5.3 Implement hardening routers (5.3.4 Adhere to the steps to harden a…
5.3 Implement hardening routers
5.3.1 Define routers,metrics, algorithms and IOS
Definition of router
A router is a device or, in some cases, software on a computer, that determines the best way for a packet to be forwarded to its destination.
definition of router metrics
A routing metric is calculated by routing algorithms when determining the optimal route for sending network traffic.
A routing algorithm is a set of step-by-step operations used to direct Internet traffic efficiently. When a packet of data leaves its source, there are many different paths it can take to its destination. The routing algorithm is used to determine mathematically the best path to take.
The iOS user interface is based upon direct manipulation, using multi-touch gestures.
5.3.2 Explain routing principles and operating modes.
A routing principles specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route.
Wireless Router Mode
In wireless router/ IP sharing mode, the router connects to the Internet via
n Repeater mode, your router wirelessly connects to an existing wireless network to extend the wireless coverage
Access Point(AP) Mode
n Access Point (AP) mode, the router connects to a wireless router through an Ethernet cable to extend the wireless signal coverage to other network clients.
The Media Bridge mode provides the fastest 802.11ac Wi-Fi connection for multiple media devices simultaneously.
are used to connect computers on a network with cables so as to communicate with each other.
functions the same way as hubs, but they can identify the intended destination of the information that they receive. In general, you should use a switch instead of hub when you have multiple devices.
5.3.3 Identify TCP and UDP server proxy and various tools
The TCP-UDP-proxy is a low precedence policy that allows all outbound TCP and UDP traffic from networks protected by your Firebox.
In the TCP-UDP Proxy Action general settings configuration, you set basic parameters for the TCP-UDP-proxy.
5.3.5 List ways to secure the routers.
Understand the basics of router security
Know your network: Diagram, audit, and document
Protect your router with a firewall and ACLs
Change your passwords and make them complex
Always encrypt sensitive network traffic
5.3.4 Adhere to the steps to harden a router.
Change the default password
Disable IP directed broadcasts
Disable HTTP configuration for the router
Block ICMP ping requests
Disable IP source routing
Determine your packet filtering needs
Establish Ingress and Egress address filtering policies
Maintain physical security of the router
Take the time to review the security logs
5.3.6 Explain router command, router types and routing protocols.
used to view and manipulate the IP routing table in Unix-like and Microsoft Windows operating systems and also in ReactOS. Manual manipulation of the routing table is characteristic of static routing.
A routing protocol specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network.
5.3.7 Apply Access Control List based on security policy.
An access control list policy, or ACL policy, controls what operations a user can perform on the resource and who can perform them.
An ACL policy is composed of one or more entries that include user and group designations and their specific permissions or rights.
ACL policies also provide the authorization service with information to make a yes or no determination for a request to access a protected object.