SlideShare a Scribd company logo
‫الطالب‬ ‫اسماء‬:1-‫الدين‬ ‫بدر‬ ‫ابوبكر‬2-‫العزيز‬ ‫عبد‬ ‫احمد‬
‫المدرب‬ ‫اسم‬:‫العديني‬ ‫ابراهيم‬
Introduction
 It is a set of actions which can provide maximum
protection of information and data in the networks of
all the risks that are threatened, and by providing the
necessary tools and means available to protect the
information from internal or external risks.
Three Areas of Router Security
 Physical security
 Operating system
 Router hardening
Cisco Router Passwords :
 All routers need a locally configured password for
privileged access and other access.
Cisco Router Passwords
 To steal passwords, attackers :
 Shoulder surf.
 Guess passwords based on the user's personal
information.
 Sniff TFTP packets containing plaintext configuration
files.
 Use readily available brute force attack tools such as
L0phtCrack or Cain & Abel.
 Strong passwords are the primary defense against
unauthorized access to a router!
Strong Passwords
 Passwords should NOT use dictionary words
 Dictionary words are vulnerable to dictionary attacks.
 Passwords may include the following:
 Any alphanumeric character.
 A mix of uppercase and lowercase characters.
 Symbols and spaces.
 A combination of letters, numbers, and symbols.
Disabling Unused Cisco
Router Network Services
and Interfaces
Vulnerable Router Services
 Medium size and large networks typically use a
firewall appliance (PIX / ASA) behind the perimeter
router, which adds security features and performs user
authentication and more advanced packet filtering.
 Firewall installations also facilitate the creation of
Demilitarized Zones (DMZs), where the firewall
‘places’ hosts that are commonly accessed from the
Internet.
CCP Security Audit Overview
 Security Audit compares router configuration against
recommended settings.
 Examples of the audit include:
 Shut down unneeded servers.
 Disable unneeded services.
 Apply the firewall to the outside interfaces.
 Disable or harden SNMP.
 Shut down unused interfaces.
 Check password strength.
 Enforce the use of ACLs.

More Related Content

PPT
Network security and protocols
PDF
IoT Device Security Tips
PPTX
internet security
PPTX
Network Attacks and Countermeasures
PPTX
WiFi Secuiry: Attack & Defence
PPTX
Attack presentation
PPT
Ch06 Wireless Network Security
DOCX
Network security and protocols
IoT Device Security Tips
internet security
Network Attacks and Countermeasures
WiFi Secuiry: Attack & Defence
Attack presentation
Ch06 Wireless Network Security

What's hot (20)

PDF
Ceh v5 module 21 cryptography
PPTX
Network security and System Admin
PPTX
Firewall
PPTX
Network security
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPTX
Wifi hacking
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PDF
Ga13
PPTX
Presentation network security
PPTX
WLAN Attacks and Protection
PPT
PDF
Ceh v5 module 07 sniffers
PPTX
WiFi security
PPTX
Network security (syed azam)
PDF
Ce hv6 module 45 privacy on the internet
PPTX
Cyber Security: Trends and Globar War
PPT
Network security
PPTX
Impact to it security of incorrect configuration of firewall policies and thi...
PPTX
محمد
PPTX
Firewall presentation
Ceh v5 module 21 cryptography
Network security and System Admin
Firewall
Network security
Understanding WiFi Security Vulnerabilities and Solutions
Wifi hacking
Wireless and WLAN Secuirty, Presented by Vijay
Ga13
Presentation network security
WLAN Attacks and Protection
Ceh v5 module 07 sniffers
WiFi security
Network security (syed azam)
Ce hv6 module 45 privacy on the internet
Cyber Security: Trends and Globar War
Network security
Impact to it security of incorrect configuration of firewall policies and thi...
محمد
Firewall presentation
Ad

Viewers also liked (7)

