| 0 comments ]

Securing the Cisco IOS Image and Configuration Files

Add a note here The Cisco IOS resilient configuration feature enables a router to secure and maintain a working copy of the running image and configuration so that those files can withstand malicious attempts to erase the contents of persistent storage (NVRAM and flash storage).

Add a note hereA great challenge for network operators is the total downtime that is experienced after a router has been compromised and its operating software and configuration data are erased from its persistent storage. The operator must retrieve an archived copy (hopefully one is available) of the configuration and a working Cisco IOS image to restore the router. Recovery must then be performed for each affected router, adding to the total network downtime.

Add a note hereThe Cisco IOS resilient configuration feature is intended to speed up the recovery process. This feature maintains a secure working copy of the router image and the startup configuration at all times. The user cannot remove these secure files. This set of Cisco IOS image and router running configuration files is referred to as the bootset.

Add a note hereThe command sequence to save a primary bootset to a secure archive in persistent storage is as follows:

Add a note here Step 1

Add a note hereRouter> enable

Add a note here Step 2

Add a note hereRouter# configure terminal

Add a note here Step 3

Add a note hereRouter(config)# secure boot-image

Add a note here Step 4

Add a note hereRouter(config)# secure boot-config

Add a note here Step 5

Add a note hereRouter(config)# end

Add a note here Step 6

Add a note hereRouter# show secure bootset

Add a note here Table 2-6 describes the key commands that are required to secure the Cisco IOS image and running configuration using the secure boot-image command:

Add a note hereR1(config)# secure boot-image
R1(config)# secure boot-config
Add a note here Table 2-6: secure Commands
Open table as spreadsheet

Add a note hereCommand

Add a note hereDescription

Add a note here secure boot-image

Add a note hereThis command enables Cisco IOS image resilience. When turned on for the first time, the running image (as displayed in the show version command output) is secured, and a syslog entry is generated. This command functions properly only when the system is configured to run an image from a disk with an Advanced Technology Attachment (ATA) interface. Images that are booted from a TFTP server cannot be secured. Because this command has the effect of “hiding” the running image, the image file is not included in any directory listing of the disk.

Add a note hereIf the router is configured to boot with Cisco IOS resilience and an image with a different version of Cisco IOS is detected, a message similar to this is displayed at boot:

Add a note here“ios resilience :Archived image and configuration version 12.2 differs from running version 12.3”

Add a note here secure boot-config

Add a note hereThis command takes a snapshot of the router running configuration and securely archives it in persistent storage.

Add a note hereSecured files do not appear in the output of a dir command that is issued from an executive shell because the Cisco IOS file system prevents the secure files in a directory from being listed. ROM monitor mode does not have any such restriction and can list and boot secured files. Because the running image and running configuration archives are not visible in the output from the Cisco IOS command dir, use the show secure bootset command to verify the archive existence.

Add a note here Example 2-16 shows an example of the show secure bootset command output. This command is important to verify that the Cisco IOS image and configuration files have been properly backed up and secured.

Add a note here Example 2-16: show secure bootset Command Output

Add a note hereR1# show secure bootset
IOS resilience router id FHK085031MD

IOS image resilience version 12.3 activated at 05:00:59 UTC Fri Feb 10 2006
Secure archive flash:c1841-advsecurityk9-mz.123-14.T1.bin type is image (elf) []
file size is 17533860 bytes, run size is 17699528 bytes
Runnable image, entry point 0x8000F000, run from ram

IOS configuration resilience version 12.3 activated at 05:01:02 UTC Fri Feb 10 2
006
Secure archive flash:.runcfg-20060210-050102.ar type is config
configuration archive size 4014 bytes

Configuring Enhanced Support for Virtual Logins

Add a note here The Cisco IOS login enhancements feature allows you to better secure your Cisco IOS devices when creating a virtual connection, such as Telnet, SSH, or HTTP. In addition, you can slow down dictionary attacks and thereby protect your router from a possible DoS attack.

