CAT2
CAT2
Device Configuration
Module-3: Device Configuration
• Common issues in installing or configuring
information security devices
• Methods to resolve these issues
• Methods of testing installed/configured
information security devices
Common Router problems and
solutions
1. Correct your Wi-Fi Security Settings
2. Update your Hardware or Firmware
3. Fix Overheating or Overloading
4. Remove MAC Address Restrictions
5. Check Wireless Signal Limitations
Common Router problems and
solutions
1. Correct your Wi-Fi Security Settings
– Network Mode: The router must be allowed to
accommodate all Wi-Fi models used by network
clients. For example, routers designed to run in
802.11g mode only will not support 802.11n or old
802.11b devices. Adjust the router to run in mixed
mode to remedy this kind of network failure.
– Security mode: Most Wi-Fi devices support
several network security protocols (typically different
variations of Wired Equivalent Privacy (WEP) and Wi-
Fi Protected Access (WAP). All Wi-Fi devices, including
routers belonging to the same local network, shall use
the same protection mode.
Common Router problems and
solutions
1. Correct your Wi-Fi Security Settings
– Security key: Wi-Fi security keys are phrases or
sequences of letters and digits. All devices that
enter the network must be configured to use the
Wi-Fi key recognized by the router (or wireless
access point).
Common Router problems and
solutions
2. Update your Hardware or Firmware
– The reason for this step is twofold. You can take
benefit of any additional features and
improvements of the new version of the firmware.
Also, your router will normally receive any critical
security updates.
– Typically, you will have the choice of checking,
evaluating, downloading, and installing the latest
firmware on your router's administration tab. The
exact steps depend on the make and model of
your router, so check the specifics of the router
manufacturer's support site.
Common Router problems and
solutions
3. Fix Overheating or Overloading
– You can set up a different Wi-Fi router or allow the
"Guest Network" option for your router.
– You can also set up a separate Service Set IDentifier
(SSID) and password for your host network to avoid
issues with your main network.
– This segregation would also work with your smart
appliances and secure your key devices from attacks
on the Internet of Things.
– You can also use QoS (Quality of Service). QoS is a
feature on some routers that lets you prioritize traffic
according to the type of data being transmitted.
Common Router problems and
solutions
4. Remove MAC Address Restrictions
– A number of network routers support a function
called MAC address filtering.
– While disabled by default, router administrators
can turn this function on and limit connections to
only those devices by their MAC address number.
– Check the router to ensure that either the MAC
address filtering is off or the MAC address of the
computer is included in the list of allowed
connections.
Common Router problems and
solutions
5. Check Wireless Signal Limitations
– If you have a newer router, check if it supports the
5GHz band. Newer routers typically have dual-
band capabilities.
– By allowing dual bands, you could hold older
devices that only support slower G specification
on the 2.4GHz band and newer devices on the
beefier and faster 5GHz band.
– Essentially, this is like having two routers in one.
Common Router problems and
solutions
• Basic Faults
- Physical Layer Stuff
- Check the Interfaces
- Ping
- Check the Routing Table
- Is there a Firewall on the Computer?
- Any Access Lists?
- Is the VPN Up?
- Do the Protocols Match?
- Check for Human Error
- Verify Settings
Common Router problems and
solutions
• Physical Layer Stuff:
– Check power issues. Look for power lights, check
plugs, and circuit breakers.
• Check the Interfaces:
– Use the command show ip interface brief or show
ipv6 interface brief to ensure that desired
interfaces are up and configured properly.
Common Router problems and
solutions
• Ping:
– Use the ping and trace commands to check for
connectivity.
• Check the Routing Table:
– Use the show ip route or show ipv6 route
command to find out what the router knows. Is
there either an explicit route to the remote
network or a gateway of last resort?
Common Router problems and
solutions
• Is there a Firewall on the Computer?
– If the problem involves a computer, check to
ensure that its firewall is not blocking packets.
– Sometimes there are computers at client locations
with firewalls in operation without the client’s
knowledge.
Common Router problems and
solutions
• Any Access Lists?
– If the above steps don’t resolve the issue, check
for access-control lists that block traffic.
– There is an implicit “deny any” at the end of every
access-control list, so even if you don’t see a
statement explicitly denying traffic, it might be
blocked by an implicit “deny any.”
