Cisco 857W - Integrated Services Router Technical Information

Browse online or download Technical Information for Networking Cisco 857W - Integrated Services Router. Cisco 857W - Integrated Services Router System information User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 34
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
This chapter covers the following topics:
ISR overview and providing secure
administrative access: This section describes
methods of securely accessing a router prompt for
purposes of administration. Additionally, this
section provides an overview of the Cisco
Integrated Services Router (ISR) line of routers.
Cisco Security Device Manager overview:
This section examines the Cisco Security Device
Manager (SDM) interface. The graphical
interface provided by SDM allows administrators
to configure a variety of router features using a
collection of wizards and other configuration
aids, which use best-practice recommendations
from the Cisco Technical Assistance Center
(TAC).
Page view 0
1 2 ... 34

Summary of Contents

Page 1

This chapter covers the following topics:ISR overview and providing secure administrative access: This section describes methods of securely accessin

Page 2 - Defending the Perimeter

ISR Overview and Providing Secure Administrative Access 85ISR Enhanced FeaturesAlthough traditional Cisco routers (that is, non-ISRs) offer featur

Page 3

86 Chapter 3: Defending the Perimeter Advanced Integration Modules: Cisco offers a variety of Advanced Integration Modules (AIM), which can offloa

Page 4

ISR Overview and Providing Secure Administrative Access 87Figure 3-2 Administrative Access to a RouterTelnet sends data in clear text. Therefore,

Page 5

88 Chapter 3: Defending the Perimeter Use a mixture of alphabetic (both uppercase and lowercase), numeric, and special characters. The password

Page 6 - Foundation Topics

ISR Overview and Providing Secure Administrative Access 89To configure a password for a router’s console, the administrator enters line configuratio

Page 7

90 Chapter 3: Defending the PerimeterThe enable secret password appears in the running configuration as an MD5 hash value. However, the console, au

Page 8

ISR Overview and Providing Secure Administrative Access 91Aside from having a single password for all administrators, individual user accounts can

Page 9

92 Chapter 3: Defending the PerimeterLimiting the Number of Failed Login AttemptsIf an attacker uses a brute-force attack or a dictionary attack w

Page 10

ISR Overview and Providing Secure Administrative Access 93Configuring Privilege LevelsLarger enterprise environments might need to support multipl

Page 11 - Password-Protecting a Router

94 Chapter 3: Defending the Perimeterexactly what commands an administrator has access to. Following are the steps required to configure these view

Page 12

C H A P T E R3Defending the PerimeterIn addition to Cisco firewall, virtual private network (VPN), and intrusion prevention system (IPS) appliances tha

Page 13 - Password Type Description

ISR Overview and Providing Secure Administrative Access 95Step 5Add available commands to the view: The commands parser_mode {include | include-ex

Page 14

96 Chapter 3: Defending the PerimeterEnabling Cisco IOS Login Enhancements for Virtual ConnectionsAdministrators, and therefore attackers, can cre

Page 15

ISR Overview and Providing Secure Administrative Access 97Consider the enhanced support for virtual logins configuration shown in Example 3-17. Aft

Page 16

98 Chapter 3: Defending the PerimeterCreating a Banner MessageWhen someone connects to one of your routers, he sees some sort of message or prompt

Page 17

Cisco Security Device Manager Overview 99Cisco Security Device Manager OverviewCisco IOS routers support many features (including security feature

Page 18 - Configuring Privilege Levels

100 Chapter 3: Defending the PerimeterFigure 3-3 SDM Home ScreenSome newer Cisco routers come with SDM preinstalled, but SDM needs to be installed

Page 19 - Example 3-13 Creating a View

Cisco Security Device Manager Overview 101Preparing to Launch Cisco SDMIf you plan to run SDM on a router that does not already have SDM installed

Page 20 - Protecting Router Files

102 Chapter 3: Defending the PerimeterIf you run SDM from a router’s flash, as opposed to running SDM from a PC, the first time you connect to the r

Page 21 - Step Description

Cisco Security Device Manager Overview 103After clicking the Configure button, you see a screen similar to the one shown in Figure 3-5. Notice the

Page 22 - Command Description

104 Chapter 3: Defending the PerimeterIn addition to the configuration wizards, notice the Additional Tasks button, as shown in Figure 3-6.Figure 3

Page 23 - Creating a Banner Message

78 Chapter 3: Defending the Perimeter1. Which of the following are considered IOS security features? (Choose four.)a. Stateful firewallb. MARSc. IP

Page 24 - Introducing SDM

Cisco Security Device Manager Overview 105Advanced administrators can use graphical interfaces to configure these additional tasks. Examples of the

Page 25 - Figure 3-3 SDM Home Screen

106 Chapter 3: Defending the PerimeterExam Preparation TasksReview All the Key TopicsReview the most important topics from this chapter, denoted w

Page 26 - Preparing to Launch Cisco SDM

Command Reference to Check Your Memory 107Command Reference to Check Your MemoryThis section includes the most important configuration and EXEC com

Page 27 - Figure 3-4 SDM Toolbar

108 Chapter 3: Defending the PerimeterCommand Descriptionsecure boot-image A global configuration mode command used to enable image resiliencesecur

Page 28 - Cisco SDM Wizards

Command Reference to Check Your Memory 109Table 3-14 Chapter 3 EXEC Command ReferenceCommand Descriptionenable view Enables the root view, which i

Page 29 - Cisco SDM Wizards (Continued)

“Do I Know This Already?” Quiz 795. What line configuration mode command would you enter to prevent a line (such as a console, aux, or vty line) co

Page 30 - Figure 3-7 Monitoring Tasks

80 Chapter 3: Defending the Perimeter9. When you configure Cisco IOS login enhancements for virtual connections, what is the “quiet period”?a. The

Page 31 - Exam Preparation Tasks

ISR Overview and Providing Secure Administrative Access 81Foundation TopicsISR Overview and Providing Secure Administrative AccessThis section beg

Page 32

82 Chapter 3: Defending the Perimeterthe router architecture. Although Cisco offers a wide range of router platforms, ISR models are easy to ident

Page 33

ISR Overview and Providing Secure Administrative Access 83Cisco 1800 SeriesThe Cisco 1800 series of ISRs is designed for small businesses and smal

Page 34

84 Chapter 3: Defending the PerimeterCisco 2800 SeriesThe Cisco 2800 series of ISRs is designed for small-to-medium businesses and enterprise bran

Comments to this Manuals

No comments