TAILIEUCHUNG - Hardening Guidelines for Cisco 3000 Series VPN Concentrators

Cisco’s 3000 series VPN Concentrators continue to be one of its most popular security product offerings. Due to their reliability, fault tolerance, ease of setup, management, and monitoring, they scale well from small remote sites to large enterprise solutions. The default policies shipped with the units allow an administrator to quickly and easily place a unit into production within an hour of unpacking. But, like any sophisticated security appliance, one must carefully review the default policies and be prepared to make an informed decision about what features should remain active and which to disable | Global Knowledge Expert Reference Series ofWhite Papers Hardening Guidelines for Cisco 3000 Series VPN Concentrators 1-800-COURSES Hardening Guidelines for Cisco 3000 Series VPN Concentrators David W. Chapman Jr. Global Knowledge Instructor CISSP-ISSAP CCSI CCNP CCDP CCSP Introduction Cisco s 3000 series VPN Concentrators continue to be one of its most popular security product offerings. Due to their reliability fault tolerance ease of setup management and monitoring they scale well from small remote sites to large enterprise solutions. The default policies shipped with the units allow an administrator to quickly and easily place a unit into production within an hour of unpacking. But like any sophisticated security appliance one must carefully review the default policies and be prepared to make an informed decision about what features should remain active and which to disable. The purpose of this paper is to highlight some of the most important areas where one can increase the overall security posture of the VPN Concentrator through hardening common features such as Administrative Access User Access Network Management Access and Interface Policies. This paper assumes the reader has experience configuring the 3000 series concentrators and is familiar with navigating the menu structure in the webbased GUI and the CLI. For reference this paper was written assuming a Cisco 3005 VPN Concentrator running version of the VPN OS is used. Securing Administrative Access The first area of focus is securing console and remote administration access to the concentrator. If an intruder can sniff your username and password with a protocol analyzer your network can be easily compromised by the eavesdropper. There are two areas in the configuration tree that concern the control of local and remote access to the concentrator Administration Access Rights and Configuration System Management. Securing Access Rights On your concentrator navigate to .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.