Preview

Basic Device and Security Configuration

Better Essays
Open Document
Open Document
1491 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Basic Device and Security Configuration
Basic Device and Security Configuration
Kevin Kormylo, Okoma Mita, Dan O’Donnell
CIT/249
January 12, 2015 Steve Acklin
Basic Device and Security Configuration

When designing a network there are basic network and security configurations that one needs to consider. Choosing a hostname for each device is very important, this allows the user to know what device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are part of the basic configuration of a network device.
One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any network device. Enable passwords and encrypting those password are best practice’s for any engineer. Configuration of a username and password for virtual lines, will help in keeping unwanted persons out of your network device along with, a banner upon logging into a device. Banners are messages that will display a warning to any unauthorized person looking to access the device. Shutting down unused ports in a switch, will keep unwanted clients of the network and people from just plugging a laptop into the port for access.
Remote access is something to think about when configuring a device. SSH (Secure Shell) and telnet are two network protocol used to remote access to a device. SSH is a more secure application that uses higher encryptions of data then telnet does. To generate the SSH key the use of crypto key generate rsa is used with a 1024 bit key, creates the most secure key. Remote access is a concern to any engineer and should be taken with the highest priority.

Commands Used in Basic Device Configurations

CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Configuring Hostnames Page 25 10. Subnetting Lab 1 11. Subnetting Lab 2 Unit 3 1. Setting Router passwords Page 29 2. Configuring Router IP settings Page 32 3.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Best Essays

    When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    the information that given on the command line is it shows all your information on the router you have and it shows you in details. Its allows you to see in-depth allowing your to see information on your router.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called name resolution.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Wicked - is a local network management tool that makes it easy to manage ever-more-complicated network configurations such as VLAN, virtualization, bridging, bonding and IPv6.…

    • 1499 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays

Related Topics