Common Router problems and
solutions
• Is the VPN Up?
– If a VPN is part of the connection, check to ensure
that it is up. Use the show crypto family of
commands to check VPN connections.
– With VPN connections, each end of the
connection must mirror the other.
– For example, even something as seemingly
inconsequential as a different timeout value or a
different key lifetime can prevent a connection.
Common Router problems and
solutions
• Do the Protocols Match?
– If you are trying to gain remote access to a server,
ensure that it supports the protocol you’re
attempting to use.
– For example, if the router hasn’t been configured
to support SSH and you use the default settings in
PuTTY which call for SSH, you won’t be able to
connect.
– Also, some admins change the default port
numbers, so you may expect to use port 22 with
SSH, but the admin may have configured it to use
a non-standard port.
Common Router problems and
solutions
• Check for Human Error:
– User errors can also be the source of errors. Check
to ensure that correct usernames and passwords
are being used, that you and the admin on the
other end of the connection are using the same
network addresses and matching subnet masks.
• Verify Settings:
– Do not make assumptions. Verify everything!
Router Troubleshooting Tools
• Using Router Diagnostic Commands
– Cisco routers provide numerous integrated
commands to assist you in monitoring and
troubleshooting your internetwork.
Router Troubleshooting Tools
• Using show Commands
– The show commands are powerful monitoring
and troubleshooting tools.
• Monitor router behaviour during initial installation
• Monitor normal network operation
• Isolate problem interfaces, nodes, media, or
applications
• Determine when a network is congested
• Determine the status of servers, clients, or other
neighbours
Router Troubleshooting Tools
• Using debug Commands
– The debug privileged exec commands can provide
a wealth of information about the traffic being
seen (or not seen) on an interface, error messages
generated by nodes on the network, protocol-
specific diagnostic packets, and other useful
troubleshooting data.
– In many situations, using third-party diagnostic
tools can be more useful and less intrusive than
using debug commands.
Router Troubleshooting Tools
• Using the ping Command
– To check host reachability and network connectivity,
use the ping exec (user) or privileged exec command.
– After you log in to the router or access server, you are
automatically in user exec command mode. The exec
commands available at the user level are a subset of
those available at the privileged level.
– In general, the user exec commands allow you to
connect to remote devices, change terminal settings
on a temporary basis, perform basic tests, and list
system information.
– The ping command can be used to confirm basic
network connectivity on AppleTalk, ISO
Connectionless Network Service (CLNS), IP, Novell,
Apollo, VINES, DECnet, or XNS networks.
Router Troubleshooting Tools
• Using the trace Command
– The trace user exec command discovers the
routes that a router’s packets follow when
traveling to their destinations.
– The trace privileged exec command permits the
supported IP header options to be specified,
allowing the router to perform a more extensive
range of test options.
Module-3
Device Configuration
Troubleshoot Firewall Problems
1) Ping a PC near the device
2) Ping the device
3) Telnet and/or browse to the device
4) Confirm the port configuration of the device
5) Confirm that important IP addresses are not
blocked
6) Trace the route to the device
Troubleshoot Firewall Problems
1) Ping a PC near the device
• A simple ICMP ping to a PC near the device is a
good initial test to determine connectivity status
and network performance issues.
• ICMP ping is an IP-based signal sent from one
device to another.
• If the target device receives the "ping" from the
source device, it will (if configured to do so)
respond to confirm that is active and connected
to the network.
• It's a simple way of confirming that a device is
online.
Troubleshoot Firewall Problems
1) Ping a PC near the device
• So, if your pings to the PC are not returned, try
pinging the gateway.
• Continue working your way up the network with
your pings to identify the point where they stop.
• Check for firewalls and firewall configurations,
especially those that block UDP, SNMP, pings, or
ports 161 or 162.
• Keep in mind that some networks block all ping
traffic as a security measure.
Troubleshoot Firewall Problems
2) Ping the device
– Next, send another simple ICMP ping to the device to
determine connectivity.
– If pings to the PC in Step 1 were successful, but pings
sent to the device fail, the problem is almost certainly
with your SNMP device.
3) Telnet and/or browse to the device
– If the SNMP device you are testing supports Telnet
connections or Web access, you should attempt to
connect using one of these methods.