Add a note hereTo better configure security when opening a virtual login connection, you should configure the login process with the following:

  • Add a note hereDelays between successive login attempts

  • Add a note hereLogin shutdown if DoS attacks are suspected

  • Add a note hereGeneration of system logging messages for login detection

Add a note here Delays Between Successive Login Attempts

Add a note hereA Cisco IOS device can accept virtual connections as fast as it can process these connections. Introducing a delay between login attempts helps to protect your router from a possible dictionary attack. You can enable delays in one of the following ways:

  • Add a note hereThe login block-for command: You must enter this command before issuing the login delay command. However, if you enter only the login block-for command, a login delay of 1 second is automatically enforced.

  • Add a note hereThe login delay command: This command enables you to specify the number of seconds to delay between login attempts.

  • Add a note hereThe auto secure command: If you enable the AutoSecure feature, a login delay of 1 second is automatically enforced.

Add a note here Login Shutdown if DoS Attacks Are Suspected

Add a note hereIf the configured number of connection attempts fails within a specified time period, the Cisco IOS device does not accept any additional connections for a period of time that is called the quiet period. Hosts that are permitted by a predefined access control list (ACL) are excluded from the quiet period.

Add a note hereYou can specify the number of failed connection attempts that trigger the quiet period using the command login block-for in global configuration mode. You can specify the predefined ACL that is excluded from the quiet period using the command login quiet-mode access-class command in global configuration mode.

Add a note hereThis functionality is disabled by default, and it is not enabled if the AutoSecure feature is enabled.

Add a note here Generation of System Logging Messages for Login Detection

Add a note here After the router switches to and from quiet mode, logging messages are generated. Also, if they are configured, logging messages are generated upon every successful or failed login request.


Note

Add a note hereWhen a session is running in quiet mode, messages sent to the sessions are not displayed on the terminal.

Add a note hereYou can use the command login on-success in global configuration mode to generate log messages for successful login requests. The login on-failure command generates logs for failed login requests.

Add a note hereLogging messages for failed login attempts are automatically enabled when the auto secure command is issued, but are not automatically enabled for successful login attempts via the auto secure command.

Add a note hereAll login enhancement features are disabled by default. You must issue the login block-for command, which enables default login functionality before using any other login commands. After you enable the login block-for command, the following defaults are enforced:

  • Add a note hereThe default login delay is one second.

  • Add a note hereAll login attempts made using Telnet, SSH, and HTTP are denied during the quiet period; that is, no ACLs are exempt from the login period until the login quiet-mode access-class command is issued.

Add a note hereUse the following command sequence to configure your Cisco IOS device for login parameters that help detect suspected DoS attacks and slow down dictionary attacks.

Add a note here Step 1

Add a note hereRouter> enable

Add a note here Step 2

Add a note hereRouter# configure terminal

Add a note here Step 3

Add a note hereRouter(config)# login block-for seconds attempts tries within seconds

Add a note here Step 4

Add a note hereRouter(config)# login quiet-mode access-class {acl-name | acl-number}

Add a note here Step 5

Add a note hereRouter(config)# login delay seconds

Add a note here Step 6

Add a note hereRouter(config)# login on-failure log [every login]

Add a note here Step 7

Add a note hereRouter(config)# login on-success log [every login]

Add a note hereThese commands are discussed in details in the next pages.

Add a note here Table 2-7 describes the commands required to set the parameters for the quiet period.

Add a note here Table 2-7: Enabling Support for Virtual Logins
Open table as spreadsheet

Add a note hereCommand

Add a note hereDescription

Add a note here login block-for seconds attempts tries within seconds

Add a note hereThis command must be issued before any other login command can be used.

Add a note hereThis command configures your Cisco IOS device for login parameters that help provide DoS detection.

Add a note here login quiet-mode access-class {acl-name | acl-number}

Add a note here(Optional) This command specifies an ACL that is to be applied to the router when it switches to quiet mode. The devices that match a permit statement in the ACL are exempt from the quiet period.

Add a note here Example 2-17 shows a configuration that will disable login for 150 seconds if more than 2 login failures occur within 100 seconds. This will help provides DoS detection. Example 2-17 also shows configuration that invokes an ACL that is named myacl. If this command is not enabled, all login requests would be denied during quiet mode.

