<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Petlast</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Petlast"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Petlast"/>
	<updated>2026-04-30T16:43:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4900</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4900"/>
		<updated>2011-12-08T21:43:02Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer and operates under the public key infrastructure; a framework of all entities involved in digital certificate management. Parts of a  standard X.509 digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. The purpose of a digital signature is to only show the that the public key labeled as belonging to a person was used to encrypt the message, nothing more. Hashing, in its simplest form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which can be used to ensure the integrity of a file by guaranteeing no one has tampered with it. Where as encryption has a two step process used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;br /&gt;
&lt;br /&gt;
==Certificate Life Cycle==&lt;br /&gt;
Digital certificates are removed and added with changes in a companies&#039;s network, adding or subtracting users, or privilege changes. As such, certificates are given a lifetime consisting of four stages: Creation, Suspension, Revocation, and Expiration.&lt;br /&gt;
**Creation: A user is positively verified and a certificate is created and issued to the user by the Certificate Authority. The CA applies a signature to the certificate and can continually update the certificate.&lt;br /&gt;
**Suspension: In the case of a user&#039;s absence or vulnerability of the server connected to the certificate, a certificate can be suspended until a later date. On the user&#039;s return, the certificate can be reinstated or revoked.&lt;br /&gt;
**Revocation: This state may be brought on a vulnerability or a situation where the user&#039;s private key may be compromised. The certificate is no longer valid and it is placed into a public repository by either the CA or a user and forgoes expiration.&lt;br /&gt;
**Expiration: At this stage, a certificate can no longer be used. Every certificate issued by the CA must have an expiration date. An expired certificate cannot be renewed and a user must follow a process to be granted a new certificate.&lt;br /&gt;
&lt;br /&gt;
==Certificate Authority==&lt;br /&gt;
The CA or Certificate authority is a third party agency which manages the distribution of Digital Certificates and is trusted by both the owner and receiver of a certificate. A certificate authority has the responsibilities of:&lt;br /&gt;
&lt;br /&gt;
*Publishing the criteria for granting, revoking, and managing certificates.&lt;br /&gt;
*Distributing CA certificates&lt;br /&gt;
*Generating, issuing, and distributing public key certificates to applicants.&lt;br /&gt;
*Managing certificates (for example, enrolling, renewing, and revoking them).&lt;br /&gt;
*Verifying evidence submitted by applicants.&lt;br /&gt;
*Providing a means for applicants to request revocation&lt;br /&gt;
*Maintaining the security, availability, and continuity of the certificate issuance signing functions.&lt;br /&gt;
*Time stamping a digital signature.&lt;br /&gt;
&lt;br /&gt;
==Types of Digital Certificates==&lt;br /&gt;
There are five categories of digital certificate. The common categories are personal digital certificates, server digital certificates, adn software publisher digital certificates.&lt;br /&gt;
===Class 1: Personal Digital Certificates===&lt;br /&gt;
Personal Digital Certificates are used by individuals when they exchange messages with other users or online services, such as Web Browsers and S/MIME applications.&lt;br /&gt;
===Class 2: Serer Digital certificates===&lt;br /&gt;
Server Certificates enable Web servers to operate in a secure mode. A Server Certificate unambiguously identifies and authenticates your server and encrypts any information passed between the server and a Web browser. A server digital certificate can perform two functions: ensure authenticity of a web server and enable clients connecting to a web server to examine the identity of a server&#039;s owner. &lt;br /&gt;
===Class 3: Software Publisher Digital Certificates===&lt;br /&gt;
Publisher Digital Certificates use validation to provide customers with the information and assurance they need when downloading software from the Internet. They are used by software publishers to ensure their software has not been tampered with&lt;br /&gt;
===Dual-Key and Dual-Sided Digital Certificates===&lt;br /&gt;
Dual-key certificates are intrinsically linked certificates that split the functionality of a single certificate between two.  The signing certificate is used to sign a message and prove its identity is authentic, while the encryption certificate is used to encrypt the message. A copy of an encryption certificate should always be kep to enable email decryption, but a copy of the signign certificate is not required, although at the cost of reduced security.Dual keys enable a more secure system for backing up certificates.&lt;br /&gt;
Dual-Sided certificates allow a client to authenticate a verifiable certificate back to a server. Certain situations, such as in a corporate military/financial setting where in addition to a username and password a user must first authenticate a computer in the same way a website authenticates itself to you.&lt;br /&gt;
===X.509 Digital Certificates===&lt;br /&gt;
X.509 is the most widely used standard for digital certificates. The X.509 standard specifies formats for Public Key certificates. Layout of this digital certificate can be found above.&lt;br /&gt;
===Wildcard Certificates===&lt;br /&gt;
Wildcard certificates are a sub-type of digital certificates that encompass an entire domain of website addresses. This is useful in situations where a client cannot differentiate between two different hosts it has to query at the same time.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4899</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4899"/>
		<updated>2011-12-08T21:17:48Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer and operates under the public key infrastructure; a framework of all entities involved in digital certificate management. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. The purpose of a digital signature is to only show the that the public key labeled as belonging to a person was used to encrypt the message, nothing more. Hashing, in its simplest form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which can be used to ensure the integrity of a file by guaranteeing no one has tampered with it. Where as encryption has a two step process used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;br /&gt;