– If pings succeed but Telnet and/or browsing is
blocked, this is a very good indication that you have a
firewall issue.
Troubleshoot Firewall Problems
4) Confirm the port configuration of the device
– For additional security, some SNMP devices may use
non-standard ports to obstruct unauthorized SNMP
traffic. If so, make sure that these ports are not
blocked by a firewall and are accepted by the
manager.
– Another potential solution is to reconfigure the device
to use standard ports.
5) Confirm that important IP addresses are not
blocked
– A firewall may simply be blocking the IP address of
your device and/or manager.
– Confirm that these or any other needed IP addresses
are not being blocked.
Troubleshoot Firewall Problems
6) Trace the route to the device
– Tracing the "hops" that network traffic is following to
reach the device can allow you to pinpoint a tricky
firewall issue. A simple trace can be performed from
the Command Prompt of Windows XP:
• Open a Command Prompt in Windows XP.
• Type "tracert", a single space, and the IP address of the
device you are trying to reach (i.e. "tracert
192.168.230.143")
• Press return to start the trace.
• Show the output to your IT department to identify potential
firewall problems.
Troubleshooting CISCO IOS Firewall
configurations
• Reverse (Remove) - an access list
– put a "no" in front of the access-group command
in interface configuration mode
1)
VISA
SECURITY GUIDELINES:
Security Standards
In 2004, the AIS Program incorporated the Payment Card Industry Data Security Standard (PCI DSS)
resulting from a cooperative effort between Visa and MasterCard to create common industry security
requirements.
Effective September 7, 2006 the PCI Security Standard Council (SSC) owns, maintains and distributes the
PCI DSS and all its supporting documents. The council was founded by the top 5 payment card companies.
Visa Inc. , however , continues to manage all data security compliance enforcement and validation
initiatives.
The standards consist of 12 basic requirements grouped into 6 categories:
Build and Maintain a Secure Network
1. Install and maintain a firewall configuration to protect data
2. Do not use vendor-supplied defaults for system passwords and other security parameters
What are the requirements to validate compliance by your organization in accordance with the
Visa LAC AIS Program?
What are the deadlines set by Visa for compliance with AIS Program requirements?
What are the benefits and penalties of the AIS program?
2)
IBM
Assign the appropriate classification and controls to information, data and assets categories.
Apply appropriate access controls to restrict access on a business need-to-know basis.
2) Asset Management:
Register and inventory assets. Establish an acceptable use policy for each asset or group of
assets.
3) Access control:
Establish an Access Control Policy for every application or system that describes how to
manage risks from user account management, access enforcement and monitoring, separation of
duties, and remote access.
Use secure logon procedures to control access to applications and systems, including multi-factor
authentication.
4) Use of Encryption:
5) Operations Security:
Maintain operating procedures and make these available to relevant users. Operating procedures
may include:
6) Network Security:
Place infrastructure assets in controlled access areas, with the exception of those intended for public
use.
Apply risk-based access controls, which may include locking or guarding areas to:
8) Supplier Management:
Evaluate suppliers based on their ability to meet business and security requirements. The
supplier must demonstrate security and privacy practices, for example, through certifications or
third-party attestations.
9) Security Incidents:
The IBM Cybersecurity Incident Response Team (CSIRT) is an internal team staffed with incident
responders and forensic analysts. In-scope cybersecurity incidents include:
● A potential security breach of data or information technology assets and systems owned or
managed by IBM.
● A potential compromise of client data or information technology assets and systems when the
incident might involve IBM personnel, systems, products, or services.
IBM has a dedicated CISO whose team is responsible for leading enterprise-wide information
security strategy, policy, standards, architecture, and processes. The CISO is part of IBM’s
Enterprise & Technology Security group, which works across all of the organizations within the
Company to protect IBM, its brand and its clients against cybersecurity risks. Cybersecurity
oversight consists of the Board and Audit Committee each receiving regular updates from
senior management, including the CISO, as well as from cybersecurity experts in areas such
as rapidly evolving cybersecurity threats, cybersecurity technologies and solutions deployed
internally and with IBM clients, major cyber risks areas and policies and procedures to
addresses those risks, and cybersecurity incidents.