Preview

Harding Cisco Router

Good Essays
Open Document
Open Document
675 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Harding Cisco Router
Securing routers
Routers are the basic level of the Internet. It is responsible for the communication through the network, between computers and servers. It is important to secure the routers so the attackers can’t gain information from the routers. There are many ways of securing the routers such as upgrade the operating system, warning banners and disable unneeded services. Hardening cisco routers
Upgrade IOS
One of the important parts of securing routers is to choose the right router operating system. Users can check for the latest version of IOS in the cisco website. Also, it is necessary to check for IOS update because the company fixes flaws in the IOS version.

Password Encryption
Cisco routers have password configuration file. There are three methods of indicating password, which are clear text, Vigenere encryption, and MD5 hash algorithm. These passwords methods help to secure commands which router send it through the network. Vigenere and MD5 are better in encrypted commands than clear text. In addition, cisco routers use strong MD5 encryption. Then it will be hard for the attackers to gather information. When using clear text it is easy to gather the commands by the attacker because it shows the commands. This is example of clear text. enable secret 5 $1$Guks$Ct2/uAcSKHkcxNKyavE1i1 enable password enable-password
!
username jdoe password 0 jdoe-password username rsmith password 0 rsmith-password
!
line con 0 exec-timeout 5 0 password console-password login local transport input none line aux 0 exec-timeout 5 0 password aux-password login tacacs transport input none line vty 0 4 exec-timeout 5 0 password vty-password login transport input ssh

Disable unneeded services
There is lots of cisco services are enabled by default on cisco routers. It is important to disable these services because the attackers use them for their need. According to Device Resiliency and Survivability “These are the services that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    You issued all of the commands required by the lab and you answered all of…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    7. Basic Router Configuration and Command Line Interface Page 55 8. Switch and Router Security a. Setting Routing Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingRouterPassword.pdf b. Setting Switch Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingSwitchPassword.pdf c. Switch Security I - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityI.pdf d. Switch Security II - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityII.pdf e. Switch Security III - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIII.pdf f. Switch Security IV - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIV.pdf 9.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It273 Unit 3

    • 676 Words
    • 3 Pages

    | Because the router is a more advanced device, there are many more options that can be configured on a router. There are many instances where little configuration is needed, but in more advanced installations proper training in routing protocols is needed. On a connection level, routers are very similar to switches when it comes to installation.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A router is basically a device used to connect several computers or devices to a network and makes sure the data transmitted from one computer to another reaches the correct computer. Setting up the router is very straightforward. It is divided into two parts: (1) connecting physical equipment, (2) setting up software. All we needed to do this is a router, DSL modem, PC, and an Ethernet cable. The physical set up consists of connecting the router to the computer and the DSL modem. The rest is set up using the software that is accessed from the computer that is connected to the…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Routers these are the same setup as the firewall, by users to config the setting the one thing the company does not want to do is use the default setting for any router. Routers are the essential, but workhorses of modern computer networking yet few users realize they are computers, with their operating systems, software, and vulnerabilities.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    It320 Unit 5 Hw

    • 444 Words
    • 2 Pages

    The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. To access the routers configuration, open a web browser and type in the wireless routers web address, the web address is usually provided by the manufacturer or type 192.168.1.1 and enter the administrator user…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If you are unable to learn the router settings as different models in the market have different settings then you should install the apps on your desktop to learn about the network that are free for use.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Networking 202

    • 977 Words
    • 5 Pages

    Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and just as importantly, how you feel it will benefit you in your academic and professional career. (8 points)In this lab the router baseline configuration was erased to begin configuration on a router from scratch. In the lab we chose to enter a basic management setup on the router to place an IP address on one interface, and set an initial configuration dialog for ease of use. A secret and enabled password was created to provide security that avoids others from make configuration changes without the password. A virtual terminal password was also created for authorized users to access switches remotely. In the subnet…

    • 977 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays