© 2006 Cisco Systems, Inc. All rights reserved.SND v2.02-1 Module Summary Routers play an important role in ensuring that network perimeters are secure;

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Module Summary The Cisco Discovery Protocol is an information-gathering tool used by network.
© 2005 Cisco Systems, Inc. All rights reserved. INTRO v Module Summary The Cisco IOS software platform is implemented on most Cisco hardware platforms,
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Attacks can target various components of modern networks, such as system integrity,
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Cisco Network Foundation Protection Securing the Management Plane.
© 2006 Cisco Systems, Inc. All rights reserved. GWGK v Module Summary A gatekeeper is an H.323 entity on the network, which provides services such.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Configuring a Cisco IOS Firewall Configuring a Cisco IOS Firewall with the Cisco SDM Wizard.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary CSA MC enables you to configure groups, to ease host management and security.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary Advanced VRF features allow selective import or export of routes. Overlapping.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Applying a Security Policy for Cisco Routers.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Configuring Cisco IOS IPS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Module Summary The multihomed customer network must exchange BGP information with both ISP.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Managed CE Router Service.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v Implementing IPv6 Using IPv6 with IPv4.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary IDS technology is passive; it monitors the network for suspicious activity and.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Operating and Configuring Cisco IOS Devices Configuring a Router.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure; therefore, router configurations should conform to organizational security policies. Ensure that administrative access to routers is controlled to include remote access. Run only the necessary services on the router to remotely administer routers. Administration of router security and other services has been simplified with the availability of Cisco SDM. Once administrative access is secure, ensure that AAA is configured to control individual access to the network through the perimeter. Unnecessary services and interfaces can be shut down by using the automated processes of Cisco AutoSecure from the CLI or One-Step Lockdown with Cisco SDM. When setting up remote management of Cisco routers, ensure that you use the most secure options available such as SNMPv3 and SSH. Cisco IOS software deployed on Cisco integrated services router platforms provides security options integrated into a perimeter routing platform.

© 2006 Cisco Systems, Inc. All rights reserved.SND v2.02-2