Ccna Security Part 2c

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Password Recovery

Procedures
1.
2.
3.
4.
5.
6.
7.
8.

Connect to the console port.


Use the show version command to view and record the
configuration register
Use the power switch to turn off the router, and then turn
the router back on.
Press Break on the terminal keyboard within 60 seconds of
power up to put the router into ROMmon.
At the rommon 1> prompt Type config 0x2142.
Type reset at the rommon 2> prompt. The router reboots,
but ignores the saved configuration.
Type no after each setup question, or press Ctrl-C to skip
the initial setup procedure.
Type enable at the Router> prompt.

Password Recovery
Procedures, 2
9.
10.
11.
12.

13.

14.

Type copy startup-config running-config to copy the


NVRAM into memory.
Type show running-config.
Enter global configuration and type the enable secret
command to change the enable secret password.
Issue the no shutdown command on every interface to be
used. Once enabled, issue a show ip interface brief
command. Every interface to be used should display up
up.
Type config-register
configuration_register_setting. The
configuration_register_setting is either the value recorded in
Step 2 or 0x2102 .
Save configuration changes using the copy runningconfig startup-config command.

Preventing Password Recovery


R1(config)# no service password-recovery
WARNING:
Executing this command will disable password recovery mechanism.
Do not execute this command without another plan for password recovery.
Are you sure you want to continue? [yes/no]: yes
R1(config)
R1# sho run
Building configuration...
Current configuration : 836 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
no service password-recovery
System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2006 by cisco Systems, Inc.
PLD version 0x10
GIO ASIC version 0x127
c1841 platform with 131072 Kbytes of main memory
Main memory is configured to 64 bit mode with parity disabled
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED
program load complete, entry point: 0x8000f000, size: 0xcb80

Implementing Secure
Management

Configuration Change Management


Know the state of critical network devices
Know when the last modifications occurred
Ensure the right people have access when new

management methodologies are adopted


Know how to handle tools and devices no longer used

Automated logging and reporting of information


from identified devices to management hosts
Available applications and protocols like SNMP

Secure Management and


Reporting

When logging and managing


information, the information flow
between management hosts and the
managed devices can take two paths:
Out-of-band (OOB): Information flows on a

dedicated management network on which


no production traffic resides.
In-band: Information flows across an
enterprise production network, the Internet,
or both using regular data channels.

Factors to Consider

OOB management appropriate for


large enterprise networks
In-band management recommended in
smaller networks providing a more
cost-effective security deployment
Be aware of security vulnerabilities of
using remote management tools with
in-band management

Using Syslog

Implementing Router Logging


Syslog
Configuring System Logging
Enabling Syslog using SDM

Implementing Router
Logging
Configure the router to send log
messages to:

Console: Console logging is used when modifying


or testing the router while it is connected to the
console. Messages sent to the console are not
stored by the router and, therefore, are not very
valuable as security events.
Terminal lines: Configure enabled EXEC sessions
to receive log messages on any terminal lines.
Similar to console logging, this type of logging is
not stored by the router and, therefore, is only
valuable to the user on that line.

Implementing Router
Logging

Buffered logging: Store log messages in router


memory. Log messages are stored for a time, but
events are cleared whenever the router is
rebooted.
SNMP traps: Certain thresholds can be
preconfigured. Events can be processed by the
router and forwarded as SNMP traps to an
external SNMP server. Requires the configuration
and maintenance of an SNMP system.
Syslog: Configure routers to forward log messages
to an external syslog service. This service can
reside on any number of servers, including
Microsoft Windows and UNIX-based systems, or
the Cisco Security MARS appliance.

Syslog

Syslog servers: Known as log hosts, these systems


accept and process log messages from syslog clients.
Syslog clients: Routers or other types of equipment that
generate and forward log messages to syslog servers.
Public Web
Server
10.2.2.3

Mail
Server
10.2.2.4

Administrato
r
Server
10.2.2.5

Syslog Client
e0/0
10.2.1.1

R3

e0/2
10.2.3.1

e0/1
10.2.2.1

DMZ LAN 10.2.2.0/24

Syslog
Server 10.2.3.2
Protected LAN
10.2.3.0/24

User 10.2.3.3

Configuring System Logging

Turn logging on and off using the


logging buffered, logging
monitor, and logging commands

R3(config)#
R3(config)#
R3(config)#
R3(config)#

logging
logging
logging
logging

1. Set the destination logging host

10.2.2.6
2. Set the log severity (trap) level
trap informational
source-interface loopback 0
on
3. Set the source interface

4. Enable logging

Syslog Example

logging
logging
logging
logging

facility local5
source-interface Loopback0
10.1.1.10
10.1.1.11

Enabling Syslog Using SDM


1. Choose Configure > Additional Tasks > Router Properties > Logging

2. Click Edit
3. Check Enable Logging
Level and choose the
desired logging level
4. Click Add, and enter
an IP address of a
logging host

5. Click OK

Monitor Logging with SDM


1. Choose Monitor > Logging

2. See the logging hosts to which


the router logs messages
3. Choose the minimum severity level

4. Monitor the messages, update the


screen to show the most current log
entries, and clear all syslog
messages from the router log buffer

Monitor Logging Remotely

Logs can easily be viewed


through the SDM, or for
easier use, through a syslog
viewer on any remote
system.
There are numerous Free
remote syslog viewers, Kiwi
is relatively basic and free.
Configure the
router/switch/etc to send logs
to the PCs ip address that
has kiwi installed.
Kiwi automatically listens for
syslog messages and
displays them.

SNMP

Developed to manage nodes, such as servers,


workstations, routers, switches, hubs, and
security appliances on an IP network
All versions are Application Layer protocols that
facilitate the exchange of management
information between network devices
Part of the TCP/IP protocol suite
Enables network administrators to manage
network performance, find and solve network
problems, and plan for network growth
Three separate versions of SNMP

Community Strings

A text string that can authenticate messages


between a management station and an SNMP
agent and allow access to the information in MIBs

Provides read-only access to all


objects in the MIB except the
community strings.
Provides read-write access to
all objects in the MIB except the
community strings.

SNMP Example (1)

access-list 99 permit 10.1.0.0 0.0.0.255


access-list 99 permit 10.8..0 0.0.1.255
access-list 99 permit 20.10.60.0 0.0.1.255
access-list 99 deny any log
snmp-server view cutdown internet included
snmp-server view cutdown at excluded
snmp-server view cutdown ip.21 excluded
snmp-server view cutdown ip.22 excluded
snmp-server view cutdown ipForward excluded
snmp-server community F15entR0 view cutdown RO 99
snmp-server community F2SL3551 view cutdown RO 99
snmp-server ifindex persist
snmp-server trap link ietf
snmp-server trap-source Loopback0
snmp-server queue-length 30
snmp-server location 165 17C main 5th block koramangalam bangalore
snmp-server contact ratnesh 111-111-111 - AT&T CID:DHECAAA ID:HCGS334455B
snmp-server chassis-id FTX0946A1MD MODEM# 111-1111-111
snmp-server system-shutdown

SNMP Example (2)

snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
!

enable traps snmp authentication linkdown linkup coldstart warmstart


enable traps tty
enable traps envmon
enable traps atm subif
enable traps bgp
enable traps cnpd
enable traps config
enable traps frame-relay
enable traps frame-relay subif
enable traps hsrp
enable traps pppoe
enable traps cpu threshold
enable traps rtr
enable traps syslog
enable traps voice poor-qov
enable traps voice fallback
host 170.88.59.60 inform version 2c F15entR0
host 170.88.59.100 F15entR0
host 170.88.59.101 F15entR0
host 170.88.59.59 version 2c F15entR0
tftp-server-list 99
inform timeout 60 pending 40

SNMPv3
Transmissions from manager to
NMS

agent may be authenticated to


guarantee the identity of the sender
and the integrity and timeliness of a
message.

