Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation

Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4

Abstract

This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.

Authors and Affiliations

Faisal Waheed, Maaruf Ali

Keywords

Related Articles

Cultural, Economic and Societal Impacts on Users’ Behaviour and Mobile Broadband Adoption Trends

The diverse range of Internet enabled devices both mobile and fixed has not only impacted the global economy but the very fabric of human communications and lifestyles. The ease of access and lowered cost has enabled hit...

Mobile Assisted Language Learning (MALL) – A Brief Survey

This research article presents a brief survey of language learning applications implemented on mobile computing devices, such as cellular mobile phones. The corpus of the literature show the efficacy and effectiveness of...

A Survey of Distributed Certificate Authorities in MANETs

A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an...

Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protec...

Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks

Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the netw...

Download PDF file
  • EP ID EP394211
  • DOI 10.33166/AETiC.2018.04.002
  • Views 110
  • Downloads 0

How To Cite

Faisal Waheed, Maaruf Ali (2018). Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation. Annals of Emerging Technologies in Computing, 2(4), 11-27. https://www.europub.co.uk/articles/-A-394211