&lt;br /&gt;
==Certificate Life Cycle==&lt;br /&gt;
Digital certificates are removed and added with changes in a companies&#039;s network, adding or subtracting users, or privilege changes. As such, certificates are given a lifetime consisting of four stages: Creation, Suspension, Revocation, and Expiration.&lt;br /&gt;
**Creation: A user is positively verified and a certificate is created and issued to the user by the Certificate Authority. The CA applies a signature to the certificate and can continually update the certificate.&lt;br /&gt;
**Suspension: In the case of a user&#039;s absence or vulnerability of the server connected to the certificate, a certificate can be suspended until a later date. On the user&#039;s return, the certificate can be reinstated or revoked.&lt;br /&gt;
**Revocation: This state may be brought on a vulnerability or a situation where the user&#039;s private key may be compromised. The certificate is no longer valid and it is placed into a public repository by either the CA or a user and forgoes expiration.&lt;br /&gt;
**Expiration: At this stage, a certificate can no longer be used. Every certificate issued by the CA must have an expiration date. An expired certificate cannot be renewed and a user must follow a process to be granted a new certificate.&lt;br /&gt;
&lt;br /&gt;
==Certificate Authority==&lt;br /&gt;
The CA or Certificate authority is a third party agency which manages the distribution of Digital Certificates and is trusted by both the owner and receiver of a certificate. A certificate authority has the responsibilities of:&lt;br /&gt;
&lt;br /&gt;
*Publishing the criteria for granting, revoking, and managing certificates.&lt;br /&gt;
*Distributing CA certificates&lt;br /&gt;
*Generating, issuing, and distributing public key certificates to applicants.&lt;br /&gt;
*Managing certificates (for example, enrolling, renewing, and revoking them).&lt;br /&gt;
*Verifying evidence submitted by applicants.&lt;br /&gt;
*Providing a means for applicants to request revocation&lt;br /&gt;
*Maintaining the security, availability, and continuity of the certificate issuance signing functions.&lt;br /&gt;
*Time stamping a digital signature.&lt;br /&gt;
&lt;br /&gt;
==Types of Digital Certificates==&lt;br /&gt;
===Class 1: Personal Digital Certificates===&lt;br /&gt;
===Class 2: Serer Digital certificates===&lt;br /&gt;
===Class 3: Software Publisher Digital Certificates===&lt;br /&gt;
===Dual-Key and Dual-Sided Digital Certificates===&lt;br /&gt;
===X.509 Digital Certificates===&lt;br /&gt;
&lt;br /&gt;
===Wildcard Certificates===&lt;br /&gt;
Wildcard certificates are a sub-type of digital certificates that encompass an entire domain of website addresses. This is useful in situations where a client cannot differentiate between two different hosts it has to query at the same time.&lt;br /&gt;
==Trust Models&lt;br /&gt;
A trust model is a type of trusting relationship that can exist between two individuals or entities.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4898</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4898"/>
		<updated>2011-12-08T21:17:01Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer and operates under the public key infrastructure; a framework of all entities involved in digital certificate management. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. The purpose of a digital signature is to only show the that the public key labeled as belonging to a person was used to encrypt the message, nothing more. Hashing, in its simplest form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which can be used to ensure the integrity of a file by guaranteeing no one has tampered with it. Where as encryption has a two step process used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;br /&gt;
&lt;br /&gt;
==Certificate Life Cycle==&lt;br /&gt;
Digital certificates are removed and added with changes in a companies&#039;s network, adding or subtracting users, or privilege changes. As such, certificates are given a lifetime consisting of four stages: Creation, Suspension, Revocation, and Expiration.&lt;br /&gt;
Creation: A user is positively verified and a certificate is created and issued to the user by the Certificate Authority. The CA applies a signature to the certificate and can continually update the certificate.&lt;br /&gt;
Suspension: In the case of a user&#039;s absence or vulnerability of the server connected to the certificate, a certificate can be suspended until a later date. On the user&#039;s return, the certificate can be reinstated or revoked.&lt;br /&gt;
Revocation: This state may be brought on a vulnerability or a situation where the user&#039;s private key may be compromised. The certificate is no longer valid and it is placed into a public repository by either the CA or a user and forgoes expiration.&lt;br /&gt;
Expiration: At this stage, a certificate can no longer be used. Every certificate issued by the CA must have an expiration date. An expired certificate cannot be renewed and a user must follow a process to be granted a new certificate.&lt;br /&gt;
&lt;br /&gt;
==Certificate Authority==&lt;br /&gt;
The CA or Certificate authority is a third party agency which manages the distribution of Digital Certificates and is trusted by both the owner and receiver of a certificate. A certificate authority has the responsibilities of:&lt;br /&gt;
&lt;br /&gt;
*Publishing the criteria for granting, revoking, and managing certificates.&lt;br /&gt;
*Distributing CA certificates&lt;br /&gt;
*Generating, issuing, and distributing public key certificates to applicants.&lt;br /&gt;
*Managing certificates (for example, enrolling, renewing, and revoking them).&lt;br /&gt;
*Verifying evidence submitted by applicants.&lt;br /&gt;
*Providing a means for applicants to request revocation&lt;br /&gt;
*Maintaining the security, availability, and continuity of the certificate issuance signing functions.&lt;br /&gt;
*Time stamping a digital signature.&lt;br /&gt;
&lt;br /&gt;
==Types of Digital Certificates==&lt;br /&gt;
===Class 1: Personal Digital Certificates===&lt;br /&gt;
===Class 2: Serer Digital certificates===&lt;br /&gt;
===Class 3: Software Publisher Digital Certificates===&lt;br /&gt;
===Dual-Key and Dual-Sided Digital Certificates===&lt;br /&gt;
===X.509 Digital Certificates===&lt;br /&gt;
&lt;br /&gt;
===Wildcard Certificates===&lt;br /&gt;
Wildcard certificates are a sub-type of digital certificates that encompass an entire domain of website addresses. This is useful in situations where a client cannot differentiate between two different hosts it has to query at the same time.&lt;br /&gt;
==Trust Models&lt;br /&gt;
A trust model is a type of trusting relationship that can exist between two individuals or entities.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4897</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4897"/>