Add a note here Example 2-17: Example of the login block-for and login quiet-mode Commands

Add a note hereR1(config)# login block-for 150 attempts 2 within 100
R1(config)# login quiet-mode access-class myacl

Add a note hereTo enable a login delay, use the login delay seconds command. To log the successful and failed attempts to login, use the following commands:

Add a note here
login on-failure log [every login]
login on-success log [every login]

Add a note hereThen, use the show login command to verify that the login block-for command is issued. Example 2-18 shows that the router is configured to block login hosts for 100 seconds if more than 15 (16 or more) login requests fail within 100 seconds. Five login requests have already failed.

Add a note here Example 2-18: show login Command Output

Add a note hereRouter# show login
A default login delay of 1 second is applied.
No Quiet-Mode access list has been configured.
All successful login is logged and generate SNMP traps.
All failed login is logged and generate SNMP traps.

Router enabled to watch for login Attacks.
If more than 15 login failures occur in 100 seconds or less, logins will be
disabled for 100 seconds.

Router presently in Watch-Mode, will remain in Watch-Mode for 95 seconds.
Present login failure count 5.

Add a note here Example 2-19 is an output from the show login command to verify that the router is in quiet mode. This output shows that the login block-for command was configured to block login hosts for 100 seconds if more than 2 (3 or more) login requests fail within 100 seconds.

Add a note here Example 2-19: show login Command Output to Verify Quiet Mode

Add a note hereRouter# show login

A default login delay of 1 second is applied.
No Quiet-Mode access list has been configured.
All successful login is logged and generate SNMP traps.
All failed login is logged and generate SNMP traps.
Router enabled to watch for login Attacks.
If more than 2 login failures occur in 100 seconds or less, logins will be
disabled for 100 seconds.

Router presently in Quiet-Mode, will remain in Quiet-Mode for 93 seconds.
Denying logins from all sources.

Add a note here Example 2-20 displays output from the show login failures command indicating all failed login attempts on the router.

Add a note here Example 2-20: show login failures Command Output

Add a note hereRouter# show login failures


Information about login failures with the device

Username Source IPAddr lPort Count TimeStamp
try1 10.1.1.1 23 1 21:52:49 UTC Sun Mar 9 2003
try2 10.1.1.2 23 1 21:52:52 UTC Sun Mar 9 2003

Add a note here Configuring Banner Messages

Add a note hereYou should use banner messages to warn would-be intruders that they are not welcome on your network. Banners are very important, especially from a legal perspective.

Add a note hereChoosing what to place in your banner messages is important and should be reviewed by legal counsel before placing them on your routers. Intruders could have an argument in court cases if they were to argue that they have encountered a warning banner mentioning “Welcome to this site” or the like. All banners should rather warn that the access is strictly reserved to authorized personnel.

Add a note hereBanners are disabled by default, and you must explicitly enable them. Use the banner command from global configuration mode to specify appropriate messages.

Add a note here Table 2-8 describes the parameters for the banner command, the syntax for which is as follows:

Add a note here
banner {exec | incoming | login | motd | slip-ppp} d message d
Add a note here Table 2-8: banner Command Parameters
Open table as spreadsheet

Add a note hereParameters

Add a note hereDescription

Add a note here exec

Add a note hereThis parameter specifies and enables a message to be displayed when an EXEC process is created on the router (an EXEC banner).

Add a note here incoming

Add a note hereThis parameter specifies and enables a banner to be displayed when there is an incoming connection to a terminal line from a host on the network.

Add a note here login

Add a note hereThis parameter specifies and enables a customized banner to be displayed before the username and password login prompts.

Add a note here motd

Add a note hereThis parameter specifies and enables a message-of-the-day (MOTD) banner.

Add a note here slip-ppp

Add a note hereThis parameter specifies and enables a banner to be displayed when a Serial Line Internet Protocol (SLIP) or PPP connection is made.

