03-07-2011 11:13 AM - edited 03-11-2019 01:02 PM
Hi!
I have setup the network as per the attached topology. All remote sites are able to access the Main site Application Server.
My issues are as follows:
Are the routers already encrypting the data which is being transmitted?
If yes, how is the encryption/decryption processes performed?
If no, is there some configuration that needs to be done on the routers to turn encryption on?
Please see attached topology.
Thanks,
Alvin
Solved! Go to Solution.
03-07-2011 05:53 PM
Hi,
To prevent DoS on an ASA level you can do some things (i found the following making a quick search in CSC):
For DDOS / DOS attacks see below a reference for configuring threat detection
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_threat.html
If you want to provide protection for against spam, spyware, viruses, phishing, etc that enters your network via email, HTTP, or FTP traffic then you would use a CSC modules. See the link below
See below a Q&A for the product
An IPS modue provides protection by blocking threats such as distributed denial of service attacks, reconnaissance attacks, and attacks against operating system and application vulnerabilities. See below
See below a Q&A for the product
The 5510 & 5520's only have one expansion slot for security services modules so you can install only of these devices.
For the other question... the fact that the routers have an advanced services image means they can encrypt the data and provide additional security features.
The routers are NOT encrypting the data by default.
They CAN be configured to encrypt data before sending packets out (as you would normally have when configuring an IPsec tunnel).
Hope it helps.
Federico.
03-07-2011 06:03 PM
Hello Alvin,
Just to add a little more to what Fedrico has shared, on IOS we can use TCP intercept feature availble in advipservicesk9 image.
Here are few links for your better understanding & reference:
Hope this helps. Please reply if you need further assistance.
Regards,
Chirag
P.S.: Please mark this thread as answered if you feel your query is answered. Do rate helpful posts.
03-07-2011 05:53 PM
Hi,
To prevent DoS on an ASA level you can do some things (i found the following making a quick search in CSC):
For DDOS / DOS attacks see below a reference for configuring threat detection
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_threat.html
If you want to provide protection for against spam, spyware, viruses, phishing, etc that enters your network via email, HTTP, or FTP traffic then you would use a CSC modules. See the link below
See below a Q&A for the product
An IPS modue provides protection by blocking threats such as distributed denial of service attacks, reconnaissance attacks, and attacks against operating system and application vulnerabilities. See below
See below a Q&A for the product
The 5510 & 5520's only have one expansion slot for security services modules so you can install only of these devices.
For the other question... the fact that the routers have an advanced services image means they can encrypt the data and provide additional security features.
The routers are NOT encrypting the data by default.
They CAN be configured to encrypt data before sending packets out (as you would normally have when configuring an IPsec tunnel).
Hope it helps.
Federico.
03-07-2011 06:03 PM
Hello Alvin,
Just to add a little more to what Fedrico has shared, on IOS we can use TCP intercept feature availble in advipservicesk9 image.
Here are few links for your better understanding & reference:
Hope this helps. Please reply if you need further assistance.
Regards,
Chirag
P.S.: Please mark this thread as answered if you feel your query is answered. Do rate helpful posts.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide