Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $19.99
Standard view
Full view
of .
Look up keyword or section
Like this
13Activity

Table Of Contents

Preface
RouterSecurity
Router Security?
Routers: The Foundation of the Internet
What Can Go Wrong
What Routers Are at Risk?
Moving Forward
Chapter 2
CHAPTER 2
IOS Version Security
The Need for a Current IOS
Determining the IOS Version
IOS Versions and Vulnerabilities
Consolidated Technology Early Deployment (CTED)
Specific Technology Early Deployment (STED)
Specific Market Early Deployment (SMED)
IOS Naming Scheme
IOS Security Checklist
Chapter 3
CHAPTER 3
Basic Access Control
Authentication Versus Authorization
Points of Access
TACACS access control
Remote Administration
Brute force attacks
Protection with IPSec
Basic Access Control Security Checklist
Chapter 4
CHAPTER 4
Passwords and Privilege Levels
Password Encryption
Clear-Text Passwords
service password-encryption
Enable Security
Strong Passwords
Keeping Configuration Files Secure
Choosing and Remembering Strong Passwords
Privilege Levels
Privilege-Level Passwords
Line Privilege Levels
Username Privilege Levels
Password Checklist
Chapter 5
CHAPTER 5
AAA Access Control
Enabling AAA
Local Authentication
TACACS+ Authentication
TACACS+ Enable Password
Legal Issues
Use implies consent
Example Banner
Adding Login Banners
AAA Authentication Banner
Warning Banner Checklist
Chapter 7
CHAPTER 7
Unnecessary Protocols and Services
ICMP
ICMP-Directed Broadcasts
ICMP Unreachables
Source Routing
Small Services
Finger
HTTP
Proxy ARP
Miscellaneous
SNMP
Unnecessary Protocols and Services Checklist
Chapter 8
CHAPTER 8
SNMP Security
SNMP Versions
SNMP Version 1
SNMP Version 3
Securing SNMP v1 and v2c
Community strings
Read/write access
Securing SNMP v3
SNMP Management Servers
SNMP Security Checklist
Chapter 9
CHAPTER 9
Secure Routing and Antispoofing
Routing Protocol Security
Unsynchronized router as a timeserver
NTP Checklist
Chapter 11
CHAPTER 11
Logging
Logging in General
Router Logging
AAA Accounting Types
Logging Checklist
APPENDIX A
Checklist Quick Reference
APPENDIX B
Physical Security
Protection Against People
APPENDIX C
Incident Response
Evidence Preservation
APPENDIX D
Configuration Examples
Resources
Index
P. 1
Hardening Cisco Routers

Hardening Cisco Routers

Ratings:

4.0

(1)
|Views: 1,723|Likes:

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:

The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:

The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.

More info:

Publish date: Aug 29, 2007
Added to Scribd: May 16, 2009
Copyright:Traditional Copyright: All rights reservedISBN:9780596516352
List Price: $19.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
See more
See less

02/10/2015

192

9780596516352

$19.99

USD

You're Reading a Free Preview
Pages 8 to 61 are not shown in this preview.
You're Reading a Free Preview
Pages 69 to 105 are not shown in this preview.
You're Reading a Free Preview
Pages 113 to 114 are not shown in this preview.
You're Reading a Free Preview
Pages 122 to 128 are not shown in this preview.
You're Reading a Free Preview
Pages 136 to 192 are not shown in this preview.

Activity (13)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
sameenullah liked this
1og1ans1 liked this
Marie witness liked this
Al Atiqah Rashdi liked this
Miklós Balatoni liked this
Stefanuz Drioli liked this
asdsd liked this
daltons_au liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->