Chapter 2 Flashcards
The edge router is…
the last router between the internal network and an untrusted network, such as the Internet.
Strong password guidelines (6)
- 10 or more characters
- mix of uppercase and lowercase letters, numbers, symbols and spaces
- avoid passwords based on easily identifable pieces of information
- misspell
- change often
- do not leave in obvious places
Commands to increase password security
- security passwords min-length
- service password-encryption
- exec-timeout minutes [seconds]
How do you disable the exec process for a specific line?
no exec
The enable secret password uses this kind of hash and thus is not safe to use
MD5
A command to configure type 9 encryption using plaintext password?
enable algorithm-type
A command to create a user with a type 9 encryption
username name algorithm-type
How to configure a username/password authentication on a line
login local
Virtual Login Security Enhancements
- Implement delays between successive login attempts
- Enable login shutdown if DoS attacks are suspected
- Generate system-logging messages for login detection.
A period of time when login is blocked
Quiet period
How to specify a banner?
banner
How to disable logins after a specifed nubmer of failed login attempts?
login block-for seconds attempts tries within seconds
How to specify allowed hosts for a quiet period?
login quiet-mode access-class (acl-name | acl-number)
How to specify a number of seconds between unsuccessful login attempts?
login delay seconds
How to log successful and unsuccessful logins?
login on-success log [every login]
login on-failure log [every login]
login block-for operates in two modes…
Normal mode (counting failed logins) and Quiet mode(all login attempts denied for the time specifed in login block-for)
What is a default delay between logins when a login block-for is invoked?
1 sec
How do you generate a log message when the login failure rate is exceeded?
security authentication failure rate
A command used for login block-for verification?
show login
show login with additional information on failed attempts
show login failures
Five steps to configure SSH
1.ip domain-name domain-name
2.crypto key generate rsa general-keys modulus modulus-size
3.ip ssh version 2
4.username name algorithm-type scrypt secret secret
5.login local
transport input ssh
(on a line)
To verify SSH and display the generated keys…
show crypto key mypubkey rsa
To overwrite an existing key pair…
crypto key zeroize rsa
To verify the optional SSH command settings…
show ip ssh