Lab 2.3.5 Configure General Router Security: Objective
Lab 2.3.5 Configure General Router Security: Objective
Lab 2.3.5 Configure General Router Security: Objective
Objective
In this lab, the students will examine the following objectives:
Scenario
Many overlooked security features of the router come at no additional expense whatsoever. These
features are often misconfigured or overlooked, because they are not traditional security features.
Passwords are the primary defense against unauthorized access to the router.
Leaving a console unattended can cause serious problems, especially if the user is logged in as a
privileged user. The use of console timeouts can control how long the console will remain logged in
after a period of inactivity.
This lab also covers the commands used to establish password protection and configure privilege
levels. Password protection allows a network security administrator to restrict access to a network or
a network device. Privilege levels allow a security administrator to define what commands various
users can issue after they have logged in to a network device. This is very important in larger
networks where the IT staff needs access to network devices with different levels of access.
In some jurisdictions, civil or criminal prosecution of hackers who break into the systems are made
much easier if a banner message informing unauthorized users that their use is, in fact,
unauthorized.
1 - 10
Topology
This figure illustrates the lab network environment.
Preparation
Begin with the standard lab topology and verify the starting configuration on the pod router. Test the
connectivity between the pod routers. Access the perimeter router console port using the terminal
emulator on the Windows 2000 server. If desired, save the router configuration to a text file for later
analysis. Refer back to the Student Lab Orientation if more help is needed.
If the Cisco IOS router CIS Router Analysis Tool (RAT) version 2.1 is not installed on the student PC,
contact the instructor to get the RAT tool or download and install the RAT tool available at
http://www.cisecurity.org.
2 - 10
Console cable
HyperTerminal
Additional materials
Further information regarding the objectives covered in this lab can be found at the following
websites:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_ch
apter09186a00800ca7cd.html
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_configuration_guide_ch
apter09186a00800d984e.html
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_command_summary_ch
apter09186a00800eeadc.html
http://www.cisecurity.org/
Command list
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is
needed during the lab exercise.
Command
3 - 10
Description
exec-timeout
enable
login local
service password-encryption
show privilege
transport input
Command
Description
the router.
auto secure
c.
To verify the enable password, exit out of the router completely using the exit command.
After logging out, reconnect to the user level (RouterP>) and then enter the enable
command. A prompt will appear asking for a password. Enter the recently configured enable
password. If the password is entered correctly, access will be granted to the privileged
EXEC mode (RouterP#).
To view the enable password, use the show running-config command in the privileged
EXEC mode.
a. Is the enable password in the output? If so, write the output of that line.
4 - 10
i.
In the global configuration mode, use the enable secret password command to set an enable
secret password. Set the password to class using the following command:
RouterP(config)#enable secret class
Is the enable password encrypted? Is the enable secret password encrypted? How is the enable
secret password displayed?
Note: After setting a password using the enable secret command, a password set using the
enable password command works only if the enable secret is disabled or an older version
of Cisco IOS software is being used, such as when running an older rxboot image.
View the running configuration again and look for the line no service password-encryption.
This means the password encryption service is disabled and indicates that this is the default
setting.
ii.
Enable the password encryption service by entering the service passwordencryption command:
RouterP(config)#service password-encryption
Are both the enable password and enable secret passwords encrypted?
What encryption level is used to encrypt the enable password? Is this secure?
5 - 10
b. Now allow Telnet on the vty using the transport input Telnet command to enable it.
What is the configuration mode required to configure this feature?
A username and password pair must be configured in global configuration mode. Configure the
username bob to be used with password cisco4me.
i.
Was it successful?
ii.
Exit Telnet and connect again. Try to access the router by using another username or
another password.
6 - 10
ii.
iii. Define an enable secret of pswd10 for level 10 by entering the following command:
RouterP(config)#enable secret level 10 pswd10
What are the available arguments for the enable secret level 10 command?
Displaying current privilege level
d. To verify the current privilege level, enter the show privilege command.
What privilege level is shown?
To enter into a specific privilege level, use the enable level command. Exit out of the
router and then reconnect. Enter the following commands to enter privilege level 10:
RouterP>enable 10
Password: pswd10
RouterP#
How can current privilege level be displayed? What is the current privilege level?
Using the debug ? command, what debug options are available at level 10?
7 - 10
In the above commands, specific debug commands were allowed for anyone logging in with
privilege level 10.
f.
Exit the router and return to privilege level 10. After the current privilege level of 10 is
confirmed, verify the previously configured privilege level 10 commands. Enter the following
commands to verify the defined privileges enter the following commands:
RouterP#debug ?
RouterP#debug ppp ?
What are the available parameters for the debug ppp ? command?
Log back into the router with privilege level 15. Then compare the debug ? and debug ppp ?
command output to that of privilege level 10.
What is the difference, if any?
By default, what is the privilege level when logging in with the enable command without
specifying a level?
8 - 10
c.
Bogons are prefixes that should never appear in the Internet routing table
or as a source address in any packets that are received. For more
information, refer to FNS Module 3 or http://www.cymru.com/Bogons/index.html
Step 10 Analyze the Router Configuration Using the Router Analysis Tool
a. Export the running config on the pod router using ftp or tftp
b. Open the file with Notepad to verify the configuration.
c.
Enter the command to analyze the fns.txt config file previously saved.
C:\CIS\RAT\bin>rat fns.txt
auditing fns.txt...
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/common.conf/
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/cis-level-1.conf/
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/cis-level-2.conf/
Checking: fns.txt
done checking fns.txt.
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/common.conf/
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/cis-level-1.conf/
Parsing: /C:\CIS\RAT/etc/configs/cisco-ios/cis-level-2.conf/
ncat_report: writing fns.txt.ncat_fix.txt.
ncat_report: writing fns.txt.ncat_report.txt.
ncat_report: writing fns.txt.html.
ncat_report: writing rules.html (cisco-ios-benchmark.html).
ncat_report: writing all.ncat_fix.txt.
ncat_report: writing all.ncat_report.txt.
ncat_report: writing all.html.
C:\CIS\RAT\bin>
10 - 10