Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Securing and controlling sisco routers
PREMIUM
Số trang
683
Kích thước
2.8 MB
Định dạng
PDF
Lượt xem
1696

Securing and controlling sisco routers

Nội dung xem thử

Mô tả chi tiết

SECURING AND

CONTROLLING

CISCO ROUTERS

© 2002 by CRC Press LLC

ABCs of IP Addressing

Gilbert Held

ISBN: 0-8493-1144-6

Application Servers for E-Business

Lisa M. Lindgren

ISBN: 0-8493-0827-5

Architectures for E-Business Systems

Sanjiv Purba, Editor

ISBN: 0-8493-1161-6

A Technical Guide to IPSec Virtual

Private Networks

James S. Tiller

ISBN: 0-8493-0876-3

Building an Information Security

Awareness Program

Mark B. Desman

ISBN: 0-8493-0116-5

Computer Telephony Integration

William Yarberry, Jr.

ISBN: 0-8493-9995-5

Cyber Crime Investigator’s

Field Guide

Bruce Middleton

ISBN: 0-8493-1192-6

Cyber Forensics:

A Field Manual for Collecting,

Examining, and Preserving Evidence

of Computer Crimes

Albert J. Marcella and Robert S. Greenfield,

Editors

ISBN: 0-8493-0955-7

Information Security Architecture

Jan Killmeyer Tudor

ISBN: 0-8493-9988-2

Information Security Management

Handbook, 4th Edition, Volume 1

Harold F. Tipton and Micki Krause, Editors

ISBN: 0-8493-9829-0

Information Security Management

Handbook, 4th Edition, Volume 2

Harold F. Tipton and Micki Krause, Editors

ISBN: 0-8493-0800-3

Information Security Management

Handbook, 4th Edition, Volume 3

Harold F. Tipton and Micki Krause, Editors

ISBN: 0-8493-1127-6

Information Security Policies,

Procedures, and Standards:

Guidelines for Effective Information

Security Management

Thomas Peltier

ISBN: 0-8493-1137-3

Information Security Risk Analysis

Thomas Peltier

ISBN: 0-8493-0880-1

Information Technology Control

and Audit

Frederick Gallegos, Sandra Allen-Senft,

and Daniel P. Manson

ISBN: 0-8493-9994-7

New Directions in Internet

Management

Sanjiv Purba, Editor

ISBN: 0-8493-1160-8

New Directions in Project Management

Paul C. Tinnirello, Editor

ISBN: 0-8493-1190-X

A Practical Guide to Security

Engineering and Information

Assurance

Debra Herrmann

ISBN: 0-8493-1163-2

The Privacy Papers:

Managing Technology and Consumers,

Employee, and Legislative Action

Rebecca Herold

ISBN: 0-8493-1248-5

Secure Internet Practices:

Best Practices for Securing Systems

in the Internet and e-Business Age

Patrick McBride, Joday Patilla,

Craig Robinson, Peter Thermos,

and Edward P. Moser

ISBN: 0-8493-1239-6

Securing and Controlling Cisco Routers

Peter T. Davis

ISBN: 0-8493-1290-6

Securing E-Business Applications and

Communications

Jonathan S. Held and John R. Bowers

ISBN: 0-8493-0963-8

Securing Windows NT/2000:

From Policies to Firewalls

Michael A. Simonyi

ISBN: 0-8493-1261-2

TCP/IP Professional Reference Guide

Gilbert Held

ISBN: 0-8493-0824-0

The Complete Book of Middleware

Judith Myerson

ISBN: 0-8493-1272-8

AUERBACH PUBLICATIONS

www.auerbach-publications.com

To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401

E-mail: [email protected]

OTHER AUERBACH PUBLICATIONS

© 2002 by CRC Press LLC

AUERBACH PUBLICATIONS

A CRC Press Company

Boca Raton London New York Washington, D.C.

SECURING AND

CONTROLLING

CISCO ROUTERS

PETER T. DAVIS

© 2002 by CRC Press LLC

This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted

with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been

made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the

validity of all materials or for the consequences of their use.

Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or

mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,

without prior permission in writing from the publisher.

The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new

works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying.

Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for

identification and explanation, without intent to infringe.

Visit the Auerbach Publications Web site at www.auerbach-publications.com

© 2002 by CRC Press LLC

Auerbach is an imprint of CRC Press LLC

No claim to original U.S. Government works

International Standard Book Number 0-8493-1290-6

Library of Congress Card Number 2002019683

Printed in the United States of America 1 2 3 4 5 6 7 8 9 0

Printed on acid-free paper

Library of Congress Cataloging-in-Publication Data

Davis, Peter T.

Securing and controlling Cisco routers / Peter T. Davis.

p. cm.