		<updated>2011-12-08T19:46:18Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. The purpose of a digital signature is to only show the that the public key labeled as belonging to a person was used to encrypt the message, nothing more. Hashing, in its simplest form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which can be used to ensure the integrity of a file by guaranteeing no one has tampered with it. Where as encryption has a two step process used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;br /&gt;
==Certificate Life Cycle==&lt;br /&gt;
At the Revocation stage of a certificate&#039;s life cycle, it is no longer valid, and at the Expiration stage it can no longer be used.&lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
Wildcard certificates are a sub-type of digital certificates that encompass an entire domain of website addresses.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4896</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4896"/>
		<updated>2011-12-08T19:45:29Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Certificate Life Cycle==&lt;br /&gt;
At the Revocation stage of a certificate&#039;s life cycle, it is no longer valid, and at the Expiration stage it can no longer be used.&lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
Wildcard certificates are a sub-type of digital certificates that encompass an entire domain of website addresses.&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. The purpose of a digital signature is to only show the that the public key labeled as belonging to a person was used to encrypt the message, nothing more. Hashing, in its simplest form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which can be used to ensure the integrity of a file by guaranteeing no one has tampered with it. Where as encryption has a two step process used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4870</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4870"/>
		<updated>2011-12-08T03:23:58Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely [[Image: Wswpf_33.jpg|left]]distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4869</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4869"/>
		<updated>2011-12-08T03:23:10Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely &lt;br /&gt;
[[Image: Wswpf_33.jpg|left]] distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4868</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4868"/>
		<updated>2011-12-08T03:22:39Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely &lt;br /&gt;
[[Image: Wswpf_33.jpg|left]]&lt;br /&gt;
distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4867</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4867"/>
		<updated>2011-12-08T03:21:39Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
[[Image: Wswpf_33.jpg|left]]&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4866</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4866"/>
		<updated>2011-12-08T03:20:18Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
[[Image: Wswpf_33.jpg|left]]&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Wswpf_33.jpg&amp;diff=4865</id>
		<title>File:Wswpf 33.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Wswpf_33.jpg&amp;diff=4865"/>
		<updated>2011-12-08T03:19:18Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4864</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4864"/>
		<updated>2011-12-08T03:18:01Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4863</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4863"/>
		<updated>2011-12-08T03:17:04Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
[[Image: CertificateError2.png|right]]&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:CertificateError2.png&amp;diff=4862</id>
		<title>File:CertificateError2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:CertificateError2.png&amp;diff=4862"/>
		<updated>2011-12-08T03:16:42Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4861</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4861"/>
		<updated>2011-12-08T03:15:05Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
[[Image: CertificateError.png|right]]&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
==Wildcard Certificates==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:CertificateError.png&amp;diff=4860</id>
		<title>File:CertificateError.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:CertificateError.png&amp;diff=4860"/>
		<updated>2011-12-08T03:14:32Z</updated>

		<summary type="html">&lt;p&gt;Petlast: certificate error&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;certificate error&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4859</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4859"/>
		<updated>2011-12-08T03:12:40Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
Besides standard e-email transactions, Digital Certificates can be used to encrypt HTTPS communications on the internet. A web browser can obtain a certificate from a website using SSL to determine the security of a web server and whether the server has been compromised. The browser requests a certificate using a certificate signing request that has the web site name, contact email address, and company information while the site asks for information to compare it to. The owner then signs it, making the certificate a public certificate. &lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication: as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4858</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4858"/>
		<updated>2011-12-08T02:58:36Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
A Digital Certificate (also known as a public-key certificate)is a form of electronic credentials that associates a public key with an identity by a trusted third party. The third party verifies the owner and that the public key belongs to an owner. A digital Certificate is a pair of files on your computer. Parts of a digital certificate include:&lt;br /&gt;
* The person&#039;s name&lt;br /&gt;
*An e-mail address&lt;br /&gt;
*A serial number&lt;br /&gt;
*A public key&lt;br /&gt;
*The hash used to encrypt the digital certificate&lt;br /&gt;
*An expiration date (certificates are valid for five years)&lt;br /&gt;
*The signature and has algorithms&lt;br /&gt;
*A digital signature&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication, as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created (not to be confused with a digital certificate), which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4857</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4857"/>
		<updated>2011-12-08T02:33:01Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
