Securing Cisco Routers
Terms you'll need to understand:
-
Types of threats
-
Threat mitigation
-
Console access
-
VTY access
-
Authentication methods
-
Types of services
-
Access control lists (ACLs)
-
Threat mitigation using ACLs
Techniques you'll need to master:
-
Securing console access
-
Securing VTY access
-
Securing passwords
-
Securing Simple Network Management Protocol (SNMP)
-
Disabling router services and interfaces
-
Following rules for creating ACLs
-
Configuring ACLs for threat mitigation
Introduction
In this chapter, you will learn about all the different ways you can secure a Cisco router from hackers and out-of-band threats. We discuss the different services you need to know when configuring a router.
We also delve into configuring access lists and the different access lists that are available to you as a network engineer that you can use to protect your network backbone.
Threat mitigation is an important aspect of network security, and as a security expert, it is your prime objective to ensure that you protect your network and mitigate threats that arise.