1 / 8

Cisco Device Startup

Cisco Device Startup. Cisco Command Modes. The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major modes are: User mode Privileged mode Global Configuration mode Specific Configuration modes. Cisco Command Modes. User Mode – view only

Download Presentation

Cisco Device Startup

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco Device Startup

  2. Cisco Command Modes • The CLI uses a hierarchical structure for the modes. • In order from top to bottom, the major modes are: • User mode • Privileged mode • Global Configuration mode • Specific Configuration modes

  3. Cisco Command Modes • User Mode – view only • Privileged Mode – used to manage, update configuration • By default, no authentication required.

  4. Config Modes

  5. Basic Audit Steps For Network Devices Policy – roles, responsibilities, permissions, standard configurations Access – Physical and Electronic IOS - The operating system for the router is a crucial component. Configuration Management – both static and dynamic. Basic hardening should be one of the first steps implemented to minimize the risk of attacks. Logging - log information helps to determine whether the router is working properly of if it has been probed or worst case, compromised.

  6. Network Device Policy • Security policy should define: • Roles – define administrator, operator and any user role. • Permissions – defines how who will be granted privileges on the device. • Rules of conduct – define how rules will be configured on the router and who will approve rule implementation. • Responsibilities – define who will make config changes or who will monitor logs. • Minimum Configuration Standards – basic hardening requirements.

  7. Physical Security • Access should be limited 24/7 365 days a year. • Environmental controls - free of electrostatic and magnetic interference, temperature and humidity controlled, Uninterruptible Power Supply (UPS) • Some routers offer PC-Card slots or CompactFlash slots • The Cisco password recovery procedure allows individual to gain privileged access to the device without using a password.

  8. Electronic Access Controls • There are two types of access: local and remote. • Local access involves a direct connection to a console port on the router with a dumb terminal or a laptop computer.

More Related