04- Securing the Management Plane 
Ahmed Sultan 
CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH 
© 2009 Cisco Learning Institute. 1
Perimeter Implementations 
• Single Router Approach 
A single router connects the 
internal LAN to the Internet. All 
security policies are 
configured on this device. 
• Defense-in-depth Approach 
Passes everything through to 
the firewall. A set of rules 
determines what traffic the 
router will allow or deny. 
• DMZ Approach 
The DMZ is set up between 
two routers. Most traffic 
filtering left to the firewall 
LAN 1 
192.168.2.0 
Router 1 (R1) 
Internet 
LAN 1 
192.168.2.0 
R1 
Internet 
Firewall 
LAN 1 
192.168.2.0 
R1 
Internet 
Firewall R2 
DMZ 
© 2009 Cisco Learning Institute. 2
Areas of Router Security 
• Physical Security 
- Place router in a secured, locked room 
- Install an uninterruptible power supply 
• Operating System Security 
- Use the latest stable version that meets network requirements 
- Keep a copy of the O/S and configuration file as a backup 
• Router Hardening 
- Secure administrative control 
- Disable unused ports and interfaces 
- Disable unnecessary services 
© 2009 Cisco Learning Institute. 3
SSH version 1, 2 
• Configuring Router 
• SSH Commands 
• Connecting to Router 
© 2009 Cisco Learning Institute. 4
Configuring the Router for SSH 
1. Configure the IP domain 
name of the network 
R1# conf t 
R1(config)# ip domain-name span.com 
R1(config)# crypto key generate rsa general-keys 
modulus 1024 
The name for the keys will be: R1.span.com 
2. Generate one way 
secret key 
% The key modulus size is 1024 bits 
% Generating 1024 bit RSA keys, keys will be non-exportable...[ 
OK] 
R1(config)# 
*Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has 
been enabled 
R1(config)# username Bob secret cisco 
R1(config)# line vty 0 4 
R1(config-line)# login local 
R1(config-line)# transport input ssh 
R1(config-line)# exit 
3. Verify or create a local 
database entry 
4. Enable VTY inbound 
SSH sessions 
© 2009 Cisco Learning Institute. 5
Optional SSH Commands 
R1# show ip ssh 
SSH Enabled - version 1.99 
Authentication timeout: 120 secs; Authentication 
retries: 3 
R1# 
R1# conf t 
Enter configuration commands, one per line. End 
with CNTL/Z. 
R1(config)# ip ssh version 2 
R1(config)# ip ssh time-out 60 
R1(config)# ip ssh authentication-retries 2 
R1(config)# ^Z 
R1# 
R1# show ip ssh 
SSH Enabled - version 2.0 
Authentication timeout: 60 secs; Authentication 
retries: 2 
R1# 
© 2009 Cisco Learning Institute. 6
Connecting to the Router 
There are two different ways to 
connect to an SSH-enabled router: 
- Connect using an SSH-enabled Cisco 
router 
- Connect using an SSH client running 
on a host. 
11 
There are no current SSH sessions ongoing with R1. 
R1# sho ssh 
%No SSHv2 server connections running. 
%No SSHv1 server connections running. 
R1# 
22 
R2 establishes an SSH connection with R1. 
R2# ssh -l Bob 192.168.2.101 
Password: 
R1> 
33 
There is an incoming and outgoing SSHv2 session user Bob. 
R1# sho ssh 
Connection Version Mode Encryption Hmac State Username 
0 2.0 IN aes128-cbc hmac-sha1 Session started Bob 
0 2.0 OUT aes128-cbc hmac-sha1 Session started Bob 
%No SSHv1 server connections running. 
