SlideShare a Scribd company logo
1 of 23
CISCO IOS HARDENING Presented By :-  Shweta Mehta Suneet Malik
Introduction ,[object Object],Internetwork Operating system Used on Cisco Routers and switches Package integrated with multitasking OS Characteristics CLI(Command Line Interface) ,[object Object],Process of securing a system by reducing vulnerabilities
Three Planes of a Network ,[object Object]
Control Plane
Data Plane
Each plane provide     different functionality
MANAGEMENT PLANE
Management Plane Fortification ,[object Object]
Use strong password and secure them strongly.
Use the login password retry lockout feature.
Monitor the memory and CPU load of network devices.
Disable unneeded services ,[object Object]
Contd.. ,[object Object],Permit connections that are required for routing protocols and network management. Explicitly deny  all other IP traffic  to any network device. Permit all transit traffic that crosses the network and is not destined for infrastructure devices.
Contd.. ,[object Object]
Permit tcp host 192.168.1.2 eq 179 host 192.168.1.1
Permit tcp host 192.168.1.3 any eq 22
Deny ip any 192.168.1.0 0.255.255.255
Use Authentication ,Authorization and accounting (AAA).
Fortify SNMP.
Utilize logging best practices.
Utilize configuration management features of CISCO IOS Software.,[object Object]
CONTROL PLANE

More Related Content

What's hot

CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
IT Tech
 
5.3.1.2 packet tracer skills integration challenge instructions
5.3.1.2 packet tracer   skills integration challenge instructions5.3.1.2 packet tracer   skills integration challenge instructions
5.3.1.2 packet tracer skills integration challenge instructions
Jose Luis Heredia
 

What's hot (20)

Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
5.3.1.2 packet tracer skills integration challenge instructions
5.3.1.2 packet tracer   skills integration challenge instructions5.3.1.2 packet tracer   skills integration challenge instructions
5.3.1.2 packet tracer skills integration challenge instructions
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcsl
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
Network Security
Network SecurityNetwork Security
Network Security
 
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseSite-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
 
What is Firewall?
What is Firewall?What is Firewall?
What is Firewall?
 
Linux Security Crash Course
Linux Security Crash CourseLinux Security Crash Course
Linux Security Crash Course
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
Basics to Configure NW Device
Basics to Configure NW DeviceBasics to Configure NW Device
Basics to Configure NW Device
 
Security context on asa firewall
Security context on asa firewallSecurity context on asa firewall
Security context on asa firewall
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
Net prog
Net progNet prog
Net prog
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Konfigurasi dasar Cisco Router
Konfigurasi dasar Cisco RouterKonfigurasi dasar Cisco Router
Konfigurasi dasar Cisco Router
 

Similar to Cisco Ios Suneet

All about routers
All about routersAll about routers
All about routers
agwanna
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 

Similar to Cisco Ios Suneet (20)

CCNA
CCNACCNA
CCNA
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 
6.Routing
6.Routing6.Routing
6.Routing
 
All about routers
All about routersAll about routers
All about routers
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
IDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxIDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptx
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
3.Network
3.Network3.Network
3.Network
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp uk
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
Ipmi Server Management
Ipmi Server ManagementIpmi Server Management
Ipmi Server Management
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 

Cisco Ios Suneet

Editor's Notes

  1. Management plane is the plane that receives and send the traffic that is used to access, configure and manage a device as well as monitor its operation and network on which it is deployed .The management plane is made up of protocols that support operational need of the network .The management plane includes interactive access to network devices using secure shell(SSH) or Telnet statistics collection using SNMP.
  2. Control plane functions consist of protocols and processes Control Plane consist of Protocols.