Add a note here d

Add a note hereThis parameter represents the delimiting character of your choice (a pound sign, #, for example). You cannot use the delimiting character in the banner message.

Add a note here message

Add a note hereThis parameter represents message text. You can include tokens in the form $(token) in the message text. Tokens are replaced with the corresponding configuration variable.

Add a note hereThe following is a list of valid tokens for use within the message section of the banner command:

  • Add a note here $(hostname): Displays the hostname for the router

  • Add a note here $(domain): Displays the domain name for the router

  • Add a note here $(line): Displays the vty or tty (asynchronous) line number

  • Add a note here $(line-desc): Displays the description that is attached to the line

Add a note hereYou can also use the Cisco SDM to configure banner messages.

Add a note here Example 2-21 shows the configuration of a MOTD banner.

Add a note here Example 2-21: Configuring MOTD Banner

Add a note hereR1(config)# banner motd %
WARNING: You are connected to $(hostname) on the Cisco Systems, Incorporated
network.
Unauthorized access and use of this network will be vigorously prosecuted. %

Add a note here Introducing Cisco SDM

Add a note here Cisco Router and Security Device Manager (SDM) is an intuitive, web-based tool that enables you to easily and reliably deploy and manage the services on Cisco IOS routers. Cisco SDM simplifies router and security configuration through smart wizards, which help users quickly and easily deploy, configure, and monitor Cisco routers without requiring knowledge of the Cisco IOS Software CLI.

Add a note hereCisco SDM offers users the following benefits:

  • Add a note hereSmart wizards in Cisco SDM have built-in intelligence about recommended Cisco IOS configurations for different use scenarios.

  • Add a note hereCisco SDM can recommend an optimum security configuration for a router that is based on the detection of such areas as LAN and WAN connections, ACLs, Network Address Translation (NAT), IP Security (IPsec) policies, and firewall rules.

  • Add a note hereCisco SDM includes features such as WAN and virtual private network (VPN) troubleshooting, router security audit, and one-step lockdown that leverage the integration of routing, WAN access, and security technology.

  • Add a note hereFor novices, Cisco SDM helps users that have limited CLI knowledge and security expertise to configure basic network security implementations. For experts, Cisco SDM has power tools that improve productivity.

  • Add a note hereAs a device manager, Cisco SDM manages one device at a time.

  • Add a note hereCisco SDM supports Cisco IOS Software Release 12.2(11)T6 or later.

  • Add a note hereCisco SDM has no impact on router DRAM or CPU.

  • Add a note hereCisco SDM works in conjunction with other management tools and the CLI over Telnet.

Add a note hereRefer to the Cisco Router and Security Device Manager Version 2.4 User’s Guide for details on supported platforms and Cisco IOS Software requirements.


Note

Add a note hereTo support Cisco SDM, make sure your security policy does not prohibit enabling a web server daemon on routers. Cisco SDM requires HTTP or HTTPS to be enabled.

Add a note here Supporting Cisco SDM and Cisco SDM Express

Add a note hereCisco SDM is a web-based tool that is supported on Microsoft Windows-based PC platforms. Refer to the Cisco Router and Security Device Manager Quick Start Guide at http://tinyurl.com/5n2rb7 for details on the operating systems and web browsers that Cisco SDM supports.

Add a note hereCisco SDM is factory installed on some router models. If it is not installed on your router, it will either be available on a CD-ROM that is included with new routers or you can download it from Cisco.com. The install options allow you to install Cisco SDM Express, Cisco SDM, or both.


Note

Add a note hereAs its name implies, Cisco SDM Express is a lightweight version of Cisco SDM that offers quick and easy router deployment for basic WAN access configurations. It is ideal as a router deployment tool for nonexpert users.


Note

Add a note hereAs a rule of thumb, SDM Express is factory installed on router flash memory, and a Cisco SDM CD is bundled with the router, and can be sometimes preinstalled in flash. Currently, Cisco SDM ships with all new Cisco 850 series, Cisco 870 series, and Cisco 1800, 2800, and 3800 series ISRs.