R1# 
© 2009 Cisco Learning Institute. 7
Configuring for Privilege Levels 
• By default: 
- User EXEC mode (privilege level 1) 
- Privileged EXEC mode (privilege level 15) 
• Sixteen privilege levels available 
• Methods of providing privileged level access 
infrastructure access: 
- Privilege Levels 
- Role-Based CLI Access 
© 2009 Cisco Learning Institute. 8
Privilege CLI Command 
router(config)# privilege mode {level level command | reset command} 
Command Description 
mode Specifies the configuration mode. Use the privilege ? 
command to see a complete list of router configuration 
modes available 
level (Optional) Enables setting a privilege level with a 
specified command 
level command (Optional) The privilege level associated with a 
command (specify up to 16 privilege levels, using 
numbers 0 to 15) 
reset (Optional) Resets the privilege level of a command 
Command (Optional) Resets the privilege level 
© 2009 Cisco Learning Institute. 9
Privilege Levels for Users 
R1# conf t 
R1(config)# 
R1(config)# privilege exec level 5 ping 
R1(config)# enable secret level 5 cisco5 
R1(config)# username SUPPORT privilege 5 secret cisco5 
R1(config)# 
R1(config)# privilege exec level 10 reload 
R1(config)# enable secret level 10 cisco10 
R1(config)# username JR-ADMIN privilege 10 secret cisco10 
R1(config)# 
R1(config)# username ADMIN privilege 15 secret cisco123 
R1(config)# 
• A SUPPORT account with Level 5 and ping command access. 
• A JR-ADMIN account with with Level 10 plus access to the reload 
command. 
• An ADMIN account which has all of the regular privileged EXEC 
commands. 
© 2009 Cisco Learning Institute. 10
Privilege Levels 
The enable level command is used to switch 
from Level 1 to Level 5 
R1> enable 5 
Password: 
R1# <cisco5> 
R1# show privilege 
Current privilege level is 5 
R1# 
R1# reload 
Translating "reload" 
Translating "reload" 
The show privilege command displays 
The current privilege level 
The user cannot us the reload command 
% Unknown command or computer name, or unable to find computer 
address 
R1# 
© 2009 Cisco Learning Institute. 11
Privilege Level Limitations 
• There is no access control to specific interfaces, ports, 
logical interfaces, and slots on a router 
• Commands available at lower privilege levels are always 
executable at higher levels. 
• Commands specifically set on a higher privilege level are 
not available for lower-privileged users. 
© 2009 Cisco Learning Institute. 12
Role-Based CLI 
• Controls which commands are available to specific roles 
• Different views of router configurations created for 
different users providing: 
- Security: Defines the set of CLI commands that is accessible by 
a particular user by controlling user access to configure specific 
ports, logical interfaces, and slots on a router 
- Availability: Prevents unintentional execution of CLI commands 
by unauthorized personnel 
- Operational Efficiency: Users only see the CLI commands 
applicable to the ports and CLI to which they have access 
© 2009 Cisco Learning Institute. 13
Role-Based Views 
• Root View 
To configure any view for the system, the administrator must be in 
the root view. Root view has all of the access privileges as a user 
who has level 15 privileges. 
• CLI View 
A specific set of commands can be bundled into a “CLI view”. 
Each view must be assigned all commands associated with that 
view and there is no inheritance of commands from other views. 
Additionally, commands may be reused within several views. 
• Superview 
Allow a network administrator to assign users and groups of users 
multiple CLI views at once instead of having to assign a single 
CLI view per user with all commands associated to that one CLI 
view. 
© 2009 Cisco Learning Institute. 14
Role-Based Views 
© 2009 Cisco Learning Institute. 15
Creating and Managing a View 
1. Enable aaa with the global configuration command aaa new-model. 
Exit, and enter the root view with the command enable 
view command. 
2. Create a view using the parser view view-name command. 
3. Assign a secret password to the view using the secret 
encrypted-password command. 
4. Assign commands to the selected view using the parser-mode 
{include | include-exclusive | exclude} [all] 
[interface interface-name | command] command in view 
configuration mode. 
5. Exit the view configuration mode by typing the command exit. 
© 2009 Cisco Learning Institute. 16
View Commands 
router# enable [view [view-name]] 
Command is used to enter the CLI view. 
Parameter Description 
view Enters view, which enables users to configure CLI views. 
This keyword is required if you want to configure a CLI view. 
view-name (Optional) Enters or exits a specified CLI view. 
