Set Banner; Enable Logging - Cisco ROUTER-SDM-CD User Manual

User guide
Table of Contents

Advertisement

Fix It Page

Set Banner

Enable Logging

Cisco Router and Security Device Manager 2.5 User's Guide
24-14
connections, this can overwhelm and disable the host. Setting the TCP synwait
time to 10 seconds causes the router to shut down an incomplete connection after
10 seconds, preventing the buildup of incomplete connections at the host.
The configuration that will be delivered to the router to set the TCP synwait time
to 10 seconds is as follows:
ip tcp synwait-time <10>
Security Audit configures a text banner whenever possible. In some jurisdictions,
civil and/or criminal prosecution of crackers who break into your systems is made
much easier if you provide a banner informing unauthorized users that their use
is in fact unauthorized. In other jurisdictions, you may be forbidden to monitor
the activities of even unauthorized users unless you have taken steps to notify
them of your intent to do so. The text banner is one method of performing this
notification.
The configuration that will be delivered to the router to create a text banner is as
follows, replacing <company name>, <administrator email address>, and
<administrator phone number> with the appropriate values that you enter into
Security Audit:
banner ~
Authorized access only
This system is the property of <company name> Enterprise.
Disconnect IMMEDIATELY as you are not an authorized user!
Contact <administrator email address> <administrator phone number> .
~
Security Audit will enable logging with time stamps and sequence numbers
whenever possible. Because it gives detailed information about network events,
logging is critical in recognizing and responding to security events. Time stamps
and sequence numbers provide information about the date and time and sequence
in which network events occur.
The configuration that will be delivered to the router to enable and configure
logging is as follows, replacing <log buffer size> and <logging server ip
address> with the appropriate values that you enter into Security Audit:
Chapter 24
Security Audit
OL-4015-12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents