ISCW10S05L05安全管理和报告.ppt
《ISCW10S05L05安全管理和报告.ppt》由会员分享,可在线阅读,更多相关《ISCW10S05L05安全管理和报告.ppt(44页珍藏版)》请在三一办公上搜索。
1、Cisco Device Hardening,Securing Management and Reporting Features,Secure Management and Reporting Planning Considerations,Secure Management and Reporting Planning Considerations,Which are the most important logs?How are important messages separated from routine notifications?How do you prevent tampe
2、ring with logs?How do you make sure time stamps match?What log data is needed in criminal investigations?How do you deal with the volume of log messages?How do you manage all the devices?How can you track changes when attacks or network failures occur?,Secure Management and Reporting Architecture,Se
3、cure Management andReporting Architecture,Information Paths,In-Band Management Considerations,Which management protocols does each device support?Does the management channel need to be active at all times?Is SNMP necessary?,Secure Management andReporting Guidelines,In-band management guidelines:Appl
4、y only to devices needing to be managed or monitored.Use IPsec when possible.Use SSH or SSL instead of Telnet.Decide whether the management channel needs to be open at all times.Keep clocks on hosts and network devices synchronized.Record changes and archive configurations.OOB management guidelines:
5、Provide highest level of security and mitigate the risk of passing insecure management protocols over the production network.Keep clocks on hosts and network devices synchronized.Record changes and archive configurations.,Configuring an SSH Server for Secure Management and Reporting,Configuring an S
6、SH Server forSecure Management and Reporting,Austin2#configure terminalAustin2(config)#ip domain-name Austin2(config)#crypto key generate rsa general-keys modulus 1024Sept 22 13:20:45:%SSH-5-ENABLED:SSH 1.5 has been enabledAustin2(config)#ip ssh timeout 120Austin2(config)#ip ssh authentication-retri
7、es 4Austin2(config)#line vty 0 4Austin2(config-line)#no transport input telnetAustin2(config-line)#transport input sshAustin2(config-line)#end,Configure the IP domain nameGenerate the RSA keysConfigure the SSH timeout intervalConfigure the SSH retriesDisable vty inbound Telnet sessionsEnable vty inb
8、ound SSH sessions,Using Syslog Logging for Network Security,Implementing Log Messaging for Security,Routers should be configured to send log messages to one or more of these:ConsoleTerminal linesMemory bufferSNMP trapsSyslogSyslog logging is a key security policy component.,Syslog Systems,Syslog ser
9、ver:A host that accepts and processes log messages from one or more syslog clients.Syslog client:A host that generates log messages and forwards them to a syslog server.,Cisco Log Severity Levels,Log Message Format,Oct 29 10:00:01 EST:%SYS-5-CONFIG_I:Configured from console by vty0(10.2.2.6),Time St
10、amp,Log Message Name and Severity Level,Message Text,Configuring Syslog Logging,Configuring Syslog,Router(config)#,logging host-name|ip-address,Router(config)#,logging trap level,Router(config)#,logging facility facility-type,Sets the destination logging host,(Optional)Sets the log severity(trap)lev
11、el,(Optional)Sets the syslog facility,Configuring Syslog(Cont.),Router(config)#,logging source-interface interface-type interface-number,Router(config)#,logging on,(Optional)Sets the source interface,Enables logging,Syslog Implementation Example,R3(config)#logging 10.2.2.6R3(config)#logging trap inf
12、ormationalR3(config)#logging source-interface loopback 0R3(config)#logging on,SNMP Version 3,SNMPv1 and SNMPv2 Architecture,The SNMP NMS asks agents embedded in network devices for information,or tells the agents to do something.,Community Strings,Used to authenticate messages between a management s
13、tation,and an SNMPv1 or SNMPv2 engine:Read only community strings can get information,but can not set information in an agent.Read-write community strings can get and set information in the agent.Having read-write access is like having the enable password for the device.,SNMP Security Models and Lev
14、els,Definitions:Security model is a security strategy used by the SNMP agentSecurity level is the permitted level of security within a security model,SNMPv3 Architecture,SNMPv3 Operational Model,SNMPv3 Features and Benefits,Configuring an SNMP Managed Node,SNMPv3 Configuration Task List,Cisco IOS SN
15、MPv3 server configuration tasks:Configuring the SNMP-server engine IDConfiguring the SNMP-server group namesConfiguring the SNMP-server users Configuring the SNMP-server hosts,Configuring the SNMP-Server Engine ID,snmp-server engineID local engineid-string|remote ip-address udp-port port-number engi
16、neid-string,Router(config)#,Configures names for both the local and remote SNMP engine(or copy of SNMP)on the router,PR1(config)#snmp-server engineID local 1234,Configuring the SNMP-Server Group Names,snmp-server group groupname v1|v2c|v3 auth|noauth|priv read readview write writeview notify notifyv
17、iew access access-list,Router(config)#,Configures a new SNMP group,or a table that maps SNMP users to SNMP views,PR1(config)#snmp-server group johngroup v3 authPR1(config)#snmp-server group billgroup v3 auth priv,Configuring the SNMP-Server Users,snmp-server user username groupname remote ip-address
18、 udp-port port v1|v2c|v3 encrypted auth md5|sha auth-password priv des56 priv-password access access-list,Router(config)#,Configures a new user to an SNMP group,PR1(config)#snmp-server user John johngroup v3 auth md5 john2passwd PR1(config)#snmp-server user Bill billgroup v3 auth md5 bill3passwd des
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISCW10S05L05 安全管理 报告
链接地址:https://www.31ppt.com/p-5435470.html