Hardening cisco devices based on cryptography and security protocols-part ii: Implementation and evaluation

2Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.

Cite

CITATION STYLE

APA

Waheed, F., & Ali, M. (2018). Hardening cisco devices based on cryptography and security protocols-part ii: Implementation and evaluation. Annals of Emerging Technologies in Computing, 2(4), 11–27. https://doi.org/10.33166/AETiC.2018.04.002

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free