Preview

Basic Device and Security Configuration

Better Essays
Open Document
Open Document
1491 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Basic Device and Security Configuration
Basic Device and Security Configuration
Kevin Kormylo, Okoma Mita, Dan O’Donnell
CIT/249
January 12, 2015 Steve Acklin
Basic Device and Security Configuration

When designing a network there are basic network and security configurations that one needs to consider. Choosing a hostname for each device is very important, this allows the user to know what device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are part of the basic configuration of a network device.
One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any network device. Enable passwords and encrypting those password are best practice’s for any engineer. Configuration of a username and password for virtual lines, will help in keeping unwanted persons out of your network device along with, a banner upon logging into a device. Banners are messages that will display a warning to any unauthorized person looking to access the device. Shutting down unused ports in a switch, will keep unwanted clients of the network and people from just plugging a laptop into the port for access.
Remote access is something to think about when configuring a device. SSH (Secure Shell) and telnet are two network protocol used to remote access to a device. SSH is a more secure application that uses higher encryptions of data then telnet does. To generate the SSH key the use of crypto key generate rsa is used with a 1024 bit key, creates the most secure key. Remote access is a concern to any engineer and should be taken with the highest priority.

Commands Used in Basic Device Configurations

CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Anis, I., Hajjar, M., & Hajjar H., (2008). Remote Administration Tools: A Comparative Study. Journal of Theoretical and Applied Information Technology.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called name resolution.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Wicked - is a local network management tool that makes it easy to manage ever-more-complicated network configurations such as VLAN, virtualization, bridging, bonding and IPv6.…

    • 1499 Words
    • 6 Pages
    Better Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Switches and Routers

    • 376 Words
    • 2 Pages

    Switches and routers are key components to operating any network. Switches can break up a large area network into smaller segments. This will free up congestion and provide more bandwidth to each port, which will increase network performance. The first step is to plug into a power source, connect the console port to a computer or modem with UTP cabling and an RJ-45 cable, and use the command line interface (CLI) to configure and manage the switch in user exec mode and privilege exec mode. In most cases, the switch will perform a power on self-test. The manual will indicate the particulars of any failure. One must configure a password because the switch arrives without one. This provides security through the console settings menu and the password configuration option while one may also incorporate an encrypted password option. Entering global configuration through the command line option will change passwords, also. To change the IP configuration, one would choose the [I] key and choose the IP address option and set the Subnet mask and Default gateway. Creating a VLAN requires switching to Global Configuration mode and using vlan vlan# name name_of_vlan command. To add more VLAN ports, go to the Interface Configuration Mode…

    • 376 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays

Related Topics