This keyword can be used to switch from one CLI view to 
another CLI view. 
router(config)# parser view view-name 
Creates a view and enters view configuration mode. 
router(config-view)# secret encrypted-password 
• Sets a password to protect access to the View. 
• Password must be created immediately after creating a view 
© 2009 Cisco Learning Institute. 17
Creating and Managing a Superview 
1. Create a view using the parser view view-name 
superview command and enter 
superview configuration mode. 
2. Assign a secret password to the view using the 
secret encrypted-password command. 
3. Assign an existing view using the view view-name 
command in view configuration mode. 
4. Exit the superview configuration mode by typing 
the command exit. 
© 2009 Cisco Learning Institute. 18
Running Config “Views” 
© 2009 Cisco Learning Institute. 19
Running Config “SUPERVIEWS” 
© 2009 Cisco Learning Institute. 20
Resilient Configuration Facts 
• The configuration file in the primary 
bootset is a copy of the running 
configuration that was in the router when 
the feature was first enabled. 
• The feature secures the smallest working 
set of files to preserve persistent storage 
space. No extra space is required to 
secure the primary IOS image file. 
• The feature automatically detects image 
or configuration version mismatch. 
• Only local storage is used for securing 
files. 
• The feature can be disabled only through 
a console session. 
R1# erase 
startup-config 
Erasing the 
nvram filesystem 
will remove all 
configuration 
files! Continue? 
[confirm] 
© 2009 Cisco Learning Institute. 21
CLI Commands 
router(config)# 
secure boot-image 
 Enables Cisco IOS image resilience. Prevents the IOS image 
from being deleted by a malicious user. 
router(config)# 
secure boot-config 
 Takes a snapshot of the router running configuration and securely 
archives it in persistent storage. 
© 2009 Cisco Learning Institute. 22
Preventing Password Recovery 
R1(config)# no service password-recovery 
WARNING: 
Executing this command will disable password recovery mechanism. 
Do not execute this command without another plan for password recovery. 
Are you sure you want to continue? [yes/no]: yes 
R1(config) 
R1# sho run 
Building configuration... 
Current configuration : 836 bytes 
! 
version 12.4 
service timestamps debug datetime msec 
service timestamps log datetime msec 
service password-encryption 
no service password-recovery 
System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1) 
Technical Support: http://www.cisco.com/techsupport 
Copyright (c) 2006 by cisco Systems, Inc. 
PLD version 0x10 
GIO ASIC version 0x127 
c1841 platform with 131072 Kbytes of main memory 
Main memory is configured to 64 bit mode with parity disabled 
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED 
program load complete, entry point: 0x8000f000, size: 0xcb80 
© 2009 Cisco Learning Institute. 23
Using Syslog 
• Implementing Router Logging 
• Syslog 
• Configuring System Logging 
© 2009 Cisco Learning Institute. 24
Syslog 
• Syslog servers: Known as log hosts, these systems 
accept and process log messages from syslog clients. 
• Syslog clients: Routers or other types of equipment that 
generate and forward log messages to syslog servers. 
Syslog Client 
e0/0 
Public Web 
Server 
10.2.2.3 
10.2.1.1 e0/1 
R3 
e0/2 10.2.2.1 
10.2.3.1 
Mail 
Server 
10.2.2.4 
DMZ LAN 10.2.2.0/24 
Syslog 
Server 10.2.3.2 
User 10.2.3.3 
Administrator 
Server 
10.2.2.5 
Protected LAN 
10.2.3.0/24 
© 2009 Cisco Learning Institute. 25
Configuring System Logging 
1. Set the destination logging host 
R3(config)# logging 10.2.2.6 
R3(config)# logging trap informational 
2. Set the log severity (trap) level 
© 2009 Cisco Learning Institute. 26
Monitor Logging Remotely 
• Logs can easily be viewed 
through the SDM, or for easier 
use, through a syslog viewer on 
any remote system. 
• There are numerous Free 
remote syslog viewers, Kiwi is 
relatively basic and free. 
• Configure the router/switch/etc 
to send logs to the PC’s ip 
address that has kiwi installed. 
