What measures will you take to securely configure SNMP

Assignment Help Operating System
Reference no: EM132404876

M5A2: Hands-on Lab: Cisco Router Hardening

After the lab exercise, a report should be prepared showing the steps taken along with screenshots. Note the following points while preparing the report:
• The report will be a Word document.
• Describe the steps performed and provide a brief explanation of each step.
• Include screenshots of all the steps - either the commands entered at the command-line or the options selected through the GUI.

Be sure to use quality references to substantiate your responses.
The hands-on-lab exercises are designed to provide students with real-time experience in the cyber security domain.

The basic system requirements for this activity are given below:
• CPU: Intel Pentium 4, 2.53 GHz or equivalent
• OS: Microsoft Windows 7, 8.1, 10, Ubuntu Linux 12.04 LTS or 14.04 LTS
• RAM: 512 MB Free
• Storage: 400 MB of free disk space (No tutorials)
• Display resolution: 800 x 600
• Adobe Flash Player
• Language fonts supporting Unicode encoding (if viewing in languages other than English)
• Latest video card drivers and operating system updates

Prerequisites
Set up a system with Cisco packet tracer installed. Please refer to the following resource:
• Cisco Packet Tracer software 6.3 download
• Lucero, P. C. (2013, April 10). A basic tutorial on Packet Tracer

Please perform the following steps:

Create a small network consisting of a router and one end user device in Packet Tracer.

Note: you may use the configuration from the lab exercise completed in Module 3. The image below shows a router and a server that are connected in Packet Tracer software.

Complete the following objectives:

1. Enable the NTP service on the server and configure the Cisco router to use this server for time synchronization.

2. Change the time on the NTP server and show that the time on the router has also changed.

3. Explain with references the security advantages of configuring NTP this way.

4. Enable the Syslog service on the server and configure the Cisco router to send its logs to this server. Show that the logs appearing on the Syslog server.

5. Explain why sending the device logs to another server is a recommended configuration. List at least four good practices for log management.

6. What is SNMP used for? Configure SNMP on the router.

7. What measures will you take to securely configure SNMP?

8. Finally, list three other secure configuration measures for routers. Provide quality references and explain your configuration measures in detail.

After making changes in the configuration, do not forget to save the changes in NVRAM.

The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.

Attachment:- Cisco Router Hardening.rar

Verified Expert

This task deals with the server side ntp service enabling and cisco router configuration.It explains about the NTP server time and the security benefits.The best practices of management log is discussed. Snmp routing configuration is discussed and some of the security and configuration measures are also discussed.

Reference no: EM132404876

Questions Cloud

Describe sales and operations planning in terms : Describe sales and operations planning in terms of its purpose, components, and frequency and how they support the business strategy.
What is meant by principal agent conflict : What is meant by principal principal conflict two key means to align the interests of owners shareholders and managers in a corporation
Negotiating a service contract to subcontract : The company Appliances of Mexico is negotiating a service contract to subcontract the call service, which allows to coordinate repairs with the Spanish
CHEM400 - General Chemistry Assignment : CHEM400 - General Chemistry Assignment Help and Solution, AMA International University, Bahrain. Title: Precious Metals as an Important Group in Periodic Table
What measures will you take to securely configure SNMP : Explain why sending the device logs to another server is a recommended configuration. List at least four good practices for log management
Discussion - What problem will earning your degree solve : Discussion - In this discussion, we want you to engage in the decision-making process as it relates to earning your degree
Identify effects of various influences on voting behavior : Identify the effects of various influences on voting behavior, including education, income, religion, race/ethnicity, gender, and geography.
Interchange with personnel from the private sector : In the public sector, there should be more interchange with personnel from the private sector, more people on contract, and more flexible terms of service.
BUS306 Applied Management Science Assignment : BUS306 Applied Management Science Assignment Help and Solution, Abu Dhabi University - Assessment Writing Service - Mini Project- Modifying and Analyzing

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd