欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    ISCW10S05L05安全管理和报告.ppt

    • 资源ID:5435470       资源大小:1.95MB        全文页数:44页
    • 资源格式: PPT        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISCW10S05L05安全管理和报告.ppt

    Cisco Device Hardening,Securing Management and Reporting Features,Secure Management and Reporting Planning Considerations,Secure Management and Reporting Planning Considerations,Which are the most important logs?How are important messages separated from routine notifications?How do you prevent tampering with logs?How do you make sure time stamps match?What log data is needed in criminal investigations?How do you deal with the volume of log messages?How do you manage all the devices?How can you track changes when attacks or network failures occur?,Secure Management and Reporting Architecture,Secure Management andReporting Architecture,Information Paths,In-Band Management Considerations,Which management protocols does each device support?Does the management channel need to be active at all times?Is SNMP necessary?,Secure Management andReporting Guidelines,In-band management guidelines:Apply only to devices needing to be managed or monitored.Use IPsec when possible.Use SSH or SSL instead of Telnet.Decide whether the management channel needs to be open at all times.Keep clocks on hosts and network devices synchronized.Record changes and archive configurations.OOB management guidelines:Provide highest level of security and mitigate the risk of passing insecure management protocols over the production network.Keep clocks on hosts and network devices synchronized.Record changes and archive configurations.,Configuring an SSH Server for Secure Management and Reporting,Configuring an SSH Server forSecure Management and Reporting,Austin2#configure terminalAustin2(config)#ip domain-name Austin2(config)#crypto key generate rsa general-keys modulus 1024Sept 22 13:20:45:%SSH-5-ENABLED:SSH 1.5 has been enabledAustin2(config)#ip ssh timeout 120Austin2(config)#ip ssh authentication-retries 4Austin2(config)#line vty 0 4Austin2(config-line)#no transport input telnetAustin2(config-line)#transport input sshAustin2(config-line)#end,Configure the IP domain nameGenerate the RSA keysConfigure the SSH timeout intervalConfigure the SSH retriesDisable vty inbound Telnet sessionsEnable vty inbound SSH sessions,Using Syslog Logging for Network Security,Implementing Log Messaging for Security,Routers should be configured to send log messages to one or more of these:ConsoleTerminal linesMemory bufferSNMP trapsSyslogSyslog logging is a key security policy component.,Syslog Systems,Syslog server:A host that accepts and processes log messages from one or more syslog clients.Syslog client:A host that generates log messages and forwards them to a syslog server.,Cisco Log Severity Levels,Log Message Format,Oct 29 10:00:01 EST:%SYS-5-CONFIG_I:Configured from console by vty0(10.2.2.6),Time Stamp,Log Message Name and Severity Level,Message Text,Configuring Syslog Logging,Configuring Syslog,Router(config)#,logging host-name|ip-address,Router(config)#,logging trap level,Router(config)#,logging facility facility-type,Sets the destination logging host,(Optional)Sets the log severity(trap)level,(Optional)Sets the syslog facility,Configuring Syslog(Cont.),Router(config)#,logging source-interface interface-type interface-number,Router(config)#,logging on,(Optional)Sets the source interface,Enables logging,Syslog Implementation Example,R3(config)#logging 10.2.2.6R3(config)#logging trap informationalR3(config)#logging source-interface loopback 0R3(config)#logging on,SNMP Version 3,SNMPv1 and SNMPv2 Architecture,The SNMP NMS asks agents embedded in network devices for information,or tells the agents to do something.,Community Strings,Used to authenticate messages between a management station,and an SNMPv1 or SNMPv2 engine:Read only community strings can get information,but can not set information in an agent.Read-write community strings can get and set information in the agent.Having read-write access is like having the enable password for the device.,SNMP Security Models and Levels,Definitions:Security model is a security strategy used by the SNMP agentSecurity level is the permitted level of security within a security model,SNMPv3 Architecture,SNMPv3 Operational Model,SNMPv3 Features and Benefits,Configuring an SNMP Managed Node,SNMPv3 Configuration Task List,Cisco IOS SNMPv3 server configuration tasks:Configuring the SNMP-server engine IDConfiguring the SNMP-server group namesConfiguring the SNMP-server users Configuring the SNMP-server hosts,Configuring the SNMP-Server Engine ID,snmp-server engineID local engineid-string|remote ip-address udp-port port-number engineid-string,Router(config)#,Configures names for both the local and remote SNMP engine(or copy of SNMP)on the router,PR1(config)#snmp-server engineID local 1234,Configuring the SNMP-Server Group Names,snmp-server group groupname v1|v2c|v3 auth|noauth|priv read readview write writeview notify notifyview access access-list,Router(config)#,Configures a new SNMP group,or a table that maps SNMP users to SNMP views,PR1(config)#snmp-server group johngroup v3 authPR1(config)#snmp-server group billgroup v3 auth priv,Configuring the SNMP-Server Users,snmp-server user username groupname remote ip-address udp-port port v1|v2c|v3 encrypted auth md5|sha auth-password priv des56 priv-password access access-list,Router(config)#,Configures a new user to an SNMP group,PR1(config)#snmp-server user John johngroup v3 auth md5 john2passwd PR1(config)#snmp-server user Bill billgroup v3 auth md5 