A disadvantage of public-key crypography is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the contents of a message. Symmetrical algorithms are very easy to use and have the advantage of not consuming too much computing power, however there are dangers of the single secret key falling into wrong hands. Therefore, many computer companies use them in tandem.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates==&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication, as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created, which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
===Digital Signatures===&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;br /&gt;
Hashing is a form of cryptographic security which differences from encryption. Where as encryption has a two step rpoces used to first encrypt and then decrypt a message, hashing condenses a message into a irreversible fixed-length value, or hash. Two of the most common hashing algorithms seen in networking are MD5 and SHA-1; however, they are both found to have vulnerabilities and should be discouraged.&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4856</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4856"/>
		<updated>2011-12-07T23:58:16Z</updated>

		<summary type="html">&lt;p&gt;Petlast: /* Asymmetrical cryptography fundamentals */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.&lt;br /&gt;
&lt;br /&gt;
==Digital certificates and hashing==&lt;br /&gt;
===Digital certificates===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication, as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created, which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4855</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4855"/>
		<updated>2011-12-07T23:57:16Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
&lt;br /&gt;
==Asymmetrical cryptography fundamentals==&lt;br /&gt;
 The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital certificates and hashing==&lt;br /&gt;
===Digital certificates===&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication, as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created, which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
===Hashing===&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4853</id>
		<title>Digital Certificates in Asymmetrical Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Digital_Certificates_in_Asymmetrical_Cryptography&amp;diff=4853"/>
		<updated>2011-12-07T03:29:21Z</updated>

		<summary type="html">&lt;p&gt;Petlast: Created page with &amp;quot;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As part of protection and encryption of ever increasing network vulnerabilities and security needs, traditional symmetrical algorithms that encrypt information using private keys are not always sufficient. Asymmetric Cryptography, also known as Public Key Cryptography  uses two keys instead of one, and contains many more permutations and defenses than an ordinary symmetrical algorithm. The use of these algorithms also allows checks of authenticity with digital signatures.&lt;br /&gt;
1. Asymmetrical cryptography fundamentals&lt;br /&gt;
2. Digital Certificates and hashing&lt;br /&gt;
3. Key Generation Protocol&lt;br /&gt;
4. Encryption algorithms, such as RSA, ECC, Quantum Cryptography, and NTRUEncrypt&lt;br /&gt;
&lt;br /&gt;
Asymmetrical cryptography fundamentals&lt;br /&gt;
 The primary feature of public-key cryptography is that it removes the&lt;br /&gt;
need to use the same key for encryption and decryption. Whereas traditional cryptography uses one key to decode and encrypt messages, asymmetric encryption utilizes two mathematically linked key pairs; a public key and a private key which must be used together to create a connection. The public key is known to everyone and can be freely distributed, while the private key is only known the the user who is sending the message. When someone wishes to send a message using any asymmetrical encryption standard, he must use the receiver&#039;s public key to send it, then the receiver uses his own private key to decrypt it. Additionally, the connection works both ways; as a message encrypted by a person&#039;s private key can be unencrypted by the corresponding public key.   &lt;br /&gt;
The two main branches of Public Key are Public Key Encryption and Digital Certificates.&lt;br /&gt;
&lt;br /&gt;
Digital certificates and hashing&lt;br /&gt;
Asymmetric cryptography cannot naturally provide authentication, as although a message that is sent with an asymmetric protocol can ensure the message has not been tampered with, it cannot verify whether the sender is who they say they are due to a public key&#039;s nature. To provide proof, a digital signature must be created, which acts as a handwritten signature verifying the sender. It can also confirm that the message had not been altered since it was signed, or prevent the sender from disputing the origin of the message. Hashing, in its simplist form is an algorithm that you can run a piece of data through and get out a number that represents the original.&lt;br /&gt;
&lt;br /&gt;
A digital signature consists of three algorithms: A key generation algorithm that selects a private key at random from a set of possible private keys, then uses it to create the private key and public key that corresponds to it; a signing algorithm that produces the signature when given a message and a private key, and a signature verifying algorithm that takes the message, public key and signature either accepts or rejects the message&#039;s claim of authenticity.&lt;br /&gt;
&lt;br /&gt;
A brief history&lt;br /&gt;
In 1976, Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to the invention of public-key cryptography, it was essentially impossible to&lt;br /&gt;
provide key management for large-scale networks.  With symmetric cryptography, as&lt;br /&gt;
the number of users increases on a network, the number of keys required to provide&lt;br /&gt;
secure communications among those users increases rapidly.  For example, a network&lt;br /&gt;
of 100 users would require almost 5000 keys if it used only symmetric cryptography.&lt;br /&gt;
Doubling such a network to 200 users increases the number of keys to almost&lt;br /&gt;
20,000.  Thus, when only using symmetric cryptography, key management quickly&lt;br /&gt;
becomes unwieldy even for relatively small-scale networks.&lt;br /&gt;
Key Generation Protocol&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4376</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4376"/>
		<updated>2011-04-21T22:42:54Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;===Advanced security commands===&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_block_small.png‎]]&lt;br /&gt;
&lt;br /&gt;
*Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
&#039;&#039;&#039;(config)# login delay [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_delay_small.png]]&lt;br /&gt;
*Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
&#039;&#039;&#039;(config)# login on-failure log&#039;&#039;&#039; [#]&lt;br /&gt;
&lt;br /&gt;
[[Image: success_login_small.png]]&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
&#039;&#039;&#039;(config)# security password min-length [number of characters]&lt;br /&gt;
&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
&#039;&#039;&#039;(config-line)# exec-timeout&#039;&#039;&#039; [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
 ::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
 &#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4375</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4375"/>
		<updated>2011-04-21T22:14:49Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;===Advanced security commands===&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_block_small.png‎]]&lt;br /&gt;
&lt;br /&gt;
*Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
&#039;&#039;&#039;(config)# login delay [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_delay_small.png]]&lt;br /&gt;
*Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
&#039;&#039;&#039;(config)# login on-failure log&#039;&#039;&#039; [#]&lt;br /&gt;
&lt;br /&gt;
[[Image: success_login_small.png]]&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
&#039;&#039;&#039;(config)# security password min-length [number of characters]&lt;br /&gt;
&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
&#039;&#039;&#039;(config-line)# exec-timeout&#039;&#039;&#039; [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
 ::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
 &#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Experiment: Configuring Basic security commands&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4374</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4374"/>
		<updated>2011-04-21T22:13:39Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;===Advanced security commands===&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_block_small.png‎]]&lt;br /&gt;
&lt;br /&gt;
*Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
&#039;&#039;&#039;(config)# login delay [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_delay_small.png]]&lt;br /&gt;
*Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
&#039;&#039;&#039;(config)# login on-failure log&#039;&#039;&#039; [#]&lt;br /&gt;
&lt;br /&gt;
[[Image: success_login_small.png]]&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
&#039;&#039;&#039;(config)# security password min-length [number of characters]&lt;br /&gt;
&lt;br /&gt;
[[Image: fail_login_small.png]]&lt;br /&gt;
*Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
&#039;&#039;&#039;(config-line)# exec-timeout&#039;&#039;&#039; [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
 ::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
 &#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4369</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4369"/>
		<updated>2011-04-21T21:38:58Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;====Advanced security commands====&#039;&#039;&#039;&lt;br /&gt;
*Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_block_small.png‎]]&lt;br /&gt;
*Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
&#039;&#039;&#039;(config)# login quiet-mode access-class&#039;&#039;&#039; [acl]&lt;br /&gt;
*Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
&#039;&#039;&#039;(config)# login delay [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_delay_small.png]]&lt;br /&gt;
*Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
&#039;&#039;&#039;(config)# login on-failure log&#039;&#039;&#039; [#]&lt;br /&gt;
*Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
&#039;&#039;&#039;(config)# security password min-length [number of characters]&lt;br /&gt;
&lt;br /&gt;
[[Image: success_login_small.png]]&lt;br /&gt;
*Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
&#039;&#039;&#039;(config-line)# exec-timeout&#039;&#039;&#039; [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
 ::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
 &#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4368</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4368"/>
		<updated>2011-04-21T21:37:35Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;====Advanced security commands====&#039;&#039;&#039;&lt;br /&gt;
*Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_block_small.png‎]]&lt;br /&gt;
*Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
&#039;&#039;&#039;(config)# login quiet-mode access-class&#039;&#039;&#039; [acl]&lt;br /&gt;
*Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
&#039;&#039;&#039;(config)# login delay [seconds]&lt;br /&gt;
&lt;br /&gt;
[[Image: login_delay_small.png]]&lt;br /&gt;
*Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
&#039;&#039;&#039;(config)# login on-failure log&#039;&#039;&#039; [#]&lt;br /&gt;
*Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
&#039;&#039;&#039;(config)# security password min-length [number of characters]&lt;br /&gt;
&lt;br /&gt;
[[Image: success_login_small.png]]&lt;br /&gt;
*Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
&#039;&#039;&#039;(config-line)# exec-timeout&#039;&#039;&#039; [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4367</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4367"/>
		<updated>2011-04-21T21:20:06Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on. These differ from enable and encryption commands as they are actions the router actively takes part in and incorporates in everyday activities.&lt;br /&gt;
**Service tcp-keepalives-in/out: Prevents VTY and Line messages from being sent indefinitely.  This command orders the router sends and recieve TCP keepalive messages. When a set amount of time has passed, the TCP protocol sends and empty TCP segment with only the ACK flag turned on. If the initiator sends a reply ACK, the connection resumes; but if not the router assumes the connection has died.&lt;br /&gt;
***Service TCP-keepalives-in: generates keepalive packets on incoming network connections (initiated by remote hosts).&lt;br /&gt;
&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-in&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
:*Service tcp-keepalives-out: Generates keepalive packets on outgoing network commands(initiated by user).&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# service tcp-keepalives-out&#039;&#039;&#039;&lt;br /&gt;