Includes bibliographical references and index.

ISBN 0-8493-1290-6 (alk. paper)

1. Routers (Computer networks) 2. Computer networks--Security measures. I. Title.

TK5105.543 .D38 2002

004.6--dc21

2002019683

© 2002 by CRC Press LLC

Dedication

To Thomas Finlay Brick,

welcome to the world,

with all its frailties.

Peter T. Davis

© 2002 by CRC Press LLC

Contents at a Glance

SECTION I: THE BASICS

1 The Need for Security

2 Understanding OSI and TCP/IP

3 Routed and Routing Protocols

4 Understanding Router Basics

5 Router Management

SECTION II: PREVENTING UNAUTHORIZED ACCESS:

NETWORKING DEVICE

6 Implementing Non-AAA Authentication

7 Implementing AAA Security Services

8 Implementing AAA Authentication

9 Implementing AAA Authorization

10 Implementing AAA Accounting

11 Configuring TACACS and Extended TACACS

12 Configuring TACACS+

13 Configuring RADIUS

14 Configuring Kerberos

SECTION III: PREVENTING UNAUTHORIZED ACCESS:

NETWORKING

15 Basic Traffic Filtering, Part 1

16 Basic Traffic Filtering, Part 2

© 2002 by CRC Press LLC

17 Advanced Traffic Filtering, Part 1

18 Advanced Traffic Filtering, Part 2

SECTION IV: PREVENTING NETWORK DATA INTERCEPTION

19 Using Encryption and IKE

20 Configuring IPSec

SECTION V: PREVENTING DENIAL-OF-SERVICE

21 Configuring Denial-of-Service Security Features

SECTION VI: PREVENTING FRAUDULENT ROUTE UPDATES

AND OTHER UNAUTHORIZED CHANGES

22 Configuring Neighbor Authentication and

Other Security Features

APPENDICES

Appendix A: IP Addressing

Appendix B: Subnetting

Appendix C: IP Protocol Numbers

Appendix D: Well-Known Ports and Services

Appendix E: Hacker, Cracker, Malware, and Trojan Horse Ports

Appendix F: ICMP Types and Codes

Appendix G: Determining Wildcard Mask Ranges

Appendix H: Logical Operations

Appendix I: Helpful Resources

Appendix J: Bibliography

Appendix K: Acronyms and Abbreviations

Appendix L: Glossary

© 2002 by CRC Press LLC

Contents

SECTION I: THE BASICS

1 The Need for Security

The New Reality

Cost of Intrusions

Designing the Security Infrastructure

Security Policy

Security Plan

Phases of Securing a Network

Identifying Security Risks and Threats

Preventing Unauthorized Access into Networking Devices

Cisco IOS Password Vulnerability

Buffer Overflow Vulnerability

Leap Year Vulnerability

Request Authenticator Vulnerability

Preventing Unauthorized Access into Networks

ACL Vulnerability

Preventing Network Data Interception

ISAKMP Vulnerability

Preventing Denial-of-Service Attacks

CDP Vulnerability

ARP Vulnerability

NAT Vulnerability

Scanning Vulnerability

TCP Sequence Guessing Vulnerability

Preventing Fraudulent Route Updates

BGP Vulnerability

Preventing Unauthorized Changes

HTTP Vulnerability

Practice Session

Security and Audit Checklist

Conclusion

© 2002 by CRC Press LLC

2 Understanding OSI and TCP/IP

The OSI Model

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data-Link Layer

Physical Layer

Encapsulation

Protocol Data Units

Frame

Packet

Datagram

Segment

Message

Cell

Data Unit

TCP/IP Overview

Internet Layer

Internet Protocol

Address Resolution Protocol and Reverse Address Resolution Protocol

Internet Control Message Protocol

Transport Layer

Transmission Control Protocol

TCP Connection

Socket

User Datagram Protocol

Practice Session

Security and Audit Checklist

Conclusion

3 Routed and Routing Protocols

Routing Activities

Path Determination

Logical and Hardware Addresses

Communication on the Same Subnet

Communication between Different Subnets

Packet Switching

Routing Tables

Routable Protocols

Routing Protocols

Routing Protocol Basics

Routing Algorithms

Routing Metrics

Types of Routing Protocols

Practice Session

Security and Audit Checklist

Conclusion

4 Understanding Router Basics

Router Overview

User Interface

User Mode

© 2002 by CRC Press LLC

Privileged Mode

Context-Sensitive Help

Command History

Editing Commands

Router Modes

Router Components

Random Access Memory (RAM)

Non-Volatile RAM (NVRAM)

Flash

Read-Only Memory (ROM)

