Securing The Expanded Network: Medium-Sized Switched Network Construction
Securing The Expanded Network: Medium-Sized Switched Network Construction
Expanded
Network
http://vnexperts.net
ICND1 v1.01-1
http://vnexperts.net
ICND1 v1.01-2
Recommended Practices:
New Switch Equipment
Consider or establish organizational security policies.
Secure switch devices:
Secure switch access.
Secure switch protocols.
Mitigate compromises through switches.
http://vnexperts.net
ICND1 v1.01-3
Recommended Practices:
Switch Security
Secure switch access:
Set system passwords.
Secure physical access to the console.
Secure access via Telnet.
Use SSH when possible.
Disable HTTP.
Configure system warning banners.
Disable unneeded services.
Use syslog if available.
http://vnexperts.net
ICND1 v1.01-4
Recommended Practices:
Switch Security (Cont.)
Secure switch protocols:
Trim Cisco Discovery Protocol and use only as needed.
Secure spanning tree.
Mitigate compromises through a switch:
Take precautions for trunk links.
Minimize physical port access.
Establish standard access-port configuration for both unused
and used ports.
http://vnexperts.net
ICND1 v1.01-5
Port Security
ICND1 v1.01-6
ICND1 v1.01-7
VLAN
1
2
3
4
5
6
7
8
9
http://vnexperts.net
Devices
Core Switches, CoreRouter, SwitchX
CoreRouter, RouterA
CoreRouter, RouterB
CoreRouter, RouterC
CoreRouter, RouterD
CoreRouter, RouterE
CoreRouter, RouterF
CoreRouter, RouterG
CoreRouter, RouterH
ICND1 v1.01-8
Summary
Follow recommended practices for securing your switched
topology by using passwords, deactivating unused ports,
configuring authentication, and using port security.
To secure a switch device, you must secure access to the switch
and the protocols that the switch uses.
http://vnexperts.net
ICND1 v1.01-9