 ::*&#039;&#039;&#039;(config)# end&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:*Service Timestamp Logging: An application on the router that records debugging or system log events forwarded through the router. [debug]indicates timestamp is applied to debugging, [log]indicates system loggingg messages, [uptime] indicates the time the system was rebooted (listed in HHHH:MM:SS), [datetime] indicates the current time. and [year] indicates the year of the date. &lt;br /&gt;
::*&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [debug | log] [ uptime | datetime  [year]&lt;br /&gt;
:*Service Timestamp standard logging: A more simple version that only records events occuring on the system log.&lt;br /&gt;
&#039;&#039;&#039;Service timestamps&#039;&#039;&#039; [log] [datetime] [msec] [show-timezone] [localtime]&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4366</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4366"/>
		<updated>2011-04-21T20:31:48Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
[[Image: enable_password_encryption.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password_encryption.png&amp;diff=4365</id>
		<title>File:Enable password encryption.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password_encryption.png&amp;diff=4365"/>
		<updated>2011-04-21T20:28:46Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password.png&amp;diff=4364</id>
		<title>File:Enable password.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password.png&amp;diff=4364"/>
		<updated>2011-04-21T20:15:13Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4363</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4363"/>
		<updated>2011-04-21T20:03:20Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
[[Image: enable_secret.png]]&lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_secret.png&amp;diff=4362</id>
		<title>File:Enable secret.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_secret.png&amp;diff=4362"/>
		<updated>2011-04-21T20:01:28Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4361</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4361"/>
		<updated>2011-04-21T19:59:02Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
[[Image: Configure_console_password.png]]&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4360</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4360"/>
		<updated>2011-04-21T19:53:16Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
[[Image: cisco.jpg|right]]&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4359</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4359"/>
		<updated>2011-04-21T19:50:09Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.&lt;br /&gt;
[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. &lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password. &lt;br /&gt;
[[Image: vty_connection_password.png‎]]&lt;br /&gt;
&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Petlast&amp;diff=4358</id>
		<title>User:Petlast</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Petlast&amp;diff=4358"/>
		<updated>2011-04-21T19:45:22Z</updated>

		<summary type="html">&lt;p&gt;Petlast: moved User:Petlast to Basic and Advanced Router Security Configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Basic and Advanced Router Security Configuration]]&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4357</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4357"/>
		<updated>2011-04-21T19:45:22Z</updated>

		<summary type="html">&lt;p&gt;Petlast: moved User:Petlast to Basic and Advanced Router Security Configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. [[Image: basic_router_security.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password.  &lt;br /&gt;
&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4356</id>
		<title>Basic and Advanced Router Security Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Basic_and_Advanced_Router_Security_Configuration&amp;diff=4356"/>
		<updated>2011-04-21T19:42:48Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Configuring a Cisco Router ==&lt;br /&gt;
•	A Router defines a network. From its security, to making computers more scalable and easy to configure, to breaking apart broadcast domains and verifying information reaches its intended purpose, routers are essential to the security line of work and the process of securing our information. As an integral part, a router requires its own standard protection which can be configured via the console port. Router policies that are the simplest are the most often overlooked, and require careful implementation.&lt;br /&gt;
&lt;br /&gt;
==Basic Router Security Configuration==&lt;br /&gt;
*90% of all interactions users make with the router are through the virtual terminal server, or command line.  Therefore, in order to prevent users from accessing data inside and outside the network, a network administrator needs to be proficient in using the command line to patch security flaws and implement countermeasures. There are several basic command line tools users can run that can secure the router, and by extension the entire network.&lt;br /&gt;
&lt;br /&gt;
===Prevent access from inside the network===&lt;br /&gt;
*Although many attacks come from outside the network, there are some issues with internal threats; as simple as users acting without administrative privileges to an experienced hacker who attempts to retrieve data from a subnet. In this section, we will observe basic command line operations for password control, vty/tty access, and encrypting the saved configuration on the router to prevent back doors. Sometimes the most simple of features to run are the most integral, and it is very important to have an understanding of them.&lt;br /&gt;
&lt;br /&gt;
====Password Control====&lt;br /&gt;
*The enable secret command is used in order to set the password that grants administrative access to the Cisco router. The enable secret increases the security of the enable password command. If no enable secret is set and a password is configured from the Telnet line, the console password can be used to receive privileged access, even from a remote tty/vty session; causing potential damage to the network.&lt;br /&gt;
*The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file.  Such encryption is useful in order to prevent casual observers from reading passwords, such as when they shoulder-surf over an administrator.&lt;br /&gt;
&lt;br /&gt;
*The login Password Retry Lockout commands allows an administrator to “lock out” a local user account after a configured number of unsuccessful login attempts. By using the aaa access control model (Authentication, Authorization, and accounting) the router can refuse non-administrative users and disrupting brute force attacks. Once a user is locked out, their account is locked until the administrator unlocks it. An authorized user who is configured with privilege level 15 must be kept to a minimum.  Note that authorized user can lock themselves out of the router if the number of unsuccessful login attempts is reached.  &lt;br /&gt;
