: Security Planning and Policy

Lab Exercise: Designing a Security Plan

In this lab, students will analyze, offer recommendations, and help improve the security infrastructure of a fictitious business. Students will be asked to analyze business application requirements, security risks, and network assets. Students will also examine security requirements and tradeoffs.

Resource: SAFE Poster

Lab Exercise: Configure SSH

In this lab, students will configure a router as a Secure Shell (SSH) Version 1 server. Students will install and configure an SSH client on a student PC. Students will then use show and debug commands to troubleshoot SSH. Finally, the students will strengthen SSH by configuring SSH Version 2.

Lab Exercise: Controlling TCP/IP Services

In this lab, students will begin the process of implementing a secure perimeter router. Students will explicitly deny common TCP/IP services, and then verify that these services have been disabled.

Lab Exercise: Configure Routing Authentication and Filtering

In this lab, students will configure routing protocol authentication. Students will then configure route filters to control route updates from peer routers.




Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.