Net-461_Lab Part 03
Net-461_Lab Part 03
PERFORMANCE OBJECTIVES
Upon completion of this laboratory exercise, the student technicians/engineers will be able to:
1. Securing the Router for Administrative Access
2. Password Configuration
3. Logging Router Activity
None
RESOURCES(if needed)
None
DISCUSSION
Router is the backbone for communication and if someone want to implement some security
measures in a network, router security configuration is the main topic.
COMPUTER NETWORK II 3
LAB MANUAL
LAB EXPERIMENT 02: SECURING NETWORK DEVICES
Network Topology
Addressing Table
Objectives
Background / Scenario
The router is a critical component in any network. It controls the movement of data into and
out of the network and between devices within the network. It is particularly important to
protect network routers because the failure of a routing device could make sections of the
network, or the entire network, inaccessible. Controlling access to routers and enabling
reporting on routers is critical to network security and should be part of a comprehensive
security policy.
In this lab, you will build a multi-router network and configure the routers and hosts. Use
various CLI tools to secure local and remote access to the routers, analyze potential
vulnerabilities, and take steps to mitigate them. Enable management reporting to monitor
router configuration changes.
The router commands and output in this lab are from a Cisco 1941 router using Cisco IOS
software, release 15.4(3) M2 (with a Security Technology Package license). Other routers
and Cisco IOS versions can be used. See the Router Interface Summary Table at the end of
the lab to determine which interface identifiers to use based on the equipment in the lab.
Depending on the model of the router, the commands available and output produced may
vary from what is shown in this lab.
Note: Before you begin, ensure that the routers and the switches have been erased and have
no startup configurations.
No any
TASK-1:
A. PROCEDURE
Set up the network topology and configure basic settings, such as interface IP addresses.
COMPUTER NETWORK II 5
LAB MANUAL
LAB EXPERIMENT 02: SECURING NETWORK DEVICES
Router(config)#hostname R1
c. Configure a clock rate for routers with a DCE serial cable attached to their
serial interface. R1 is shown here as an example.
R1(config)# no ip domain-lookup
Configure a static IP address, subnet mask, and default gateway for PC-A and PC-C as shown
in the IP Addressing Table.
B. OBSERVATIONS
C. ANALYSIS
D. CONCLUSION
TASK-2:
A. PROCEDURE
Note: Perform all tasks on both R1 and R3. The procedures and output for R1 are shown
here.
Configure the enable secret encrypted password on both routers. Use the type 9 (SCRYPT)
hashing algorithm.
How does configuring an enable secret password help protect a router from being
compromised by an attack?
The goal is to always prevent unauthorized users from accessing a device using Telnet, SSH,
or via the console. If attackers are able to penetrate this first layer of defense, using an
enable secret password prevents them from being able to alter the configuration of the
device. Unless the enable secret password is known, a user cannot go into privileged EXEC
mode where they can display the running config and enter various configuration commands
to make changes to the router. This provides an additional layer of security.
Step 2: Configure basic console, auxiliary port, and virtual access lines.
Note: Passwords in this task are set to a minimum of 10 characters but are relatively
simple for the benefit of performing the lab. More complex passwords are
recommended in a production network.
For additional security, the exec-timeout command causes the line to log out
After 5 minutes of inactivity.
The logging synchronous command prevents console messages from
Interrupting command entry.
Note: To avoid repetitive logins during this lab, the exec-timeout command can be set to 5,
which prevents it from expiring. However, this is not considered a good security practice.
R1(config)# line console 0
R1(config-line)# password ciscocon
R1(config-line)# exec-timeout 5
COMPUTER NETWORK II 7
LAB MANUAL
LAB EXPERIMENT 02: SECURING NETWORK DEVICES
R1(config-line)# login
R1(config-line)# logging synchronous
When you configured the password for the console line, what message was displayed?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
R2>telnet 10.1.1.1
Note: The default for vty lines is now transport input none.
Telnet from R2 to R1 again. Were you able to login this time?
F. Enter privileged EXEC mode and issue the show run command. Can you read the
enable secret password? Explain.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Can you read the console, aux, and vty passwords? Explain.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
b) Issue the show run command. Can you read the console, aux, and vty
passwords? Explain.
At what level (number) is the default enable secret password encrypted? ______________
At what level (number) are the other passwords encrypted? ______________
Which level of encryption is harder to crack and why?
A. OBSERVATIONS
B. ANALYSIS
C. CONCLUSION
TASK-3:
COMPUTER NETWORK II 9
LAB MANUAL
LAB EXPERIMENT 02: SECURING NETWORK DEVICES
b. Issue the show run command. What does the $ convert to in the output?
A. OBSERVATIONS
B. ANALYSIS
C. CONCLUSION
TASK-4:
a. Create a new user account with SCRYPT hashing to encrypt the password.
c. Display the running configuration. Which hashing method is used for the
password?
b. Exit to the initial router screen which displays: R1 con0 is now available,
Press RETURN to get started.
c. Log in using the previously defined username user01 and the password
user01pass. What is the difference between logging in at the console now and
previously?
COMPUTER NETWORK II 11
LAB MANUAL
LAB EXPERIMENT 02: SECURING NETWORK DEVICES
Telnet is disabled by default in Windows 7. If necessary, search online for the steps
to enable Telnet in Windows 7.
PC-A>telnet 192.168.1.1
b. Set the vty lines to use the locally defined login accounts.
PC-A>telnet 192.168.1.1
e. During the Telnet session to R1, access privileged EXEC mode with the enable
command.
f. For added security, set the AUX port to use the locally defined login accounts.
A. OBSERVATIONS
B. ANALYSIS
C. CONCLUSION
1. Clean your equipment, materials, and work benches before you leave
2. Return all equipment and materials to their proper storage area
3. Submit your lab report on time
COMPUTER NETWORK II 13