Add a note hereRefer to the latest Cisco SDM datasheet, at Cisco.com, to confirm whether Cisco SDM is installed in flash.


Note

Add a note hereThe Cisco SDM CD-ROM or the Cisco SDM image from the Cisco IOS Software Center (http://www.cisco.com/pcgi-bin/tablebuild.pl/sdm) supports the installation of Cisco SDM on a PC hard disk or router flash memory. When Cisco SDM is installed on a PC, no files are required in the router flash memory, and Cisco SDM can manage an installed base of Cisco routers that may not have enough flash memory space to load Cisco SDM files.

Add a note hereIf the router is an existing router and is not configured with the Cisco SDM default configuration, you must configure the following services on the router for Cisco SDM to access the router properly:

  • Add a note hereSet up a username and password that has privilege level 15:

    Add a note hereusername name privilege 15 secret password
  • Add a note hereEnable the HTTP server:

    Add a note hereip http server
    ip http authentication local
    ip http secure-server (for enabling HTTPS access to Cisco SDM)
    ip http timeout-policy idle 600 life 86400 request 1000
  • Add a note hereDefine the protocol to use to connect to the Telnet and Secure Shell (SSH) vty lines:

    Add a note hereline con 0
    login local
    line vty 0 4
    privilege level 15
    login local
    transport input telnet ssh
    line vty 5 15
    privilege level 15
    login local
    transport input telnet ssh

Note

Add a note hereTo enable HTTP over SSL, you do not need the ip http server command, but the ip http secure-server command is needed.

Add a note here When you want to run Cisco SDM from your router, for Cisco SDM Version 2.2a and later, the following files must be loaded on the router flash memory:

  • Add a note heresdmconfig-modelxxx.cfg, where modelxxx is the model number of the router (this is, the manufacture default configuration file for the router)

  • Add a note heresdm.tar

  • Add a note herees.tar (for Cisco SDM Express and optional once Cisco SDM is installed)

  • Add a note herecommon.tar

  • Add a note herehome.shtml

  • Add a note herehome.tar

Add a note hereThe file wlanui.tar is required if there are wireless interfaces to manage. Example 2-22 shows the content of the flash of a Cisco 2800 router.

Add a note here Example 2-22: Files Required to Run Cisco SDM from a Router

Add a note hererouter# show flash
-#- –length– ––-date/time––– path
1 19312988 Dec 13 2005 01:23:50 +00:00 c2800nm-advsecurityk9-mz.124-5.bin
2 3317 Feb 8 2006 00:00:30 +00:00 startup.config
3 1646 Feb 8 2006 18:31:50 +00:00 sdmconfig-2811.cfg
4 4049920 Feb 8 2006 18:32:32 +00:00 sdm.tar
5 812544 Feb 8 2006 18:32:56 +00:00 es.tar
6 1007616 Feb 8 2006 18:33:14 +00:00 common.tar
7 1038 Feb 8 2006 18:33:24 +00:00 home.shtml
8 113152 Feb 8 2006 18:33:42 +00:00 home.tar

Add a note here Launching Cisco SDM Express

Add a note hereOn a new router, you can access Cisco SDM Express from your PC web browser by going to http://10.10.10.1. The factory default router configuration file that comes with Cisco SDM configures the router Ethernet IP address to 10.10.10.1.

Add a note hereIf the proper files are loaded on the router flash memory, when you access the router for the first time, the Cisco SDM Express wizard appears. Just enter the required information, noting that some fields provide a default value.

Add a note hereWhen you launch Cisco SDM from the router, Cisco SDM checks the router configuration. If certain features are not configured, Cisco SDM Express launches instead. For example, when Cisco SDM sees the default configuration file on the router (sdmconfig-modelxxx.cfg, where modelxxx is the model number of the device), Cisco SDM Express is launched.

Add a note here After you have completed the initial router configuration with Cisco SDM Express, the Cisco SDM Express Wizard is not presented again. If you need to make changes, you can edit the configurations using the full Cisco SDM tool.

Add a note hereYou can find details about Cisco SDM Express in the Cisco SDM Express 2.4 User’s Guide at http://tinyurl.com/47w5rk.

