDM Home ScreenSome newer Cisco routers come with SDM preinstalled, but SDM needs to be installed

Pagina 19 - Example 3-13 Creating a View

Cisco Security Device Manager Overview 101Preparing to Launch Cisco SDMIf you plan to run SDM on a router that does not already have SDM installed

Pagina 20 - Protecting Router Files

102 Chapter 3: Defending the PerimeterIf you run SDM from a router’s flash, as opposed to running SDM from a PC, the first time you connect to the r

Pagina 21 - Step Description

Cisco Security Device Manager Overview 103After clicking the Configure button, you see a screen similar to the one shown in Figure 3-5. Notice the

Pagina 22 - Command Description

104 Chapter 3: Defending the PerimeterIn addition to the configuration wizards, notice the Additional Tasks button, as shown in Figure 3-6.Figure 3

Pagina 23 - Creating a Banner Message

78 Chapter 3: Defending the Perimeter1. Which of the following are considered IOS security features? (Choose four.)a. Stateful firewallb. MARSc. IP

Pagina 24 - Introducing SDM

Cisco Security Device Manager Overview 105Advanced administrators can use graphical interfaces to configure these additional tasks. Examples of the

Pagina 25 - Figure 3-3 SDM Home Screen

106 Chapter 3: Defending the PerimeterExam Preparation TasksReview All the Key TopicsReview the most important topics from this chapter, denoted w

Pagina 26 - Preparing to Launch Cisco SDM

Command Reference to Check Your Memory 107Command Reference to Check Your MemoryThis section includes the most important configuration and EXEC com

Pagina 27 - Figure 3-4 SDM Toolbar

108 Chapter 3: Defending the PerimeterCommand Descriptionsecure boot-image A global configuration mode command used to enable image resiliencesecur

Pagina 28 - Cisco SDM Wizards

Command Reference to Check Your Memory 109Table 3-14 Chapter 3 EXEC Command ReferenceCommand Descriptionenable view Enables the root view, which i

Pagina 29 - Cisco SDM Wizards (Continued)

“Do I Know This Already?” Quiz 795. What line configuration mode command would you enter to prevent a line (such as a console, aux, or vty line) co

Pagina 30 - Figure 3-7 Monitoring Tasks

80 Chapter 3: Defending the Perimeter9. When you configure Cisco IOS login enhancements for virtual connections, what is the “quiet period”?a. The

Pagina 31 - Exam Preparation Tasks

ISR Overview and Providing Secure Administrative Access 81Foundation TopicsISR Overview and Providing Secure Administrative AccessThis section beg

Pagina 32

82 Chapter 3: Defending the Perimeterthe router architecture. Although Cisco offers a wide range of router platforms, ISR models are easy to ident

Pagina 33

ISR Overview and Providing Secure Administrative Access 83Cisco 1800 SeriesThe Cisco 1800 series of ISRs is designed for small businesses and smal

Pagina 34

84 Chapter 3: Defending the PerimeterCisco 2800 SeriesThe Cisco 2800 series of ISRs is designed for small-to-medium businesses and enterprise bran

Comentarios a estos manuales

Sin comentarios