Interfaces

Router Status

Practice Session

Security and Audit Checklist

Conclusion

5 Router Management

Router Setup

Using the Setup Script

Using TFTP

Using Config Maker

Using the Command Line Interface

Using Boot System Commands

Updating the IOS

Using CPSWInst

Using TFTP

Troubleshooting

Using the Packet InterNetwork Groper (Ping)

Using Traceroute

Using Debug

Using Telnet

Using Cisco Discovery Protocol (CDP)

Logging

Console Port Logging

Saving Log Information

Syslog Servers

Recording Access List Violations

Log Processing

Simple Network Management Protocol (SNMP)

Non-Privileged Mode

Privileged Mode

Cisco Discovery Protocol

Last Word on Management

Practice Session

Security and Audit Checklist

Conclusion

SECTION II: PREVENTING UNAUTHORIZED ACCESS:

NETWORKING DEVICE

6 Implementing Non-AAA Authentication

Authentication

Creating Strong Passcodes

© 2002 by CRC Press LLC

Using Router Passwords

Enable Password

Enable Secret Password

Using Console and Auxiliary Passwords

Using Virtual Terminal Passwords

Configuring Privilege Levels

Setting Line Privilege

Encrypting Router Passwords

Getting Around Lost Passwords

Configuring Line Password Protection

Setting TACACS Passwords for Privileged EXEC Mode

Establishing Username Authentication

Enabling CHAP or PAP Authentication

Password Authentication Protocol

Challenge Handshake Authentication Protocol

Enabling PAP or CHAP

Inbound and Outbound Authentication

Enabling Outbound PAP Authentication

Creating a Common CHAP Password

Refusing CHAP Authentication Requests

Delaying CHAP Authentication until Peer Authenticates

Configuring TACACS and Extended TACACS

Password Protection

General Interactive Access

Controlling TTYs

Controlling VTYs and Ensuring VTY Availability

Warning Banners and Router Identification

Practice Session

Security and Audit Checklist

Conclusion

7 Implementing AAA Security Services

Accessing the Network

Looking at Dial-In Issues

Developing Your Policy

Authenticating Dial-In Users

Defining AAA

Authentication

Authorization

Accounting

Benefits of Using AAA

Implementing AAA

Method Lists

Using AAA

Setting up AAA

Enabling AAA

Using Security Servers

Applying a Method List

Selecting Security Servers

Looking at TACACS+

TACACS Authentication Examples

Looking at RADIUS

Looking at Kerberos

© 2002 by CRC Press LLC

Practice Session

Security and Audit Checklist

Conclusion

8 Implementing AAA Authentication

Using Method Lists

Creating a Method List

AAA Authentication Methods

Configuring Log-In Authentication

Log-In Authentication Using Enable Password

Log-In Authentication Using Kerberos

Log-In Authentication Using Line Password

Log-In Authentication Using Local Password

Log-In Authentication Using RADIUS

Log-In Authentication Using TACACS+

Configuring PPP Authentication

PPP Authentication Using Kerberos

PPP Authentication Using Local Password

PPP Authentication Using RADIUS

PPP Authentication Using TACACS+

Configuring AAA Scalability for PPP Requests

Enabling Double Authentication

Understanding Double Authentication

Configuring Double Authentication

Access User Profile after Double Authentication

Enabling Automated Double Authentication

Troubleshooting Double Authentication

Configuring ARA Authentication

ARA Authentication Allowing Authorized Guest Log-Ins

ARA Authentication Allowing Guest Log-Ins

ARA Authentication Using Line Password

ARA Authentication Using Local Password

ARA Authentication Using TACACS+

Configuring NASI Authentication

NASI Authentication Using Enable Password

NASI Authentication Using Line Password

NASI Authentication Using Local Password

NASI Authentication Using TACACS+

Specifying the Amount of Time for Log-In Input

Enabling Password Protection at the Privileged Level

Changing the Text Displayed at the Password Prompt

Configuring Message Banners for AAA Authentication

Configuring a Log-In Banner

Configuring a Failed Log-In Banner

Log-In and Failed Log-In Banner Configuration Examples

Practice Session

Security and Audit Checklist

Conclusion

9 Implementing AAA Authorization

Starting with AAA Authorization

Understanding AAA Authorization

TACACS+ Authorization

If-Authenticated Authorization

© 2002 by CRC Press LLC

None Authorization

Local Authorization

RADIUS Authorization

Kerberos Authorization

Disabling Authorization for Global Configuration Commands

Authorization for Reverse Telnet

Authorization Attribute-Value Pairs

Practice Session

Security and Audit Checklist

Conclusion

10 Implementing AAA Accounting

