Module 5: Securing Network Devices: Authentication, Authorization, and Accounting Flashcards
An edge router security approach that refers to an information security approach in which a series of security mechanisms and controls are thoughtfully layered throughout a computer network to protect the confidentiality, integrity, and availability of the network and the data within.
Defense in Depth (DiD) approach
An edge router security approach that is a method of providing segregation of networks and services that need to be provided to users, visitors, or partners through the use of firewalls and multiple layers of faltering and control to protect internal systems.
demilitarized zone (DMZ)
An edge router security approach that is used to connect the internal network to the external network (usually the internet). This router is responsible for all the security measures, including firewall, intrusion detection, and prevention systems.
Single Router Approach
What are the areas of router security?
- physical security
- router hardening
- router operating system and configuration file security
An area of router security where the router is secured against attacks as best as possible.
router hardening
A protocol to provide communication over the Internet or a LAN a using a virtual terminal connection.
Telnet
It allows a direct, non-network connection to the router, from a remote location
Auxiliary Port (AUX Port)
Login local needs a _______ and _______, while login only needs ______.
username
password
password
A command that allows telnet connections to the device.
transport input telnet ssh
A command that allow ssh connections.
transport input ssh
A feature that allows users to enhance the security of a router by configuring options to automatically block further login attempts when a possible denial-of-service (DoS) attack is detected.
(Cisco IOS) Login Enhancements Features
A CISCO command where all login requests are denied and the only available connection is through the console.
login block-for
login quiet-mode access-class
login on-success log
login on-failure log
login quiet-mode access-class
A CISCO command that logs the username and IP of successful login.
login block-for
login quiet-mode access-class
login on-success log
login on-failure log
login on-success log
A CISCO command used to configure the number of login on-success log.
login block-for
login on-failure log
security authentication failure rate
login quiet-mode access-class
security authentication failure rate
A protocol which allows you to connect securely to a remote computer or a server by using a text-based interface.
Secure Socket Shell (SSH)
A CISCO command used to generate Rivest, Shamir, and Adelman (RSA) key pairs
crypto key generate rsa
Level of access of User EXEC mode
privilege level 1
Level of access of Privileged EXEC mode
privilege level 15
A feature that allows the network administrator to define “views,” which are a set of operational commands and configuration capabilities that provide selective or partial access to Cisco IOS EXEC and configuration (Config) mode commands.
Role-Based CLI Access feature
A CISCO command under role-based views that enables root views.
enable root view
secret 5 root
enable view
parser view
enable view
A CISCO command under role-based that creates a view and enters view configuration mode.
enable root view
secret 5 root
enable view
parser view
parser view
A CISCO command under role-based that used to view a superview.
parser view
secret 5
view HOST
enable view
secret 5
or
view HOST
(di ko alam)
A CISCO command under role-based that associates a command-line interface (CLI) view or superview with a password.
enable root view
secret 5 root
enable view
parser view
secret 5
It is a feature in CISCO devices that enables a router to secure and maintain a working copy of the running image and configuration so that those files can withstand malicious attempts to erase the contents of persistent storage (NVRAM and flash).
Cisco IOS Resilient Configuration feature