Managed
Node

Managed
Node

Encrypted Tunnel

Messages may be
encrypted to ensure
privacy
Agent may enforce access
control to restrict each principal
to certain actions on certain
NMS
portions of its data.

Managed
Node

Managed
Node

Security Levels

noAuth: Authenticates a packet by a string


match of the username or community string
auth: Authenticates a packet by using either the
Hashed Message Authentication Code (HMAC)
with Message Digest 5 (MD5) method or Secure
Hash Algorithms (SHA) method.
Priv: Authenticates a packet by using either the
HMAC MD5 or HMAC SHA algorithms and
encrypts the packet using the Data Encryption
Standard (DES), Triple DES (3DES), or Advanced
Encryption Standard (AES) algorithms.

Trap Receivers
1. Click Edit

3. Enter the IP address or


the hostname of the
trap receiver and the
2. Click Add
password

5. To edit or delete an existing trap receiver,


choose a trap receiver from the
trap
receiver list and click Edit or
Delete
6. When the trap receiver list
is complete, click OK

4. Click OK

Using NTP

Clocks on hosts and network devices must be


maintained and synchronized to ensure that log
messages are synchronized with one another
The date and time settings of the router can be
set using one of two methods:
Manually edit the date and time
Configure Network Time Protocol

Timekeeping

Pulling the clock time from the Internet means that


unsecured packets are allowed through the firewall
Many NTP servers on the Internet do not require any
authentication of peers
Devices are given the IP address of NTP masters. In an NTP
configured network, one or more routers are designated as
the master clock keeper (known as an NTP Master) using
the ntp master global configuration command.
NTP clients either contact the master or listen for
messages from the master to synchronize their clocks. To
contact the server, use the ntp server ntp-serveraddress command.
In a LAN environment, NTP can be configured to use IP
broadcast messages instead, by using the ntp broadcast
client command.

Features/Functions

There are two security mechanisms available:


An ACL-based restriction scheme
An encrypted authentication mechanism such as offered

by NTP version 3 or higher

Implement NTP version 3 or higher. Use the


following commands on both NTP Master and the
NTP client.
ntp authenticate
ntp authentication key md5 value
ntp trusted-key key-value

Enabling NTP
1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP
2. Click Add
3. Add an NTP server by
name or by IP address
4. Choose the interface
that the router will use
to communicate with
the NTP server

7. Click OK

5. Check Prefer if this


NTP server is a
preferred server (more
than one is allowed)
6. If authentication is used,
check Authentication
Key and enter the key
number, the key value,
and confirm the key value.

Cisco AutoSecure

Initiated from CLI and executes a


script. The AutoSecure feature first
makes recommendations for fixing
security vulnerabilities, and then
modifies the security configuration of
the router.
Can lockdown the management plane
functions and the forwarding plane
services and functions of a router
Used to provide a baseline security
policy on a new router

Auto Secure Command

Command to enable the Cisco


AutoSecure feature setup:
auto secure [no-interact]

In Interactive mode, the router prompts


with options to enable and disable
services and other security features.
This is the default mode but can also
be configured using the auto secure
full command.

Auto Secure Command


router#
auto secure [no-interact | full] [forwarding | management ] [ntp
| login | ssh | firewall | tcp-intercept]
R1# auto secure ?
firewall

AutoSecure Firewall

forwarding

Secure Forwarding Plane

full

Interactive full session of AutoSecure

login

AutoSecure Login

management

Secure Management Plane

no-interact

Non-interactive session of AutoSecure

ntp

AutoSecure NTP

ssh

AutoSecure SSH

tcp-intercept

AutoSecure TCP Intercept

<cr>
R1#

You might also like