Starting with AAA Accounting

Configuring AAA Accounting

Named Method Lists for Accounting

Understanding AAA Accounting Types

Command Accounting

Connection Accounting

EXEC Accounting

Network Accounting

System Accounting

Applying a Named List

Suppress Generation of Accounting Records for Null Username Sessions

Generating Interim Accounting Records

Monitoring Accounting

Practice Session

Security and Audit Checklist

Conclusion

11 Configuring TACACS and Extended TACACS

Breaking Down the Protocols

Understanding the TACACS Protocols

Configuring TACACS and Extended TACACS

Establishing the TACACS Server Host

Enabling the Extended TACACS Mode

Disabling Password Checking at the User Level

Setting Optional Password Verification

Setting Notification of User Actions

Setting Authentication of User Actions

Setting Limits on Log-In Attempts

Setting TACACS Password Protection at the User Level

Setting TACACS Password Protection at the Privileged Level

Enabling TACACS and XTACACS for Use

Enabling Extended TACACS for PPP Authentication

Enabling Standard TACACS for ARA Authentication

Enabling Extended TACACS for ARA Authentication

Enabling TACACS to Use a Specific IP Address

Specifying a TACACS Host at Log-In

Practice Session

Security and Audit Checklist

Conclusion

12 Configuring TACACS+

Understanding the TACACS+ Protocol

© 2002 by CRC Press LLC

Comparing TACACS+ and RADIUS

Transport Protocol

Packet Encryption

Authentication and Authorization

Multi-Protocol Support

Router Management

Interoperability

Overhead

Understanding TACACS+ Operation

TACACS+ Configuration Task List

Configuring TACACS+

Identifying the TACACS+ Server Host

Setting the TACACS+ Authentication Key

Specifying TACACS+ Authentication

Specifying TACACS+ Authorization

Specifying TACACS+ Accounting

TACACS+ AV Pairs

Practice Session

Security and Audit Checklist

Conclusion

13 Configuring RADIUS

RADIUS Overview

Cisco and Other Vendor Support

Using RADIUS

Understanding RADIUS Operation

RADIUS Configuration Task List

Configuring RADIUS

Configuring Router-to-RADIUS Server Communication

Configuring Router to Use Vendor-Specific RADIUS Attributes

Configuring Router for Vendor-Proprietary RADIUS

Server Communication

Configuring Router to Query RADIUS Server for Static Routes and

IP Addresses

Configuring Router to Expand Network Access Server

Port Information

Specifying RADIUS Authentication

Specifying RADIUS Authorization

Specifying RADIUS Accounting

RADIUS Attributes

Vendor-Proprietary RADIUS Attributes

Practice Session

Security and Audit Checklist

Conclusion

14 Configuring Kerberos

Kerberos Overview

Supporting Kerberos Client

Authenticating to the Boundary Router

Obtaining a TGT from the KDC

Authenticating to Network Services

Configuring the Router to Use the Kerberos Protocol

Defining a Kerberos Realm

Copying SRVTAB Files

© 2002 by CRC Press LLC

Retrieving a SRVTAB File from the KDC

Specifying Kerberos Authentication

Enabling Credentials Forwarding

Telneting to the Router

Establishing an Encrypted Kerberized Telnet Session

Enabling Mandatory Kerberos Authentication

Enabling Kerberos Instance Mapping

Mapping a Kerberos Instance to a Cisco IOS Privilege Level

Using Kerberos Preauthentication

Monitoring and Maintaining Kerberos

Practice Session

Security and Audit Checklist

Conclusion

SECTION III: PREVENTING UNAUTHORIZED ACCESS:

NETWORKING

15 Basic Traffic Filtering, Part 1

Access List Overview

Understanding Access List Configuration

Creating Access Lists

Assigning a Unique Name or Number to Each Access List

Defining Criteria for Forwarding or Blocking Packets

Router as a Closed System: The Implied Deny All Traffic

Bringing Order to Chaos

Comparing Basic and Advanced Access Lists

Specifying Standard IP Access Lists

Using the Standard Access List

Netmasks and Wildcard Masks

Implicit Wildcard Masks

Understanding Sequential Rule Processing

Specifying Extended IP Access Lists

Creating Access Lists

Applying Access Lists to Interfaces

Creating and Editing Access List Statements on a TFTP Server

Practice Session

Security and Audit Checklist

Conclusion

16 Basic Traffic Filtering, Part 2

Extended IP Access Lists

Named Access Lists

Implementing Routing Policies

Prefix Lists

Monitoring and Verifying Access and Prefix Lists

Viewing Access List Counters

Viewing IP Accounting

Viewing Access List Counters

Practice Session

Security and Audit Checklist

Conclusion

17 Advanced Traffic Filtering, Part 1

Using Time Ranges

© 2002 by CRC Press LLC

Tải ngay đi em, còn do dự, trời tối mất!