Add a note here Launching Cisco SDM

Add a note hereSDM can run either as an application installed on your PC or from the router’s flash through your PC’s browser.

Add a note hereTo launch Cisco SDM from an administrator PC, choose Start > Programs (All Programs) > Cisco Systems > Cisco SDM > Cisco SDM. Next, provide the IP address of the LAN interface on the router, as configured previously with the Cisco SDM Express Wizard, in the SDM Launcher window.

Add a note hereTo launch Cisco SDM from the router flash memory, open an HTTP or HTTPS connection to the IP address of the Ethernet interface on the router. Follow the prompts, including entering your administrator credentials (username and password), to reach the Cisco SDM home page. Table 2-9 shows the browser requirements to run SDM.

Add a note here Table 2-9: Browser Requirements
Open table as spreadsheet

Add a note hereSoftware Type

Add a note hereSpecifications

Add a note hereBrowser

Add a note hereMicrosoft Internet Explorer 5.5 or later.

Add a note hereNetscape Navigator 7.1 or 7.2.

Add a note hereMozilla Firefox 1.0.5.

Add a note hereJava software

Add a note hereJava Virtual Machine (JVM) built-in browsers are required.

Add a note hereJava plug-in Java 2 Standard Edition (J2SE) (Java Runtime Environment [JRE] Version 1.4.2_05 or later).

Add a note here Navigating the Cisco SDM Interface

Add a note hereThe home page, shown in Figure 2-5, appears each time you successfully log in to Cisco SDM.

Click to collapse
Add a note hereFigure 2-5: SDM Home Page

Add a note hereNavigating the Cisco SDM user interface on the home page is done through the toolbar. Two of the modes on the toolbar, Configure mode and Monitor mode, are also used to navigate the interface. To select a mode, click the corresponding button in the toolbar. For each mode, a task panel is available that shows the wizard options available for that mode.

Add a note hereConfigure mode provides wizards for the novice. Figure 2-6 shows the Configure mode task bar. More experienced users are able to perform tasks in any order and without the wizards. Monitor mode allows you to view the current status of the router.

Click to collapse
Add a note hereFigure 2-6: Configure Mode: Task Bar

Add a note here Upon SDM startup, it synchronizes with the router running configuration. Subsequent commands applied using the CLI are not automatically reflected in SDM. In this case, you can use the Refresh button to resynchronize the router running configuration with Cisco SDM.

Add a note hereClick the Save button to save the running configuration to the startup configuration on the router.

Add a note here Cisco SDM Wizards in Configure Mode

Add a note hereWhen you access a wizard, a dialog box appears if there is a new configuration that is not yet reflected in Cisco SDM. The dialog box states that you must perform a Refresh or Deliver before entering wizard mode. If you click Refresh, the running configuration of the router is reloaded into Cisco SDM. If you click Deliver, any work done in Cisco SDM is copied to the running configuration of the router. Click either the Refresh or Deliver button to perform the required function.

Add a note hereWhen the requested page appears, such as the Configure mode page, the wizards display on the left. In general, the following are functions that are available from the wizards in Configure mode:

  • Add a note hereThe Interfaces and Connections window displays the router interfaces and connections. The window also enables you to add, edit, and delete connections and to enable or disable the following types of connections:

    Add a note hereThe LAN Wizard configures the LAN interfaces and DHCP.

    Add a note hereThe WAN Wizard configures PPP, Frame Relay, and High-Level Data Link Control (HDLC) WAN interfaces.

  • Add a note hereFirewall and ACL provide two wizards: a basic firewall wizard with inside and outside interfaces, and an advanced firewall wizard with inside, outside, and DMZ interfaces.

  • Add a note hereFor VPN, there are four wizards: IPsec VPN (site-to-site VPN), Cisco Easy VPN Remote, Cisco Easy VPN Server, and Dynamic Multipoint VPN (DMVPN).

  • Add a note hereThe Security Audit task contains two wizards: the Router Security Audit and a One-Step Lockdown Wizard.