• Kiwi automatically listens for 
syslog messages and displays 
them. 
© 2009 Cisco Learning Institute. 27
Cisco AutoSecure 
• Initiated from CLI and executes a script. The 
AutoSecure feature first makes 
recommendations for fixing security 
vulnerabilities, and then modifies the security 
configuration of the router. 
• Can lockdown the management plane functions 
and the forwarding plane services and functions 
of a router 
• Used to provide a baseline security policy on a 
new router 
© 2009 Cisco Learning Institute. 28
Auto Secure Command 
• Command to enable the Cisco AutoSecure 
feature setup: 
auto secure [no-interact] 
• In Interactive mode, the router prompts with 
options to enable and disable services and other 
security features. This is the default mode but 
can also be configured using the auto secure 
full command. 
© 2009 Cisco Learning Institute. 29
Auto Secure Command 
router# 
auto secure [no-interact | full] [forwarding | management ] [ntp 
| login | ssh | firewall | tcp-intercept] 
R1# auto secure ? 
firewall AutoSecure Firewall 
forwarding Secure Forwarding Plane 
full Interactive full session of AutoSecure 
login AutoSecure Login 
management Secure Management Plane 
no-interact Non-interactive session of AutoSecure 
ntp AutoSecure NTP 
ssh AutoSecure SSH 
tcp-intercept AutoSecure TCP Intercept 
<cr> 
R1# 
© 2009 Cisco Learning Institute. 30
CCNA Security 05- securing the management plane

More Related Content

PPT
CCNA Security 06- AAA
PDF
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
PPT
CCNA Security 012- cryptographic systems
PPT
CCNA Security 09- ios firewall fundamentals
PPTX
Cisco CCNA Security 210-260 Practice Exam
PPT
CCNA Security - Chapter 3
PPT
Chapter 3 overview
PPT
CCNA Security - Chapter 2
CCNA Security 06- AAA
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security 012- cryptographic systems
CCNA Security 09- ios firewall fundamentals
Cisco CCNA Security 210-260 Practice Exam
CCNA Security - Chapter 3
Chapter 3 overview
CCNA Security - Chapter 2

What's hot (19)

PPT
CCNA Security 011- implementing ios-based ips
PPT
CCNA Security - Chapter 4
PPT
CCNA Security 010-configuring cisco asa
PPTX
ASA Multiple Context Training
PDF
CCA security answers chapter 2 test
PPT
Chapter 2 overview
PPT
CCNA Security 07-Securing the local area network
PDF
CCNP Security-VPN
DOCX
How to configure cisco asa virtual firewall
PPTX
Cisco ASA Firewalls
PPT
Understanding and Troubleshooting ASA NAT
PPTX
Ccna security
PPT
network security
PPT
Chapter 5 overview
PPT
Chapter 8 overview
PDF
Brkcrt 1160 c3-rev2
PPTX
Ccnas v11 ch02_eb
PDF
CCNP Security-Firewall
PPT
CCNA Security - Chapter 6
CCNA Security 011- implementing ios-based ips
CCNA Security - Chapter 4
CCNA Security 010-configuring cisco asa
ASA Multiple Context Training
CCA security answers chapter 2 test
Chapter 2 overview
CCNA Security 07-Securing the local area network
CCNP Security-VPN
How to configure cisco asa virtual firewall
Cisco ASA Firewalls
Understanding and Troubleshooting ASA NAT
Ccna security
network security
Chapter 5 overview
Chapter 8 overview
Brkcrt 1160 c3-rev2
Ccnas v11 ch02_eb
CCNP Security-Firewall
CCNA Security - Chapter 6
Ad

Viewers also liked (15)

PPT
CCNA Security 03- network foundation protection
