Securing administrative access using aaa and radius.
Ccna security lab securing the router for administrative access.
Securing the router for administrative access topology ip addressing table device interface ip address subnet mask default gateway switch port r1 fa0 1 192 168 1 1 255 255 255 0 n a s1 fa0 5 s0 0 0 dce 10 1 1 1 255 255 255 252 n a n a r2 s0 0 0 10 1 1 2 255 255 255 252 n a n a s0 0 1 dce 10 2 2 2 255 255 255 252 n a n a r3 fa0 1 192 168 3 1 255 255 255 0 n a s3 fa0 5.
Securing the router for administrative access.
Configuring cbac and zone based firewalls.
These text files can be used to restore configurations later in the lab.
Configure static routing on the routers step 4.
In part 2 you will.
The most basic form of router access security is to create passwords for the console vty and aux lines.
Configure basic settings for each router step 3.
Configure pc host ip settings step 5.
Configure and encrypt passwords.
Researching network attacks and security audit tools.
Cable the network as shown in the topology step 2.
Configure a login warning banner.
A user is prompted for only a password when.
Configure basic device settingsstep 1.
Save the basic running configuration for the routers as text files on your pc.
Securing administrative access using aaa and radius.
Control administrative access for routers.
Securing administrative access using aaa and radius.
February 16 2020 by prasanna leave a comment.