bill3passwd des56 password2PR1(config)#snmp-server group johngroup v3 auth PR1(config)#snmp-server group billgroup v3 auth priv,Configuring the SNMP-Server Hosts,snmp-server host host-address traps|informs version 1|2c|3 auth|noauth|priv community-string udp-port port notification-type,Router(config)#,Configures the recipient of an SNMP trap operation.,PR1(config)#snmp-server engineID remote 10.1.1.1 1234PR1(config)#snmp-server user bill billgroup remote 10.1.1.1 v3PR1(config)#snmp-server group billgroup v3 noauthPR1(config)#snmp-server enable traps PR1(config)#snmp-server host 10.1.1.1 inform version 3 noauth billPR1(config)#snmp-server manager,SNMPv3 Configuration Example,Trap_sender(config)#snmp-server group snmpgroup v3 auth Trap_sender(config)#snmp-server group snmpgroup v3 privTrap_sender(config)#snmp-server user snmpuser snmpgroup v3 auth md5 authpassword priv des56 encryptpassword Trap_sender(config)#snmp-server enable traps cpu Trap_sender(config)#snmp-server enable traps configTrap_sender(config)#snmp-server enable traps snmpTrap_sender(config)#snmp-server host 11.11.11.11 traps version 3 priv snmpuserTrap_sender(config)#snmp-server source-interface traps loopback 0,Walked_device(config)#snmp-server group snmpgroup v3 auth Walked_device(config)#snmp-server group snmpgroup v3 privWalked_device(config)#snmp-server user snmpuser snmpgroup v3 auth md5 authpassword priv des56 encrypt password,Configuring NTP Client,Understanding NTP,NTP is used to synchronize the clocks in the entire network.System clock is set by the battery system calendar during bootup.System clock can then be modified manually or via NTP.NTP runs over UDP port 123;current version is 4.Only NTP up to version 3 has been documented in RFCs.Stratum describes how many“NTP hops”away a machine is from authoritative time source.NTP establishes associations to synchronize time.,Configuring NTP Authentication,ntp authenticate,Router(config)#,Enables the authentication feature,R1(config)#ntp authenticationR1(config)#ntp authentication-key 1 md5 NeVeRgUeSsR1(config)#ntp trusted-key 1,ntp authentication-key number md5 value,Defines the authentication keysUsed for both peer and server associations,ntp trusted-key key-number,Defines the trusted authentication keys Required to synchronize to a system(server association),Router(config)#,Router(config)#,Configuring NTP Associations,ntp server ip-address|hostname version number key keyid source interface prefer,Router(config)#,R1(config)#ntp server 10.1.1.1 key 1 R1(config)#ntp server 10.2.2.2 key 2 preferR1(config)#interface Fastethernet 0/1R1(config-if)#ntp broadcast client,Forms a server association with another system,ntp broadcast client,Receives NTP broadcast packets,Router(config-if)#,Configuring Additional NTP Options,ntp access-group query-only|serve-only|serve|peer access-list-number,Router(config)#,R1(config)#R1(config)#ntp access-group peer 1 R1(config)#ntp source loopack 0,Controls NTP message exchange,ntp source interface,Modifies the source IP address of NTP packets,Router(config)#,Configuring NTP Server,Implementing NTP Server,Cisco IOS routers work as an NTP server by default.As soon as a router is synchronized to an authoritative time source,it will allow peers with lower stratum to synchronize to that router:Requires a peer associationYou can make a router an authoritative NTP server,even if the system is not synchronized to an outside time source.Two options to establish a peer association:UnicastBroadcastSame exchange control methods as with client:Packet authenticationAccess group filtering,Configuring NTP Server,ntp master stratum,R2(config)#ntp peer 10.1.1.1 key 1R2(config)#ntp master 3R2(config)#interface Fastethernet0/0 R2(config-int)#ntp broadcast,Makes the system an authoritative NTP server,ntp broadcast version numberdestination addresskey keyid,Configures an interface to send NTP broadcast packets,Router(config-int)#,ntp peer ip-address normal-syncversion number key keyid source interface prefer,Router(config)#,Forms a peer association with another system,Router(config)#,NTP Configuration Example,Source(config)#ntp master 5Source(config)#ntp authentication-key 1 md5 secretsourceSource(config)#ntp peer 172.16.0.2 key 1Source(config)#ntp source loopback 0,Intermediate(config)#ntp authentication-key 1 md5 secretsourceIntermediate(config)#ntp authentication-key 2 md5 secretclientIntermediate(config)#ntp trusted-key 1Intermediate(config)#ntp server 172.16.0.1 Intermediate(config)#ntp source loopback 0Intermediate(config)#interface Fastethernet0/0Intermediate(config-int)#ntp broadcast,Client(config)#ntp authentication-key 1 md5 secretclientClient(config)#ntp trusted-key 1Client(config)#interface Fastethernet0/1Client(config-int)#ntp broadcast client,Summary,Since OOB management provides higher levels of security and performance than in-band,the decision to use an in-band solution must be considered carefully.Management communications should use SSH rather than Telnet.Implementing a router logging facility is an important part of any network security policy.Syslog is implemented on your Cisco router using syslog router commands.Network management will be greatly enhanced by implementing the security features of SNMPv3 rather than earlier versions.Cisco IOS SNMPv3 server configuration tasks include configuring SNMP-server engine ID,group names,users,and hosts.Cisco routers can be configured as NTP servers or clients.Packet authentication and filtering should be used to protect NTP exchange.,

    注意事项

    本文(ISCW10S05L05安全管理和报告.ppt)为本站会员(牧羊曲112)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开