  • Add a note hereThe Routing window displays the configured static routes and the configuration of the routing protocols. From this window, you can configure the Routing Information Protocol (RIP), Open Shortest Path First (OSPF), or Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol parameters, review the routes, add new static routes, edit existing static routes, and delete static routes.

  • Add a note hereThe NAT window enables you to view NAT rules, view address pools, and set translation timeouts. From this window, you can also designate interfaces as inside or outside interfaces.

  • Add a note hereStarting with Cisco IOS Software Release 12.3(8)T, the Intrusion Prevention window allows you to enable or disable Cisco IOS Intrusion Prevention System (IPS) features on any interface in the router. If a Cisco Intrusion Detection System (IDS) Access Router Network Module (Cisco IDS Network Module) is installed in the router, this window displays basic status information for the module. If the Cisco IDS Network Module has been configured, you can also start the Cisco IDS Device Manager (IDM) software on the Cisco IDS Network Module and select the router interfaces that you want the Cisco IDS Network Module to monitor from this window.


    Note

    Add a note hereIf Cisco SDM detects that the Cisco IDS Network Module has not been configured, it prompts you to open a session to the network module so that you can configure it. You can use Telnet or SSH for this session.

  • Add a note hereThe Quality of Service window allows you to configure QoS rules and policies for your router.

  • Add a note hereThe NAC window is used to protect data networks from computer viruses by assessing the health of client workstations, ensuring that they receive the latest available virus signature updates, and controlling their access to the network.

Add a note hereWhen you finish using a wizard, all the changes are automatically delivered to the router using generated CLI commands. You can choose whether to copy the running configuration to the startup configuration file.

Add a note hereFor additional details on these tasks, refer to the Cisco Router and Security Device Manager Version 2.4 User’s Guide.

Configure Mode: Advanced Configuration

Add a note hereAt the bottom of the Cisco SDM configuration task bar is an Additional Tasks option, shown in Figure 2-7. This option allows you to configure many advanced options for the router, such as router properties, router access, DHCP settings, Domain Name System (DNS) and Dynamic DNS (DDNS) settings, ACLs, AAA configuration, router provisioning, and IEEE 802.1x. Click Additional Tasks to enter this mode and configure one of these options. You can perform tasks in any order, and you can always see existing configurations.

Click to collapse
Add a note hereFigure 2-7: Configure Mode: Additional Task Options

Add a note hereYou can choose Additional Tasks > Router Properties to define the overall attributes of the router, such as the router name, domain name, password, SNMP status, DNS server address, user accounts, router log attributes, vty settings, SSH settings, and other router access security settings.

Add a note hereAfter you click Additional Tasks, you can use the Router Access window to create and manage security policies to access and manage the router. You can create, edit, and delete role-based user access accounts and set up management access policies to limit the Telnet, SNMP, or Cisco SDM access to the router from specific hosts or networks.

Add a note hereFor additional details on the features and functions available from the Additional Tasks windows, refer to the Cisco Router and Security Device Manager Version 2.4 User’s Guide.

Monitor Mode

Add a note hereFrom Monitor mode, you can view information about your router, including the router interfaces, firewalls, and any active VPN connections. You can also view any messages in the router event log. Figure 2-8 shows Monitor mode.

Click to collapse
Add a note hereFigure 2-8: Configure Mode: Task Bar

Add a note here The monitor function includes the following information:

  • Add a note hereThe Monitor Overview window provides the router status, including a list of the error log entries.

  • Add a note hereInterface Status is used to select the interface and conditions to monitor (for example, packets and errors and whether you want to monitor them in or out).

  • Add a note hereFirewall Status displays a log with the number of entry attempts that the firewall denied.

  • Add a note hereVPN Status displays statistics about active VPN connections.

  • Add a note hereQoS displays QoS policy information on the interfaces.

  • Add a note hereNAC Status (not shown in Figure 2-8) displays information such as the number of active Network Admission Control (NAC) sessions on the routers.

  • Add a note hereLog contains the event log categorized by severity level, such as a UNIX syslog service.


0 comments

Post a Comment