SlideShare une entreprise Scribd logo
1  sur  30
Enterprise Network 
Security 
Accessing the WAN – Chapter 4 
© 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
Objectives 
 Describe the general methods used to mitigate 
security threats to Enterprise networks 
 Configure Basic Router Security 
 Explain how to disable unused Cisco router network 
services and interfaces 
 Explain how to use Cisco SDM 
 Manage Cisco IOS devices 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain how sophisticated attack tools and open 
networks have created an increased need for network 
security and dynamic security policies 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the most common security threats and how 
they impact enterprises 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the most common types of network attacks 
and how they impact enterprises 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Describe the common mitigation techniques that 
enterprises use to protect themselves against threats 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain the concept of the Network Security Wheel 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the General Methods used to Mitigate 
Security Threats to Enterprise Networks 
 Explain the goals of a comprehensive security policy in 
an organization 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure Basic Router Security 
 Explain why the security of routers and their 
configuration settings is vital to network operation 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure Basic Router Security 
 Describe the recommended approach to applying Cisco 
IOS security features on network routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure Basic Router Security 
 Describe the basic security measures needed to secure 
Cisco routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Describe the router services and interfaces that are 
vulnerable to network attack 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Explain the vulnerabilities posed by commonly 
configured management services 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Explain How to Disable Unused Cisco 
Router Network Services and Interfaces 
 Explain how to secure a router with the command-line 
interface (CLI) auto secure command 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Explain How to Use Cisco SDM 
 Provide an overview of Cisco SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Explain How to Use Cisco SDM 
 Explain the steps to configure a router to use Cisco 
SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Explain How to Use Cisco SDM 
 Explain the steps you follow to start SDM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Explain How to Use Cisco SDM 
 Describe the Cisco SDM Interface 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Explain How to Use Cisco SDM 
 Describe the commonly used Cisco SDM wizards 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Explain How to Use Cisco SDM 
 Explain how to use Cisco SDM for locking down your 
router 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Manage Cisco IOS Devices 
 Describe the file systems used by a Cisco router 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Manage Cisco IOS Devices 
 Describe how to backup and upgrade a Cisco IOS 
image 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Manage Cisco IOS Devices 
 Explain how to back up and upgrade Cisco IOS 
software images using a network server 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Manage Cisco IOS Devices 
 Explain how to recover a Cisco IOS software image 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Manage Cisco IOS Devices 
 Compare the use of the show and debug commands 
when troubleshooting Cisco router configurations 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Manage Cisco IOS Devices 
 Explain how to recover the enable password and the 
enable secret passwords 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary 
 Security Threats to an Enterprise network include: 
–Unstructured threats 
–Structured threats 
–External threats 
–Internal threats 
 Methods to lessen security threats consist of: 
–Device hardening 
–Use of antivirus software 
–Firewalls 
–Download security updates 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Summary 
 Basic router security involves the following: 
–Physical security 
–Update and backup IOS 
–Backup configuration files 
–Password configuration 
–Logging router activity 
 Disable unused router interfaces & services to minimize 
their exploitation by intruders 
 Cisco SDM 
–A web based management tool for configuring security 
measures on Cisco routers 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary 
 Cisco IOS Integrated File System (IFS) 
–Allows for the creation, navigation & manipulation of 
directories on a cisco device 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30

Contenu connexe

Tendances

CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6Irsandi Hasan
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Carmelo de Jesús
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4Irsandi Hasan
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationVuz Dở Hơi
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5Irsandi Hasan
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1Irsandi Hasan
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2Irsandi Hasan
 

Tendances (20)

CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
 

En vedette

CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8Irsandi Hasan
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12Irsandi Hasan
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7Irsandi Hasan
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5Irsandi Hasan
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9Irsandi Hasan
 

En vedette (20)

CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
IPv6 ACL
IPv6 ACLIPv6 ACL
IPv6 ACL
 

Similaire à CCNA Exploration 4 - Chapter 4

CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8Irsandi Hasan
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxJohn572978
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2Irsandi Hasan
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8Irsandi Hasan
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5 ali raza
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3Irsandi Hasan
 

Similaire à CCNA Exploration 4 - Chapter 4 (20)

Week3 1
Week3 1Week3 1
Week3 1
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 

Plus de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 

Plus de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

CCNA Exploration 4 - Chapter 4

  • 1. Enterprise Network Security Accessing the WAN – Chapter 4 © 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
  • 2. Objectives  Describe the general methods used to mitigate security threats to Enterprise networks  Configure Basic Router Security  Explain how to disable unused Cisco router network services and interfaces  Explain how to use Cisco SDM  Manage Cisco IOS devices © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain how sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common security threats and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the most common types of network attacks and how they impact enterprises © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Describe the common mitigation techniques that enterprises use to protect themselves against threats © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the concept of the Network Security Wheel © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Describe the General Methods used to Mitigate Security Threats to Enterprise Networks  Explain the goals of a comprehensive security policy in an organization © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Configure Basic Router Security  Explain why the security of routers and their configuration settings is vital to network operation © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Configure Basic Router Security  Describe the recommended approach to applying Cisco IOS security features on network routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Configure Basic Router Security  Describe the basic security measures needed to secure Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Describe the router services and interfaces that are vulnerable to network attack © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain the vulnerabilities posed by commonly configured management services © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Explain How to Disable Unused Cisco Router Network Services and Interfaces  Explain how to secure a router with the command-line interface (CLI) auto secure command © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Explain How to Use Cisco SDM  Provide an overview of Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Explain How to Use Cisco SDM  Explain the steps to configure a router to use Cisco SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Explain How to Use Cisco SDM  Explain the steps you follow to start SDM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Explain How to Use Cisco SDM  Describe the Cisco SDM Interface © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Explain How to Use Cisco SDM  Describe the commonly used Cisco SDM wizards © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Explain How to Use Cisco SDM  Explain how to use Cisco SDM for locking down your router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Manage Cisco IOS Devices  Describe the file systems used by a Cisco router © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Manage Cisco IOS Devices  Describe how to backup and upgrade a Cisco IOS image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Manage Cisco IOS Devices  Explain how to back up and upgrade Cisco IOS software images using a network server © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. Manage Cisco IOS Devices  Explain how to recover a Cisco IOS software image © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Manage Cisco IOS Devices  Compare the use of the show and debug commands when troubleshooting Cisco router configurations © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Manage Cisco IOS Devices  Explain how to recover the enable password and the enable secret passwords © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Summary  Security Threats to an Enterprise network include: –Unstructured threats –Structured threats –External threats –Internal threats  Methods to lessen security threats consist of: –Device hardening –Use of antivirus software –Firewalls –Download security updates © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. Summary  Basic router security involves the following: –Physical security –Update and backup IOS –Backup configuration files –Password configuration –Logging router activity  Disable unused router interfaces & services to minimize their exploitation by intruders  Cisco SDM –A web based management tool for configuring security measures on Cisco routers © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  • 29. Summary  Cisco IOS Integrated File System (IFS) –Allows for the creation, navigation & manipulation of directories on a cisco device © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30