&lt;br /&gt;
===The Four Basics===&lt;br /&gt;
There are four steps everyone should know when configuring a router, and all configurations in the future will build on them some way or another. &lt;br /&gt;
*Set a console password&lt;br /&gt;
**The most basic form of security which prevents users from accessing the router when it is activated. They are operated by entering &#039;&#039;&#039;(config)# enable password&#039;&#039;&#039;, followed by your chosen password.[[Image: configure_console_password.png]]&lt;br /&gt;
*Encrypt passwords in your running configuration&lt;br /&gt;
**Console passwords are written in cleartext by default. They can be encrypted by inputting &#039;&#039;&#039;(config)# enable password-encryption&#039;&#039;&#039;. [[Image: basic_router_security.png]]&lt;br /&gt;
*Limit user capabilities with privilege level commands&lt;br /&gt;
**Enable global configuration mode passwords to prevent users from editing more than their level of authorization. Configured by entering &#039;&#039;&#039;(config)#&#039;&#039;&#039;, &#039;&#039;&#039;enable secret&#039;&#039;&#039;, followed by your chosen password. &lt;br /&gt;
*Set Telnet and Console passwords&lt;br /&gt;
**Encrypt the lines that allows users over a network to interface with the router. Performed by entering &#039;&#039;&#039;(config)# line console 0&#039;&#039;&#039; for console, &#039;&#039;&#039;line vty&#039;&#039;&#039; for Telnet; enter and inputting login, enter, password, followed by your desired password.  &lt;br /&gt;
&lt;br /&gt;
===Password Retry Logout===&lt;br /&gt;
Besides the basic commands for router security, even the least sophisticated hackers can permeate the network using techniques such as DOS and brute force. In order to prevent these new attacks, we need more complex techniques to build on top of the security we already have.&lt;br /&gt;
Configure Password Retry Logout: Causes a user to become “locked out” after a predefined number of failed login attempts. It is activated by enabling the aaa access control model on the router, specifying the number of failed login attempts, and setting the type of authentication method.&lt;br /&gt;
*&#039;&#039;&#039;(config)#&#039;&#039;&#039;  [username] [privilege level] &#039;&#039;&#039;password encryption-type password&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa new-model&#039;&#039;&#039; &lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa local authentication attempts max-fail&#039;&#039;&#039; [number of attempts allowed]&lt;br /&gt;
*&#039;&#039;&#039;(config)# aaa authentication login default&#039;&#039;&#039; [method, eg. &#039;&#039;&#039;Local&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
==Advanced Router Security Configuration==&lt;br /&gt;
Cisco offers many additional ways to secure our routers further by hardening passwords and creating methods to prevent brute force attacks. Here, we will look at additional commands that you may want to implement on your devices to secure them further. &lt;br /&gt;
&lt;br /&gt;
===Prevent Access from the Internet=== &lt;br /&gt;
A phenomenal amount of damage to routers and host computers alike comes from the internet. Firewalls, servers, and other methods of defense can prevent attacks and intrusion into the network, but the router itself has built-in abilities that allow it to protect itself from attacks fighting to get access. In this section, we will go over Advanced Security Commands, a plethora of configuration options that allow administrators to change password settings, block access from certain users, and deflect many different types of router manipulation. We will be able to secure ports and applications, disable unused services (router hardening), and block interfaces. Advanced security is advanced; a battle to stay one step ahead of anyone trying to permeate the router and the protection of your network.&lt;br /&gt;
Advanced security commands&lt;br /&gt;
Block Denied Logins- Useful for delaying denied logins when someone is trying to brute force the router. (config)# login bock-for [seconds] attempts [attempts] within [seconds]&lt;br /&gt;
Quiet Login – Allows a user to still login once the router has blocked login attempts because of above.&lt;br /&gt;
(config)# login quiet-mode access-class [acl]&lt;br /&gt;
Login Delay – Adds a delay at the point of a login being unsuccessful&lt;br /&gt;
(config)# login delay [seconds]&lt;br /&gt;
Login Logging – Generates a log after a certain amount of failed or successful attempts.&lt;br /&gt;
(config)# login on-failure log [#]&lt;br /&gt;
Min Password length – Ensures that any new password created on the router meets a minimum password length.&lt;br /&gt;
(config)# security password min-length [number of characters]&lt;br /&gt;
Set Timeout – Sets a time out period for the connection line (con / vty).&lt;br /&gt;
(config-line)# exec-timeout [min/hour]&lt;br /&gt;
&lt;br /&gt;
====Securing ports and applications====&lt;br /&gt;
*Some beneficial services are not enabled by default that can be turned on.&lt;br /&gt;
**Service tcp-keepalives-in&lt;br /&gt;
**Service tcp-keepalives-out&lt;br /&gt;
**Service timestamps debug datetime msec show-timezone localtime&lt;br /&gt;
**Service timestamps log datetime msec show-timezone localtime&lt;br /&gt;
&lt;br /&gt;
===Disabling unused services/Router Hardening===&lt;br /&gt;
There are many services that are enabled by default on Cisco Routers. Each can provide information an attacker can use. Routers are social butterflies by nature; they connect and exchange information with other routers that can be tampered with and modified by external sources, leaving the system vulnerable for attack. Occasional services can be removed in order to prevent potential breach, but it can interfere with these actions if they are needed later. Note: In order to make these changes permenant, run “copy running-config startup-config” at any time to save changes to the NVRAM.&lt;br /&gt;
*&#039;&#039;&#039;(config)# no service tcp-small-servers&#039;&#039;&#039; 		Disables unnecessary services such as echo, discard, and chargen. Disabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service udp-small-servers&#039;&#039;&#039;		Disables minor User Datagram Protocol services. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No service dhcp&#039;&#039;&#039; 			Disables DHCP servers, which are enabled by default. Almost never necessary. DHCP can also run Bootp requests.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip finger&#039;&#039;&#039;			Disables Finger Service, which can provide extensive user information. (eg, who is logged on to each system) &lt;br /&gt;
