.

Monday, March 11, 2019

Basic Device and Security Configuration Essay

When designing a lucre there are potonic network and pledge phases that whiz ask to consider. Choosing a hostname for each twisting is very important, this allows the user to bop what device they are working on. Configuring ports with a proper IP, subnet, and descriptions are part of the basic configuration of a network device. One needs to consider the security setting for the network devices. There are some basic configurations that unity can choose to use in their configuration. Passwords and a username should be employ for consoling and remote access to every network device. Enable battle crys and encrypting those password are best practices for any form.Configuration of a username and password for practical(prenominal) lines, will help in keeping unloved persons out of your network device along with, a banner upon record into a device. Banners are messages that will display a warning to any unauthorized person looking to access the device. Shutting discomfit o verbold ports in a switch, will keep unwanted clients of the network and mass from just plugging a laptop into the port for access. extraneous access is something to compute about when configuring a device. SSH (Secure Shell) and telnet are two network protocol use to remote access to a device. SSH is a more secure activity that uses higher encryptions of data then telnet does. To generate the SSH linchpin the use of crypto key generate rsa is utilize with a 1024 bit key, creates the most secure key. Remote access is a concern to any engineer and should be taken with the highest priority.Commands Used in Basic Device ConfigurationsCLI masterys that are apply in a switch and in a router are the same. intimately CLI commands are configured in the global configuration mode. Its always good practice to sire with the command erase startup-config, which resulted in the saved NVRAM configuration to be erased. Setting the appropriate hostname for the device is the command hostna me name. By naming ones device, this will let the user know what device they are working in. Passwords helped secure the device for the enable mode, consoling into the device, and remote access. To set a password to access the enable mode, one need to use the command enable secret password.The configuration of a password for consoling into a device, one needs to be in the line con 0 mode and use the command password, the same command is used for remote access but in the line vty 0-15 mode. When using the enable secrete command, the passwords are displayed in clear-cut text. For more security, service password-encryption is used encrypt the password when a argue run command is used to display the running configuration. Enabling SSH indication 2 is a better choice than version 1. SSH version 2 has stronger cryptographic integrity check and bides password changing. If one configurators their device to support SSH, then there are several commands that need to be configured. A userna me name password password command needs to be assigned.The ip domain name domain mycompany.com command is used, followed by crypto key generated rsa command. When the engineer types that command the IOS will prompt one for the number of bits. 512 is the default, however, one can choose a larger number and 1024 bits is recommended. The RSA encryption key is used for authentication and encryption of the SSH data. The transport input telnet ssh command allows telnet and ssh on the virtual lines by being configured in the line vty 0 -15 mode. The interface range interface-interface command is used to make changes in the interface range. One can use this command to shut down all unused ports in a switch. Lastly, the copy run start command was used to copy the recent running configuration to the startup configuration.

No comments:

Post a Comment