PPT
CCNA Security 02- fundamentals of network security
PPT
CCNA Security - Chapter 1
PPT
CCNA Security - Chapter 9
PDF
Router commands
PPT
Chapter 6 intervlanrouting
PPT
Ccna3 mod9-vtp
PPT
CCNA 2
PDF
Cisco ccna-security note
DOC
Ccna 3 chapter 1 v4.0 answers 2011
PPT
ITE - Chapter 6
PPTX
CCNA ppt Day 7
PPTX
ppt on 6 weeks summer training
PDF
NAT Ccna
CCNA Security 03- network foundation protection
CCNA Security 02- fundamentals of network security
CCNA Security - Chapter 1
CCNA Security - Chapter 9
Router commands
Chapter 6 intervlanrouting
Ccna3 mod9-vtp
CCNA 2
Cisco ccna-security note
Ccna 3 chapter 1 v4.0 answers 2011
ITE - Chapter 6
CCNA ppt Day 7
ppt on 6 weeks summer training
NAT Ccna
Ad

Similar to CCNA Security 05- securing the management plane (20)

PDF
Ch2 - Securing Network Devices - CCNA Security.pdf
PPT
Curso de Seguridad de Redes Inalambricas CCNA
PPT
CCNA_Security_02.ppt
PPTX
CCNA_ITN_Chp2_.pptx
PPTX
CCNA v6.0 ITN - Chapter 02
PPTX
ITN_Module_2 NETWORKING 1 PPT FOR IT STUDENT.pptx
PPTX
Network Security v1.0 - Module 5network.pptx
PDF
02_Configure_a_Network_Operating_System.pdf
PPTX
ITN_Module_2.pptx
PPT
Ex 1 chapter11-configure-network-tony_chen
PPTX
Basic Switch & End Device Configuration_Module 2_ITNv7.pptx
PPTX
ITN_Module_2.pptx
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
PPTX
Itn6 instructor materials_chapter2
PPT
Chapter 4 overview
PPT
Cis81 ccna1v5-2-configuring networkoperatingsystem
PPT
Basics to Configure NW Device
PPT
Day 5.2 startingarouter
PPTX
LEC 2 - Assigning Administrative Roles.pptx
PPTX
Introduction_To_Network_ITN_Module_2.pptx
Ch2 - Securing Network Devices - CCNA Security.pdf
Curso de Seguridad de Redes Inalambricas CCNA
CCNA_Security_02.ppt
CCNA_ITN_Chp2_.pptx
CCNA v6.0 ITN - Chapter 02
ITN_Module_2 NETWORKING 1 PPT FOR IT STUDENT.pptx
Network Security v1.0 - Module 5network.pptx
02_Configure_a_Network_Operating_System.pdf
ITN_Module_2.pptx
Ex 1 chapter11-configure-network-tony_chen
Basic Switch & End Device Configuration_Module 2_ITNv7.pptx
ITN_Module_2.pptx
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
Itn6 instructor materials_chapter2
Chapter 4 overview
Cis81 ccna1v5-2-configuring networkoperatingsystem
Basics to Configure NW Device
Day 5.2 startingarouter
LEC 2 - Assigning Administrative Roles.pptx
Introduction_To_Network_ITN_Module_2.pptx

Recently uploaded (20)

PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
Climate Change and Its Global Impact.pptx
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
semiconductor packaging in vlsi design fab
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Farming Based Livelihood Systems English Notes
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Reproductive system-Human anatomy and physiology
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
Macbeth play - analysis .pptx english lit
PDF
Civil Department's presentation Your score increases as you pick a category
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PPTX
Thinking Routines and Learning Engagements.pptx
Journal of Dental Science - UDMY (2022).pdf
Climate Change and Its Global Impact.pptx
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
semiconductor packaging in vlsi design fab
UNIT_2-__LIPIDS[1].pptx.................
