Deselect Logging Buffer, and then click OK. Click Save on the toolbar. Click Yes in the CCP Write to Startup Config Warning window.
e. Deselect Logging Buffer, and then click OK.
CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 29 of 57 f. Click Yes in the CCP Warning dialog box. g. In the Deliver Configuration to Router window, click Deliver. Click OK in the Commands Delivery Status window.h. Click Save on the toolbar. Click Yes in the CCP Write to Startup Config Warning window.
Step 6: Start the Kiwi Syslog Server. Open the Kiki Syslog Daemon application on your desktop or click the Start button and choose Programs Kiwi Enterprises Kiwi Syslog Daemon. Step 7: Verify that logging to the syslog server is occurring. On the syslog server host PC-A, observe messages as they are sent from R1 to the syslog server. CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 30 of 57 a. Send a test log message to the kiwi syslog server by choosing File Send test message to local host. b. Generate a logging message by shutting down the Serial000 interface on R1 or R2 and then re- enabling it. R1config interface S000 R1config-if shutdown R1config-if no shutdown The Kiwi syslog screen should look similar to the one below. c. What would happen if you shut down the Fa01 interface on R1 do not actually perform this action? This is the connection from the router to the Syslog server and will result in no log messages being received. d. From the R1 global configuration mode, enable the logging of user info when enabling privileged mode and reset the trap level to informational. R1config logging userinfo R1config logging trap informational e. On the Kiwi Syslog Daemon, choose View Clear Display to clear the log display. f. Exit to the login screen, and enable the admin1 view that you created in Part 3 of this lab. Enter the password admin1pass. R1 enable view admin1 Password: Note: You can enable the desired view from the user EXEC prompt. This allows different users to login without having to know the privileged EXEC mode enable secret password. g. Exit to the login screen again, and enable the admin1 view. This time enter the password incorrectly. What message was displayed on the syslog server? R1 enable view admin1 Password: Your screen should look similar to the one below: CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 31 of 57 Part 5: Configure Automated Security Features In Part 5 of this lab, you will do as follows: Restore routers R1 and R3 to their basic configuration. Use AutoSecure to secure R3. Use the CCP Security Audit tool on router R1 to identify security risks. Fix security problems on R1 using the Security Audit tool. Review router security configurations with CCP and the CLI. Task 1: Restore Router R3 to Its Basic Configuration To avoid confusion as to what was already entered and what AutoSecure provides for the router configuration, start by restoring router R3 to its basic configuration. Step 1: Erase and reload the router. a. Connect to the R3 console and log in as admin. b. Enter privileged EXEC mode. c. Erase the startup config and then reload the router. Step 2: Restore the basic configuration. a. When the router restarts, restore the basic configuration for R3 that was created and saved in Part 1 of this lab.b. Issue the show run command to view the current running configuration. Are there any security
Parts
» CCNA Security 1.1 Instructor Lab Manual
» Lab A: Researching Network Attacks and Security Audit Tools
» Lab A: Securing the Router for Administrative Access
» Use the username command to create the user ID with the highest possible privilege level and a
» Issue the undebug all or the no debug ntp all command to turn off debugging.
» Click OK in the Commands Delivery Status window.
» Use the show logging command to see the type and level of logging enabled.
» Save the running config to the startup config using the copy run start command.
» Lab A: Securing Administrative Access Using AAA and RADIUS
» Click Send and you should see a Send Access_Request message indicating the server at
» Clear the log on the WinRadius server by choosing Log Clear from the main menu.
» Lab A: Configuring CBAC and Zone-Based Firewalls
» Issue the show run command to review the current basic configuration on R1.
» Display the Extended ACL named autosec_firewall_acl, which is applied to S000 inbound.
» Display the Extended ACL named autosec_firewall_acl that is applied to S000 inbound.
» Click Finish to complete the Firewall wizard.
» Lab A: Configuring an Intrusion Prevention System IPS Using the CLI and CCP
» From the R1 CLI, verify that the directory is present using the dir flash: or dir flash:ipsdir
» Apply the IPS rule to an interface with the ip ips name direction command in interface
» Verify connectivity between R1 and PC-A, the TFTP server, using the ping command.
» Use the show ip ips all command to see an IPS configuration status summary. To which
» For Protocol, select tftp from the drop-down menu. Enter the IP address of the PC-C TFTP server
» Lab A: Securing Layer 2 Switches Instructor Version
» From the router R1 CLI, use the show interface command and record the MAC address of the
» Set the SPAN source interface using the monitor session command in global configuration mode.
» Lab A: Exploring Encryption Methods Instructor
» Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and CCP
» Verify the IKE policy with the show crypto isakmp policy command.
» Save the running config to the startup config for R1 and R3 using the copy run start command.
» Click the Launch the selected task button to begin the CCP Site-to-Site VPN wizard.
» Lab B: Configuring a Remote Access VPN Server and Client
» In the Command Delivery Status window, click OK. How many commands are delivered? 103 with
» Lab C Optional: Configuring a Remote Access VPN Server and Client
» Lab A: Security Policy Development and Implementation
» Verify that R1 and R3 have made an association with R2 using the show ntp associations
» Choose FastEthernet 01 as the Inside Trusted interface and Serial 001 as the Outside Untrusted
» From PC-A, Telnet to R2 at IP address 10.1.1.2 using the vty line password ciscovtypass.
» If the ipsdir directory is not listed, create it.
» Secure the router running configuration and securely archive it in persistent storage flash.
» Lab A: Configuring ASA Basic Settings and Firewall Using CLI
» Display the ASA file system using the show file system command to determine what prefixes are
» Display the current running configuration using the show running-config command.
» You can configure the ASA to accept HTTPS connections using the http command. This allows
» Issue the show route command to display the ASA routing table and the static default route just
» Save the RSA keys to persistent flash memory using either the copy run start or write mem
» Lab B: Configuring ASA Basic Settings and Firewall Using ASDM
» View this Access Rule in ASDM by choosing Configuration Firewall Access Rules. It appears
» Lab C: Configuring Clientless and AnyConnect Remote Access SSL VPNs Using ASDM
» Enable HTTP access to R1 using the ip http server command in global config mode. Also set
» From the Add Bookmark List window, click Add to open the Add Bookmark window. Enter Web Mail as
» Lab D: Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
» Use the reload command to restart the ASA. This will cause the ASA to come up in CLI Setup
» In the Peer Identity section, select Peer with static IP address and enter the IP address of the
Show more