Ccna Security Part 2c
Ccna Security Part 2c
Ccna Security Part 2c
Procedures
1.
2.
3.
4.
5.
6.
7.
8.
Password Recovery
Procedures, 2
9.
10.
11.
12.
13.
14.
Implementing Secure
Management
Factors to Consider
Using Syslog
Implementing Router
Logging
Configure the router to send log
messages to:
Implementing Router
Logging
Syslog
Mail
Server
10.2.2.4
Administrato
r
Server
10.2.2.5
Syslog Client
e0/0
10.2.1.1
R3
e0/2
10.2.3.1
e0/1
10.2.2.1
Syslog
Server 10.2.3.2
Protected LAN
10.2.3.0/24
User 10.2.3.3
R3(config)#
R3(config)#
R3(config)#
R3(config)#
logging
logging
logging
logging
10.2.2.6
2. Set the log severity (trap) level
trap informational
source-interface loopback 0
on
3. Set the source interface
4. Enable logging
Syslog Example
logging
logging
logging
logging
facility local5
source-interface Loopback0
10.1.1.10
10.1.1.11
2. Click Edit
3. Check Enable Logging
Level and choose the
desired logging level
4. Click Add, and enter
an IP address of a
logging host
5. Click OK
SNMP
Community Strings
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
snmp-server
!
SNMPv3
Transmissions from manager to
NMS
Managed
Node
Managed
Node
Encrypted Tunnel
Messages may be
encrypted to ensure
privacy
Agent may enforce access
control to restrict each principal
to certain actions on certain
NMS
portions of its data.
Managed
Node
Managed
Node
Security Levels
Trap Receivers
1. Click Edit
4. Click OK
Using NTP
Timekeeping
Features/Functions
Enabling NTP
1. Choose Configure > Additional Tasks > Router Properties > NTP/SNTP
2. Click Add
3. Add an NTP server by
name or by IP address
4. Choose the interface
that the router will use
to communicate with
the NTP server
7. Click OK
Cisco AutoSecure
AutoSecure Firewall
forwarding
full
login
AutoSecure Login
management
no-interact
ntp
AutoSecure NTP
ssh
AutoSecure SSH
tcp-intercept
<cr>
R1#