Course Content
Address Resolution
Explain how ARP and ND enable communication on a network
0/3
CCNA: Switching, Routing, and Wireless Essentials
The second course in the CCNA curriculum focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLAN) and security concepts.
0/15
CCNA: Enterprise Networking, Security, and Automation
The third CCNA course describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks – including wide area network (WAN) technologies & quality of service (QoS) mechanisms for secure remote access, along with software-defined networking, virtualization, & automation concepts supporting network digitization.
0/14
CCNA Course
About Lesson

Network Attack Mitigations

Identify general mitigation techniques.

The Defense-in-Depth Approach

  • To mitigate network attacks, you must first secure devices including routers, switches, servers, and hosts. Most organizations employ a defense-in-depth approach (also known as a layered approach) to security.
  • This requires a combination of networking devices and services working in tandem.

  • Several security devices and services are implemented to protect an organization’s users and assets against TCP/IP threats:
    • VPN
    • Cisco ASA Firewall
    • IPS
    • ESA/WSA
    • AAA Server

Keep Backups

  • Backing up device configurations and data is one of the most effective ways of protecting against data loss. Backups should be performed on a regular basis as identified in the security policy.
  • Data backups are usually stored offsite to protect the backup media if anything happens to the main facility. The table shows backup considerations and their descriptions.

 

Consideration Description
Frequency
  • Perform backups on a regular basis as identified in the security policy.
  • Full backups can be time-consuming, therefore perform monthly or weekly backups with frequent partial backups of changed files.
Storage
  • Always validate backups to ensure the integrity of the data and validate the file restoration procedures.
Security
  • Backups should be transported to an approved offsite storage location on a daily, weekly, or monthly rotation, as required by the security policy.
Validation
  • Backups should be protected using strong passwords. The password is required to restore the data.

Upgrade, Update, and Patch

  • As new malware is released, enterprises need to keep current with the latest versions of antivirus software.
  • The most effective way to mitigate a worm attack is to download security updates from the operating system vendor and patch all vulnerable systems.
  • One solution to the management of critical security patches is to make sure all end systems automatically download updates.

Authentication, Authorization, and Accounting

Authentication, authorization, and accounting (AAA, or “triple A”) network security services provide the primary framework to set up access control on network devices.

  • AAA is a way to control who is permitted to access a network (authenticate), what actions they perform while accessing the network (authorize), and making a record of what was done while they are there (accounting).
  • The concept of AAA is similar to the use of a credit card. The credit card identifies who can use it, how much that user can spend, and keeps account of what items the user spent money on.

Firewalls

  • Network firewalls reside between two or more networks, control the traffic between them, and help prevent unauthorized access.
  • A firewall could allow outside users controlled access to specific services.
  • For example, servers accessible to outside users are usually located on a special network referred to as the demilitarized zone (DMZ).
  • The DMZ enables a network administrator to apply specific policies for hosts connected to that network.

Types of Firewalls

  • Firewall products come packaged in various forms.
  • These products use different techniques for determining what will be permitted or denied access to a network.
  • They include the following:
    • Packet filtering – Prevents or allows access based on IP or MAC addresses
    • Application filtering – Prevents or allows access by specific application types based on port numbers
    • URL filtering – Prevents or allows access to websites based on specific URLs or keywords
    • Stateful packet inspection (SPI) – Incoming packets must be legitimate responses to requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks, such as denial of service (DoS).

Endpoint Security

  • An endpoint, or host, is an individual computer system or device that acts as a network client.
  • Common endpoints are laptops, desktops, servers, smartphones, and tablets.
  • Securing endpoint devices is one of the most challenging jobs of a network administrator because it involves human nature.
  • A company must have well-documented policies in place and employees must be aware of these rules. Employees need to be trained on proper use of the network.
  • Policies often include the use of antivirus software and host intrusion prevention.
  • More comprehensive endpoint security solutions rely on network access control.

 

Other related topics

 

Topic Title Topic Objective
Security Threats and Vulnerabilities Explain why basic security measures are necessary on network devices.
Network Attacks Identify security vulnerabilities.
Network Attack Mitigation Identify general mitigation techniques.
Device Security Configure network devices with device hardening features to mitigate security threats.

Other useful information

Join the conversation