Home
Flashcards
Preview
Networking Authentication and Security Chapter 1
Home
Get App
Take Quiz
Create
Device Hardening Definition
Implement methods of physically securing the router
Implement Device Hardening (6)
secure administrative access
maintain passwords
config enhanced virtual login features
implement secure shell (SSH)
Disable unused ports and interfaces
Disable unused services
3 Areas of Router Security
Physical
Router Hardening
Operating System Security
Implement Physical Router Security (2)
Place physical devices in a secure locked area.
Install an uninterruptible power supply (UPS) and keep spare components available.
Implement Operating System Security (3)
Configure router with max amount of memory possible
Keep OS up-to-date with the most stable version
Backup OS and config
Ways to Secure Administrative Access to Routers (6)
Restrict device accessibility
Log and account for all access
Authenticate Access
Authorize Actions
Present legal notification
Ensure the confidentiality of data
Remote Connection Precautions (3)
Encrypt all traffic
Establish a dedicated management network
Config a packet filter
Increase Password Security
Min password length
Disable unattended connections
Encrypt all passwords in the config file
Security for Virtual Login Connections (3)
Delays between successive login attempts
Login shutdown if DoS attacks are suspected
Generation of system logging messages for login detection
SSH Port
22
SSH Setup Steps (5)
1) change host name
2) config domain name
3) Generate one way secret keys
4) Create a local database username entry
5) Enable VTY inbound SSH sessions
Author
jal128
ID
294268
Card Set
Networking Authentication and Security Chapter 1
Description
Networking Authentication and Security Chapter 1 Review Questions
Updated
2015-01-29T20:48:14Z
Show Answers
Home
Flashcards
Preview