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Farming Based Livelihood Systems English Notes
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PLASMA AND ITS CONSTITUENTS 123.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
Reproductive system-Human anatomy and physiology
What’s under the hood: Parsing standardized learning content for AI
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Literature_Review_methods_ BRACU_MKT426 course material
2025 High Blood Pressure Guideline Slide Set.pptx
Journal of Dental Science - UDMY (2021).pdf
Macbeth play - analysis .pptx english lit
Civil Department's presentation Your score increases as you pick a category
ACFE CERTIFICATION TRAINING ON LAW.pptx
Thinking Routines and Learning Engagements.pptx

CCNA Security 05- securing the management plane

  • 1. 04- Securing the Management Plane Ahmed Sultan CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH © 2009 Cisco Learning Institute. 1
  • 2. Perimeter Implementations • Single Router Approach A single router connects the internal LAN to the Internet. All security policies are configured on this device. • Defense-in-depth Approach Passes everything through to the firewall. A set of rules determines what traffic the router will allow or deny. • DMZ Approach The DMZ is set up between two routers. Most traffic filtering left to the firewall LAN 1 192.168.2.0 Router 1 (R1) Internet LAN 1 192.168.2.0 R1 Internet Firewall LAN 1 192.168.2.0 R1 Internet Firewall R2 DMZ © 2009 Cisco Learning Institute. 2
  • 3. Areas of Router Security • Physical Security - Place router in a secured, locked room - Install an uninterruptible power supply • Operating System Security - Use the latest stable version that meets network requirements - Keep a copy of the O/S and configuration file as a backup • Router Hardening - Secure administrative control - Disable unused ports and interfaces - Disable unnecessary services © 2009 Cisco Learning Institute. 3
  • 4. SSH version 1, 2 • Configuring Router • SSH Commands • Connecting to Router © 2009 Cisco Learning Institute. 4
  • 5. Configuring the Router for SSH 1. Configure the IP domain name of the network R1# conf t R1(config)# ip domain-name span.com R1(config)# crypto key generate rsa general-keys modulus 1024 The name for the keys will be: R1.span.com 2. Generate one way secret key % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non-exportable...[ OK] R1(config)# *Dec 13 16:19:12.079: %SSH-5-ENABLED: SSH 1.99 has been enabled R1(config)# username Bob secret cisco R1(config)# line vty 0 4 R1(config-line)# login local R1(config-line)# transport input ssh R1(config-line)# exit 3. Verify or create a local database entry 4. Enable VTY inbound SSH sessions © 2009 Cisco Learning Institute. 5
  • 6. Optional SSH Commands R1# show ip ssh SSH Enabled - version 1.99 Authentication timeout: 120 secs; Authentication retries: 3 R1# R1# conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# ip ssh version 2 R1(config)# ip ssh time-out 60 R1(config)# ip ssh authentication-retries 2 R1(config)# ^Z R1# R1# show ip ssh SSH Enabled - version 2.0 Authentication timeout: 60 secs; Authentication retries: 2 R1# © 2009 Cisco Learning Institute. 6
  • 7. Connecting to the Router There are two different ways to connect to an SSH-enabled router: - Connect using an SSH-enabled Cisco router - Connect using an SSH client running on a host. 11 There are no current SSH sessions ongoing with R1. R1# sho ssh %No SSHv2 server connections running. %No SSHv1 server connections running. R1# 22 R2 establishes an SSH connection with R1. R2# ssh -l Bob 192.168.2.101 Password: R1> 33 There is an incoming and outgoing SSHv2 session user Bob. R1# sho ssh Connection Version Mode Encryption Hmac State Username 0 2.0 IN aes128-cbc hmac-sha1 Session started Bob 0 2.0 OUT aes128-cbc hmac-sha1 Session started Bob %No SSHv1 server connections running. R1# © 2009 Cisco Learning Institute. 7
  • 8. Configuring for Privilege Levels • By default: - User EXEC mode (privilege level 1) - Privileged EXEC mode (privilege level 15) • Sixteen privilege levels available • Methods of providing privileged level access infrastructure access: - Privilege Levels - Role-Based CLI Access © 2009 Cisco Learning Institute. 8
  • 9. Privilege CLI Command router(config)# privilege mode {level level command | reset command} Command Description mode Specifies the configuration mode. Use the privilege ? command to see a complete list of router configuration modes available level (Optional) Enables setting a privilege level with a specified command level command (Optional) The privilege level associated with a command (specify up to 16 privilege levels, using numbers 0 to 15) reset (Optional) Resets the privilege level of a command Command (Optional) Resets the privilege level © 2009 Cisco Learning Institute. 9