PPTX
CCNA Security: 2. Securing network devices
PPT
Security and privacy
PPTX
Overview of Computers, Networking & Security Program
PPT
Security Basics Webinar
PDF
Securing Corporate Applications and Data on Personal Devices
PPT
Computer Concepts Unit A PPT Lecture
PPT
Network security
CCNA Security: 2. Securing network devices
Security and privacy
Overview of Computers, Networking & Security Program
Security Basics Webinar
Securing Corporate Applications and Data on Personal Devices
Computer Concepts Unit A PPT Lecture
Network security
Ad

Similar to Securing network devices (20)

PPTX
عرض تقديمي2
PPT
Managing Network Device Security
PDF
Ch3-Authentication, Authorization, and Accounting.pdf
PPT
Curso de Seguridad de Redes Inalambricas CCNA
PPT
CCNA_Security_02.ppt
PPT
CCNA Security 06- AAA
DOCX
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
PPTX
Network Security v1.0 You have - Module 4.pptx
PDF
Cisco Router and Switch Security Hardening Guide
PPT
Chapter 3 overview
PPT
network security
PPTX
Router forensics
PPTX
AAA Implementation
PDF
network security.pdf
PDF
Network Security Is Important For Protecting Your Computer
PDF
3 (data security in local network using)
PDF
Overview of SMB, NetBIOS and other network attacks
PPTX
Router hardening project.slide
PPTX
Ccna sv2 instructor_ppt_ch2
PPTX
Network security
عرض تقديمي2
Managing Network Device Security
Ch3-Authentication, Authorization, and Accounting.pdf
Curso de Seguridad de Redes Inalambricas CCNA
CCNA_Security_02.ppt
CCNA Security 06- AAA
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
Network Security v1.0 You have - Module 4.pptx
Cisco Router and Switch Security Hardening Guide
Chapter 3 overview
network security
Router forensics
AAA Implementation
network security.pdf
Network Security Is Important For Protecting Your Computer
3 (data security in local network using)
Overview of SMB, NetBIOS and other network attacks
Router hardening project.slide
Ccna sv2 instructor_ppt_ch2
Network security

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
1. Introduction to Computer Programming.pptx
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
Group 1 Presentation -Planning and Decision Making .pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Machine Learning_overview_presentation.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)

Securing network devices

  • 1. ‫الطالب‬ ‫اسماء‬:1-‫الدين‬ ‫بدر‬ ‫ابوبكر‬2-‫العزيز‬ ‫عبد‬ ‫احمد‬ ‫المدرب‬ ‫اسم‬:‫العديني‬ ‫ابراهيم‬
  • 2. Introduction  It is a set of actions which can provide maximum protection of information and data in the networks of all the risks that are threatened, and by providing the necessary tools and means available to protect the information from internal or external risks.
  • 3. Three Areas of Router Security  Physical security  Operating system  Router hardening
  • 4. Cisco Router Passwords :  All routers need a locally configured password for privileged access and other access.
  • 5. Cisco Router Passwords  To steal passwords, attackers :  Shoulder surf.  Guess passwords based on the user's personal information.  Sniff TFTP packets containing plaintext configuration files.  Use readily available brute force attack tools such as L0phtCrack or Cain & Abel.  Strong passwords are the primary defense against unauthorized access to a router!
  • 6. Strong Passwords  Passwords should NOT use dictionary words  Dictionary words are vulnerable to dictionary attacks.  Passwords may include the following:  Any alphanumeric character.  A mix of uppercase and lowercase characters.  Symbols and spaces.  A combination of letters, numbers, and symbols.
  • 7. Disabling Unused Cisco Router Network Services and Interfaces
  • 8. Vulnerable Router Services  Medium size and large networks typically use a firewall appliance (PIX / ASA) behind the perimeter router, which adds security features and performs user authentication and more advanced packet filtering.  Firewall installations also facilitate the creation of Demilitarized Zones (DMZs), where the firewall ‘places’ hosts that are commonly accessed from the Internet.
  • 9. CCP Security Audit Overview  Security Audit compares router configuration against recommended settings.  Examples of the audit include:  Shut down unneeded servers.  Disable unneeded services.  Apply the firewall to the outside interfaces.  Disable or harden SNMP.  Shut down unused interfaces.  Check password strength.  Enforce the use of ACLs.