Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Major Concepts
The Edge Router
Perimeter Implementations
Areas of Router Security
Banner Messages
Preliminary Steps for Configuring SSH
Configuring the Router for SSH
Optional SSH Commands
Connecting to the Router
Using SDM
Configuring for Privilege Levels
Privilege CLI Command
Privilege Levels for Users
Privilege Levels
Privilege Level Limitations
Role-Based CLI
Creating and Managing a View
View Commands
Creating and Managing a Superview
Verifying a View
Resilient Configuration Facts
CLI Commands
Restoring Primary bootset
Password Recovery Procedures
Password Recovery Procedures, 2
Preventing Password Recovery
Implementing Secure Management
Secure Management and Reporting
Factors to Consider
Using Syslog
Configuring System Logging
Enabling Syslog Using SDM/CCP
Monitor Logging with SDM
Monitor Logging Remotely
Community Strings
Trap Receivers
Using NTP
Enabling NTP
Security Practices
SDM Security Audit
Security Audit Wizard
Cisco AutoSecure
Cisco One-step Lockdown
0 of .
Results for:
No results containing your search query
P. 1
Chapter 2 Overview

Chapter 2 Overview

Ratings: (0)|Views: 25|Likes:
Published by Matthew Young

More info:

Published by: Matthew Young on Sep 11, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 47 are not shown in this preview.
You're Reading a Free Preview
Pages 51 to 63 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->