Networking Authentication and Security Chapter 1

  1. Device Hardening Definition
    Implement methods of physically securing the router
  2. Implement Device Hardening (6)
    • secure administrative access
    • maintain passwords
    • config enhanced virtual login features
    • implement secure shell (SSH)
    • Disable unused ports and interfaces
    • Disable unused services
  3. 3 Areas of Router Security
    • Physical
    • Router Hardening
    • Operating System Security
  4. Implement Physical Router Security (2)
    • Place physical devices in a secure locked area.
    • Install an uninterruptible power supply (UPS) and keep spare components available.
  5. Implement Operating System Security (3)
    • Configure router with max amount of memory possible
    • Keep OS up-to-date with the most stable version
    • Backup OS and config
  6. Ways to Secure Administrative Access to Routers (6)
    • Restrict device accessibility
    • Log and account for all access
    • Authenticate Access
    • Authorize Actions
    • Present legal notification
    • Ensure the confidentiality of data
  7. Remote Connection Precautions (3)
    • Encrypt all traffic
    • Establish a dedicated management network
    • Config a packet filter
  8. Increase Password Security
    • Min password length
    • Disable unattended connections
    • Encrypt all passwords in the config file
  9. Security for Virtual Login Connections (3)
    • Delays between successive login attempts
    • Login shutdown if DoS attacks are suspected
    • Generation of system logging messages for login detection
  10. SSH Port
    22
  11. SSH Setup Steps (5)
    • 1) change host name
    • 2) config domain name
    • 3) Generate one way secret keys
    • 4) Create a local database username entry
    • 5) Enable VTY inbound SSH sessions
Author
jal128
ID
294268
Card Set
Networking Authentication and Security Chapter 1
Description
Networking Authentication and Security Chapter 1 Review Questions
Updated