SlideShare a Scribd company logo
1 of 24
ISP Responsibility



              Working at a Small-to-Medium Business or ISP –
              Chapter 8




Version 4.1                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   1
Objectives
 Describe ISP security policies and procedures.
 Describe the tools used in implementing security at the
  ISP.
 Describe the monitoring and managing of the ISP.
 Describe the responsibilities of the ISP with regard to
  maintenance and recovery.




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   2
ISP Security Considerations
 Helping clients to create secure passwords
 Securing applications
 Removing vulnerabilities
 Configuring firewalls
 Performing security
  scans




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   3
ISP Security Considerations
Common security practices:
 Encrypting data stored on servers
 Using permissions to secure access
 Implement user accounts
 Assign levels of access




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   4
ISP Security Considerations
Three steps used to reduce network vulnerability:
 Authentication
 Authorization
 Accounting




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   5
ISP Security Considerations
 Encryption: use the secure version of a protocol
  whenever confidential data is being exchanged




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   6
Security Tools
 Access control lists and port filtering protect
  against DoS and DDoS attacks




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   7
Security Tools
 Firewalls use ACLs to control which traffic is
  passed or blocked




                         © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   8
Security Tools
 Intrusion Detection System (IDS)
 Intrusion Prevention System (IPS)




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
Security Tools
Wireless security:
 Changing default settings
 Enabling authentication
 MAC filtering
 Encryption




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   10
Security Tools
 Host-based firewalls control inbound and
  outbound network traffic




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   11
Security Tools
Targets of host security:
 Known attacks
 Exploitable services
 Worms and viruses
 Back doors and Trojans




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   12
Monitoring and Managing the ISP
 Typical features of a Service Level Agreement
  (SLA):




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   13
Monitoring and Managing the ISP
 Monitoring network link performance




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   14
Monitoring and Managing the ISP
In-band management:
 Telnet Virtual Terminal (VTY) session
 Secure Shell (SSH): preferred for security




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   15
Monitoring and Managing the ISP
 SNMP enables administrators to gather data
  about the network
 Syslog uses syslog clients to generate and
  forward log messages to syslog servers




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   16
Backups and Disaster Recovery
Factors in choosing backup media:
 Amount of data
 Cost of media
 Performance
 Reliability
 Ease of offsite storage




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   17
Backups and Disaster Recovery
Methods of file backup:
 Normal
 Differential
 Incremental




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   18
Backups and Disaster Recovery
How to ensure successful backups:
 Swap media
 Review backup logs
 Trial restores
 Drive maintenance




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   19
Backups and Disaster Recovery
 Use TFTP to protect configurations and Cisco
  IOS software
 Restore a Cisco IOS image using TFTP in
  ROMmon mode




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   20
Backups and Disaster Recovery
 Steps to designing an effective recovery plan:




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   21
Backups and Disaster Recovery
 Phases to creating and implementing a disaster
  recovery plan:




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   22
Summary
 ISPs provide desktop security services for customers, such
  as creating passwords, implementing patches and updates,
  and assigning permissions.
 Many protocols offer secure versions utilizing digital
  encryption, which should be used when the data being
  exchanged is confidential.
 Port filtering and Access Lists use TCP and UDP port
  features to permit or deny traffic.
 Firewalls can utilize hardware or software to define what
  traffic can come into or go out of parts of a network.
 ISPs are responsible for providing efficient and effective
  backup and disaster recovery methods for their customers.

                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   23
© 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   24

More Related Content

What's hot

CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
CCNA Discovery 2 - Chapter 3
CCNA Discovery 2 - Chapter 3CCNA Discovery 2 - Chapter 3
CCNA Discovery 2 - Chapter 3Irsandi Hasan
 
CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7Irsandi Hasan
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6Irsandi Hasan
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1Irsandi Hasan
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1Ali Kamil
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9Irsandi Hasan
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1idzwanpsis
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewlulunannisa
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4Irsandi Hasan
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 

What's hot (20)

CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
CCNA Discovery 2 - Chapter 3
CCNA Discovery 2 - Chapter 3CCNA Discovery 2 - Chapter 3
CCNA Discovery 2 - Chapter 3
 
CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA Icnd110 s00
CCNA Icnd110 s00CCNA Icnd110 s00
CCNA Icnd110 s00
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 

Viewers also liked

CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8Irsandi Hasan
 
CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9Irsandi Hasan
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6Irsandi Hasan
 
CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7Irsandi Hasan
 
CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2Irsandi Hasan
 
CCNA Discovery 3 - Chapter 8
CCNA Discovery 3 - Chapter 8CCNA Discovery 3 - Chapter 8
CCNA Discovery 3 - Chapter 8Irsandi Hasan
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6Irsandi Hasan
 
CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7Irsandi Hasan
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5Irsandi Hasan
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9Irsandi Hasan
 
CCNA Discovery 3 - Chapter 4
CCNA Discovery 3 - Chapter 4CCNA Discovery 3 - Chapter 4
CCNA Discovery 3 - Chapter 4Irsandi Hasan
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5Irsandi Hasan
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4Irsandi Hasan
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3Irsandi Hasan
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3Irsandi Hasan
 

Viewers also liked (16)

CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
 
CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6
 
CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7
 
CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2
 
CCNA Discovery 3 - Chapter 8
CCNA Discovery 3 - Chapter 8CCNA Discovery 3 - Chapter 8
CCNA Discovery 3 - Chapter 8
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6
 
CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
 
CCNA Discovery 3 - Chapter 4
CCNA Discovery 3 - Chapter 4CCNA Discovery 3 - Chapter 4
CCNA Discovery 3 - Chapter 4
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3
 

Similar to CCNA Discovery 2 - Chapter 8

CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxJohn572978
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
Chapter_1_Overview.ppt
Chapter_1_Overview.pptChapter_1_Overview.ppt
Chapter_1_Overview.pptdskypj22
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Hamza Malik
 
Discovery smb isp_chapter2
Discovery smb isp_chapter2Discovery smb isp_chapter2
Discovery smb isp_chapter2idzwanpsis
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkjoehurst87
 

Similar to CCNA Discovery 2 - Chapter 8 (20)

CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Chapter_1_Overview.ppt
Chapter_1_Overview.pptChapter_1_Overview.ppt
Chapter_1_Overview.ppt
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
Discovery smb isp_chapter2
Discovery smb isp_chapter2Discovery smb isp_chapter2
Discovery smb isp_chapter2
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

CCNA Discovery 2 - Chapter 8

  • 1. ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8 Version 4.1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Describe ISP security policies and procedures.  Describe the tools used in implementing security at the ISP.  Describe the monitoring and managing of the ISP.  Describe the responsibilities of the ISP with regard to maintenance and recovery. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. ISP Security Considerations  Helping clients to create secure passwords  Securing applications  Removing vulnerabilities  Configuring firewalls  Performing security scans © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. ISP Security Considerations Common security practices:  Encrypting data stored on servers  Using permissions to secure access  Implement user accounts  Assign levels of access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. ISP Security Considerations Three steps used to reduce network vulnerability:  Authentication  Authorization  Accounting © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. ISP Security Considerations  Encryption: use the secure version of a protocol whenever confidential data is being exchanged © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Security Tools  Access control lists and port filtering protect against DoS and DDoS attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Security Tools  Firewalls use ACLs to control which traffic is passed or blocked © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Security Tools  Intrusion Detection System (IDS)  Intrusion Prevention System (IPS) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Security Tools Wireless security:  Changing default settings  Enabling authentication  MAC filtering  Encryption © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Security Tools  Host-based firewalls control inbound and outbound network traffic © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Security Tools Targets of host security:  Known attacks  Exploitable services  Worms and viruses  Back doors and Trojans © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Monitoring and Managing the ISP  Typical features of a Service Level Agreement (SLA): © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Monitoring and Managing the ISP  Monitoring network link performance © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Monitoring and Managing the ISP In-band management:  Telnet Virtual Terminal (VTY) session  Secure Shell (SSH): preferred for security © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Monitoring and Managing the ISP  SNMP enables administrators to gather data about the network  Syslog uses syslog clients to generate and forward log messages to syslog servers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Backups and Disaster Recovery Factors in choosing backup media:  Amount of data  Cost of media  Performance  Reliability  Ease of offsite storage © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Backups and Disaster Recovery Methods of file backup:  Normal  Differential  Incremental © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Backups and Disaster Recovery How to ensure successful backups:  Swap media  Review backup logs  Trial restores  Drive maintenance © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Backups and Disaster Recovery  Use TFTP to protect configurations and Cisco IOS software  Restore a Cisco IOS image using TFTP in ROMmon mode © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Backups and Disaster Recovery  Steps to designing an effective recovery plan: © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Backups and Disaster Recovery  Phases to creating and implementing a disaster recovery plan: © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Summary  ISPs provide desktop security services for customers, such as creating passwords, implementing patches and updates, and assigning permissions.  Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential.  Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic.  Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network.  ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24