  • 10. Privilege Levels for Users R1# conf t R1(config)# R1(config)# privilege exec level 5 ping R1(config)# enable secret level 5 cisco5 R1(config)# username SUPPORT privilege 5 secret cisco5 R1(config)# R1(config)# privilege exec level 10 reload R1(config)# enable secret level 10 cisco10 R1(config)# username JR-ADMIN privilege 10 secret cisco10 R1(config)# R1(config)# username ADMIN privilege 15 secret cisco123 R1(config)# • A SUPPORT account with Level 5 and ping command access. • A JR-ADMIN account with with Level 10 plus access to the reload command. • An ADMIN account which has all of the regular privileged EXEC commands. © 2009 Cisco Learning Institute. 10
  • 11. Privilege Levels The enable level command is used to switch from Level 1 to Level 5 R1> enable 5 Password: R1# <cisco5> R1# show privilege Current privilege level is 5 R1# R1# reload Translating "reload" Translating "reload" The show privilege command displays The current privilege level The user cannot us the reload command % Unknown command or computer name, or unable to find computer address R1# © 2009 Cisco Learning Institute. 11
  • 12. Privilege Level Limitations • There is no access control to specific interfaces, ports, logical interfaces, and slots on a router • Commands available at lower privilege levels are always executable at higher levels. • Commands specifically set on a higher privilege level are not available for lower-privileged users. © 2009 Cisco Learning Institute. 12
  • 13. Role-Based CLI • Controls which commands are available to specific roles • Different views of router configurations created for different users providing: - Security: Defines the set of CLI commands that is accessible by a particular user by controlling user access to configure specific ports, logical interfaces, and slots on a router - Availability: Prevents unintentional execution of CLI commands by unauthorized personnel - Operational Efficiency: Users only see the CLI commands applicable to the ports and CLI to which they have access © 2009 Cisco Learning Institute. 13
  • 14. Role-Based Views • Root View To configure any view for the system, the administrator must be in the root view. Root view has all of the access privileges as a user who has level 15 privileges. • CLI View A specific set of commands can be bundled into a “CLI view”. Each view must be assigned all commands associated with that view and there is no inheritance of commands from other views. Additionally, commands may be reused within several views. • Superview Allow a network administrator to assign users and groups of users multiple CLI views at once instead of having to assign a single CLI view per user with all commands associated to that one CLI view. © 2009 Cisco Learning Institute. 14
  • 15. Role-Based Views © 2009 Cisco Learning Institute. 15
  • 16. Creating and Managing a View 1. Enable aaa with the global configuration command aaa new-model. Exit, and enter the root view with the command enable view command. 2. Create a view using the parser view view-name command. 3. Assign a secret password to the view using the secret encrypted-password command. 4. Assign commands to the selected view using the parser-mode {include | include-exclusive | exclude} [all] [interface interface-name | command] command in view configuration mode. 5. Exit the view configuration mode by typing the command exit. © 2009 Cisco Learning Institute. 16
  • 17. View Commands router# enable [view [view-name]] Command is used to enter the CLI view. Parameter Description view Enters view, which enables users to configure CLI views. This keyword is required if you want to configure a CLI view. view-name (Optional) Enters or exits a specified CLI view. This keyword can be used to switch from one CLI view to another CLI view. router(config)# parser view view-name Creates a view and enters view configuration mode. router(config-view)# secret encrypted-password • Sets a password to protect access to the View. • Password must be created immediately after creating a view © 2009 Cisco Learning Institute. 17
  • 18. Creating and Managing a Superview 1. Create a view using the parser view view-name superview command and enter superview configuration mode. 2. Assign a secret password to the view using the secret encrypted-password command. 3. Assign an existing view using the view view-name command in view configuration mode. 4. Exit the superview configuration mode by typing the command exit. © 2009 Cisco Learning Institute. 18
  • 19. Running Config “Views” © 2009 Cisco Learning Institute. 19
  • 20. Running Config “SUPERVIEWS” © 2009 Cisco Learning Institute. 20
  • 21. Resilient Configuration Facts • The configuration file in the primary bootset is a copy of the running configuration that was in the router when the feature was first enabled. • The feature secures the smallest working set of files to preserve persistent storage space. No extra space is required to secure the primary IOS image file. • The feature automatically detects image or configuration version mismatch. • Only local storage is used for securing files. • The feature can be disabled only through a console session. R1# erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] © 2009 Cisco Learning Institute. 21
  • 22. CLI Commands router(config)# secure boot-image  Enables Cisco IOS image resilience. Prevents the IOS image from being deleted by a malicious user. router(config)# secure boot-config  Takes a snapshot of the router running configuration and securely archives it in persistent storage. © 2009 Cisco Learning Institute. 22
  • 23. Preventing Password Recovery R1(config)# no service password-recovery WARNING: Executing this command will disable password recovery mechanism. Do not execute this command without another plan for password recovery. Are you sure you want to continue? [yes/no]: yes R1(config) R1# sho run Building configuration... Current configuration : 836 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption no service password-recovery System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 2006 by cisco Systems, Inc. PLD version 0x10 GIO ASIC version 0x127 c1841 platform with 131072 Kbytes of main memory Main memory is configured to 64 bit mode with parity disabled PASSWORD RECOVERY FUNCTIONALITY IS DISABLED program load complete, entry point: 0x8000f000, size: 0xcb80 © 2009 Cisco Learning Institute. 23
  • 24. Using Syslog • Implementing Router Logging • Syslog • Configuring System Logging © 2009 Cisco Learning Institute. 24
  • 25. Syslog • Syslog servers: Known as log hosts, these systems accept and process log messages from syslog clients. • Syslog clients: Routers or other types of equipment that generate and forward log messages to syslog servers. Syslog Client e0/0 Public Web Server 10.2.2.3 10.2.1.1 e0/1 R3 e0/2 10.2.2.1 10.2.3.1 Mail Server 10.2.2.4 DMZ LAN 10.2.2.0/24 Syslog Server 10.2.3.2 User 10.2.3.3 Administrator Server 10.2.2.5 Protected LAN 10.2.3.0/24 © 2009 Cisco Learning Institute. 25
  • 26. Configuring System Logging 1. Set the destination logging host R3(config)# logging 10.2.2.6 R3(config)# logging trap informational 2. Set the log severity (trap) level © 2009 Cisco Learning Institute. 26
  • 27. Monitor Logging Remotely • Logs can easily be viewed through the SDM, or for easier use, through a syslog viewer on any remote system. • There are numerous Free remote syslog viewers, Kiwi is relatively basic and free. • Configure the router/switch/etc to send logs to the PC’s ip address that has kiwi installed. • Kiwi automatically listens for syslog messages and displays them. © 2009 Cisco Learning Institute. 27
  • 28. Cisco AutoSecure • Initiated from CLI and executes a script. The AutoSecure feature first makes recommendations for fixing security vulnerabilities, and then modifies the security configuration of the router. • Can lockdown the management plane functions and the forwarding plane services and functions of a router • Used to provide a baseline security policy on a new router © 2009 Cisco Learning Institute. 28
  • 29. Auto Secure Command • Command to enable the Cisco AutoSecure feature setup: auto secure [no-interact] • In Interactive mode, the router prompts with options to enable and disable services and other security features. This is the default mode but can also be configured using the auto secure full command. © 2009 Cisco Learning Institute. 29
  • 30. Auto Secure Command router# auto secure [no-interact | full] [forwarding | management ] [ntp | login | ssh | firewall | tcp-intercept] R1# auto secure ? firewall AutoSecure Firewall forwarding Secure Forwarding Plane full Interactive full session of AutoSecure login AutoSecure Login management Secure Management Plane no-interact Non-interactive session of AutoSecure ntp AutoSecure NTP ssh AutoSecure SSH tcp-intercept AutoSecure TCP Intercept <cr> R1# © 2009 Cisco Learning Institute. 30

Editor's Notes

  • #18: Remember, the aaa-new model command must be configured prior to entering a view.
  • #27: However, if the logging on command is disabled, no messages will be sent to these destinations. Only the console will receive messages.