Please enable JavaScript.
Coggle requires JavaScript to display documents.
Securing network devices - Coggle Diagram
Securing network devices
Three aeas of router security
Router hardening
Physiccal security
Router openrating system and configuration file security
Securing the edge router
DMZ approach
Single router approach
Deffense in depth approach
Secure administrative access
Present legal notification
Authorize action
Log and account for all access
Restrict device accessibility
Authenticate access
Ensure the confidentiality
Secure local and remote Access
Routing protocol authentication
Routing protocol spoofing
Redirect traffic to discard it.
Redirect traffic to create routing loops
Redirect traffic so it can be monitored on an insecure link
Configurung Enhanced Security for Virtual logins
Enable login Enhancements
Enhancing the login process
Configuring login Enhancement Features
Logging failed attempts
Recovering a router password
Configuring Privilege levels
Limitations of privilege levels
Limiting command Availability
Configuring and assigning privilege levels
Configuring Secure Administrative Access
Secret password algorithms
Strong passwords
Increasing Access Security
Securing line access
Using syslog for network Security
Syslog message (cont.)
Syslog operation
Syslog server
Logging butfer
Console line
Terminal line
Security levels
Syslog Systems