*&#039;&#039;&#039;(config)# No service config&#039;&#039;&#039;		Disables Service config, which which is enabled by defult and attempts to access server configuration files from a network Trivial File Transfer Protocol (TFTP) server&lt;br /&gt;
*&#039;&#039;&#039;(config)# No snmp-server&#039;&#039;&#039;		Disables Simple Network Management Protocol agent operation information upadates. Disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip bootp server&#039;&#039;&#039;		Disables the Bootstrap service on the router. Obtains the network location of the boot image an IP address. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http server&#039;&#039;&#039; 		Disables the Cisco Web browser interface, which allows configuration and monitoring of the router using any web server. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip http secure-server&#039;&#039;&#039; 	Disables Hyper Transfer Protocol Secure. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip gratuitous-arps&#039;&#039;&#039;		Disables the transmission of gratuitous-arps command in global configuration mode. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip source-route&#039;&#039;&#039;		Instructs the router to discard IP datagrams containing a source-rout option. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip directed-broadcast&#039;&#039;&#039; 	Disables IP broadcast to a specific subnet, which can leave the system vulnerable for smurf attacks. It is disabled by default.&lt;br /&gt;
*&#039;&#039;&#039;(config)# No ip unreachables&#039;&#039;&#039;		Prevents the Cisco router from sending UDP packets searching for ‘port unreachable’ messages.  Disabling causes traceroute to ‘break’, as it cannot comprehend routes ending in unreachable. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# No cdp run&#039;&#039;&#039;			Disables Cisco Discovery Protocol capability, which sends out multicast updates to neighbors. Enabled by default&lt;br /&gt;
*&#039;&#039;&#039;(config)# ip options drop&#039;&#039;&#039;		Drops or ignores IP option packets that are sent to the router. Enabled by default&lt;br /&gt;
====Commands for Individual Interfaces====&lt;br /&gt;
*&#039;&#039;&#039;No ip directed-broadcast&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip unreachables&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;No ip redirects&#039;&#039;&#039;				Disables ICMP, which sends redirected messages to clients. Prevents traffic redirection. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip mask-reply&#039;&#039;&#039;			Disables router responses to Internet Control Message Protocol (ICMP) mask requests. Enabled by default.&lt;br /&gt;
*&#039;&#039;&#039;No ip proxy-arp&#039;&#039;&#039;				Disables Proxy ARP, which helps machines reach remote subnets, but is vulnerable to intercepted packets or “Spoofing”. Enabled by default&lt;br /&gt;
===Disable interfaces===&lt;br /&gt;
Along with having services and abilities at its disposal that hackers can manipulate, physical hardware and the ports to the router themselves can also be attacked. Therefore, it is important to know how to be able to modify security on interfaces.&lt;br /&gt;
The first form of security on an interface is to disable it. There’s no door safer than a wall, so by completely blocking off a port, users from footprinting the network or using port-spying techniques to break into the router. To disable a port, enter the command prompt with global configuration mode, select the interface you want to close, and shut it down.&lt;br /&gt;
*&#039;&#039;&#039;Router&amp;gt; enable&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router# config terminal&#039;&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Router(config)# int &#039;&#039;&#039;&#039;&#039;&#039;[interface name, eg.&#039;&#039;&#039;&#039;&#039;&#039; fa0/1&#039;&#039;&#039;]&lt;br /&gt;
*&#039;&#039;&#039;Router(config-if)# shutdown&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cisco.jpg&amp;diff=4355</id>
		<title>File:Cisco.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cisco.jpg&amp;diff=4355"/>
		<updated>2011-04-21T19:35:08Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vty_connection_password.png&amp;diff=4354</id>
		<title>File:Vty connection password.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vty_connection_password.png&amp;diff=4354"/>
		<updated>2011-04-21T19:31:03Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Success_login_small.png&amp;diff=4353</id>
		<title>File:Success login small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Success_login_small.png&amp;diff=4353"/>
		<updated>2011-04-21T19:30:24Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Min_length.png&amp;diff=4351</id>
		<title>File:Min length.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Min_length.png&amp;diff=4351"/>
		<updated>2011-04-21T19:13:31Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_delay_small.png&amp;diff=4350</id>
		<title>File:Login delay small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_delay_small.png&amp;diff=4350"/>
		<updated>2011-04-21T19:12:59Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_block_small.png&amp;diff=4349</id>
		<title>File:Login block small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_block_small.png&amp;diff=4349"/>
		<updated>2011-04-21T19:12:16Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_block_attempts_small.png&amp;diff=4348</id>
		<title>File:Login block attempts small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Login_block_attempts_small.png&amp;diff=4348"/>
		<updated>2011-04-21T19:11:44Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Fail_login_small.png&amp;diff=4347</id>
		<title>File:Fail login small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Fail_login_small.png&amp;diff=4347"/>
		<updated>2011-04-21T19:10:49Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password_min_length_example.png&amp;diff=4346</id>
		<title>File:Enable password min length example.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Enable_password_min_length_example.png&amp;diff=4346"/>
		<updated>2011-04-21T19:10:13Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Configure_console_password.png&amp;diff=4345</id>
		<title>File:Configure console password.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Configure_console_password.png&amp;diff=4345"/>
		<updated>2011-04-21T19:09:39Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Basic_router_security.png&amp;diff=4344</id>
		<title>File:Basic router security.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Basic_router_security.png&amp;diff=4344"/>
		<updated>2011-04-21T19:09:15Z</updated>

		<summary type="html">&lt;p&gt;Petlast: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Petlast</name></author>
	</entry>
</feed>