Routing Protocol Authentication
About Network Security, Network Labs, Cisco, Microsoft...Network Security Notes, Network Security Training, Network Security Videos, Cisco Network Security, Cisco Network Academy, Cisco Router Configuration, Cisco Products, Packet Tracer Labs, GNS3 Network Labs, VPN Network Security, All about Network Security...
After my previous post about Physical and Logical security, today I want to show you about securing the network with SNMP.
Router(config)#banner motd #
*********************************************
UNAUTHORIZED ACCESS PROHIBITED!
*********************************************
#
You can use banner messages to issue statements to users, indicating who is and who is not allowed access into the router. Banner messages should indicate the seriousness of an attempt to gain unauthorized access into the device and should never reflect to the user that gaining unauthorized access is acceptable. If possible, recite certain civil and federal laws that are applicable to unauthorized access and let users know what the punishment would be for accessing the device without express written permission. If possible, have certified legal experts within the company review the banner message.
Privilege levels associate router commands with each security level configured on the router. This allows for a finer granularity of control when restricting user access. There are 16 privilege levels contained within the router operating system. Level 2 to level 14 are customizable and allow you to configure multiple privilege levels and multiple passwords to enable certain users to have access to specific commands.
But most users of Cisco routers are familiar with only two privilege levels:
Because of these limitations, most Cisco router users immediately type enable to get out of user EXEC mode. By default, typing enable takes you to level 15, privileged EXEC mode. In the Cisco IOS, this level is equivalent to having root privileges in UNIX or administrator privileges in Windows. In other words, you have full access to the router.
Read more...
Telnet (Telecommunication network) is a network protocol used on the Internet or local area networks. It was developed in 1969 beginning with RFC 15 (Request For Comments 15 ) and standardized as IETF (Internet Engineering Task Force) STD 8, one of the first Internet standards. Typically, Telnet provides access to a command-line interface on a remote machine.
proper logical security mechanisms should be put into place to ensure that only responsible personnel are allowed Telnet access. Virtual terminal ports support many different methods for authenticating a user and allowing access. Some of the methods are included in the following list:
· Vty password
· Local user database
· TACACS+
· RADIUS
It's important to put the proper physical security mechanisms into place. If the proper physical
Physical and logical security staffs, both tasked with protecting enterprise assets, are seeing increased technology and budgetary overlaps.
Physical and logical security include the following:
. Securing console access
· Securing Telnet access
· Setting privilege levels
· Disabling password recovery
· Configuring password encryption
· Setting banner messages
Click here to Subscribe as a reader via RSS Feed
Your details at the above options will not be used for any other purposes than what you subscribe for and the details are kept private.