SlideShare une entreprise Scribd logo
1  sur  60
www.professordkinney.com
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Lesson Objectives:
Securing Administrative Access
Implementing Device Hardening
Implementing Traffic Filtering
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing Administrative Access to a Cisco Router
Configuring administrative access on the Cisco router is an
important step toward network security. You can access all
Cisco routers in various ways:
Console
VTY
Aux
SNMP
HTTP
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Connection Through the Console Port
To protect administrative access to the routers, you must
protect the console port via a password policy. You can
store passwords locally on the router or use some kind of
remote administration using a Cisco Secure Access Control
Server authentication, authorization, and accounting
(AAA) server. You can store passwords locally on the
router or use Remote Authentication Dial-In User Service
(RADIUS) or Terminal Access Controller Access Control
System + (TACACS+) for remote AAA using CSACS.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Password Policy
You should keep the following rules in mind when
formulating a password policy:
Acceptable password length must be between 1 and 25
characters. Blank passwords are not a part of a good
security policy. The passwords should contain
alphanumeric, uppercase, and lowercase characters.
On Cisco equipment, the first character in the password
cannot be a number.
Leading spaces in the password are ignored; however.
spaces after the first character are not ignored.
Passwords must be changed often, and using the same
passwords over again should be avoided.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing Privilege EXEC Mode Using the enable
secret Command
When you first power on the router, assuming that
there is no prior configuration stored in the
nonvolatile RAM (NVRAM), the router enters the
Initial Configuration dialog box. The Initial
Configuration dialog box is a menu system that assists
you in applying basic configuration on the router. You
can use Ctrl+Z to break out of the Initial
Configuration dialog box.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
To make changes to the router configuration, you have to
first enter privilege EXEC mode. By default, you do not
need a password to access privilege EXEC mode. You can
use the enable command to access the privilege EXEC
mode of a router:
Router> enable Router#Once you are in privilege EXEC
mode, you can then secure privilege EXEC mode on the
routers using the enable secret command in global
configuration mode. The enable secret command encrypts
the password to the privilege EXEC mode using the
Message Digest 5 (MD5) hashing algorithm. It is a one-way
hash. In other words, once you have a password using
MD5, you cannot unhash it:
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Router> enable
 Router# configure terminal
Router(config)# enable secret Passwordciscorocks
Router(config)#
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
if you do a show running-config on the router, you will
note that the enable secret is encrypted and
the 5 after enable secret identifies that it is an MD5 hash.
Here is an example to illustrate this concept:
Router# show running-config
 ! Last configuration change at 14:34:43 MST Wed Jul 16
2003
! NVRAM config last updated at 14:34:44 MST Wed Jul 16
2003
! version 12.3 service timestamps debug uptime service
timestamps log uptime service password-encryption !
hostname Router !
 enable secret 5 $1$oeJp$08vrQkQWGgsz5S5h.VqQe/ !
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing Console Access Using a Console Password
A Cisco router's console port is the most important port
on the device. Password recovery on the router can only be
done using the console port. This port can be used to
access the ROMMON mode on the router as well. The
console port allows a hard break signal that interrupts the
boot sequence of the router. You can issue the break
sequence on a router within 60 seconds of the reboot, and
it gives complete access to the user issuing this command.
Cisco routers are vulnerable if you have physical access to
the devices. However, if someone is trying to access the
console port of the router remotely, you can apply an
additional layer of security by prompting the user for a
password.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Here is how you protect the console port on the router:
 Router> enable
 Router# configure terminal
 Router(config)# line console 0
 Router(config-line)# password Ciscorocks123 Router(config-line)# login
 Router(config-line)# end Router#
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing VTY Access Using a Telnet Password
By default, all Cisco routers support up to five
simultaneous Telnet sessions, and by default, no passwords
are assigned to these Telnet or VTY lines. There is built-in
security on the VTY lines that mandates the use of
passwords to access the router via a Telnet session. If a
Telnet session is initiated to a router that does not have a
password assigned to the VTY lines, the following message
appears on the screen:
telnet 172.31.100.11 Trying... Connected to 172.31.100.11
Escape character is '^]'. Password required, but not set
Connection closed by remote host
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Here is how you protect the Telnet lines on the router:
Router> enable
Router# configure terminal
Router(config)# line vty 0 4
Router(config-line)# password VtyLines123 Router(config-line)# login
Router(config-line)# end
Router#
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
You should consider a few guidelines when configuring VTY access
to the router:
If there is no password set on the router to access the
privilege EXEC mode, you will not be able to access the
privilege EXEC mode of the router via the Telnet session.
Telnet transmits and receives all data in clear text, even
the passwords. To provide additional security in this
aspect, you can use Secured Shell (SSH) or administer the
router via an IPSec tunnel. You can provide additional
security by using access lists to manage administrative
access to the routers from specific IP addresses.
Remember, Cisco routers work with SSH1 only.
Make sure you have a password assigned to the VTY lines
of the router; otherwise, no one will be able to access the
router via Telnet.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
The aux port on the router is another way you can gain access to the router. You
can protect the aux port on the router by assigning a password to it. Here is
how you accomplish the task:
Router> enable
Router# configure terminal
Router(config)# line aux 0
Router(config-line)# password ProtectAux0 Router(config-line)# login
Router(config-line)# end
Router#In this example, every time a user accesses the router via the aux port, he or she will
be prompted for a password.
If you are not using the aux port on the router, you can disable it by issuing the following
command:
Router(config)# line aux 0 Router(config-line)# no exec
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Encrypting All Passwords on the Router
By default, only the enable secret password is encrypted.
To encrypt all other passwords configured on the router,
issue the following command in global configuration
mode:
Router(config)# service password-encryption
The service password-encryption command uses a Cisco proprietary Vigenere
cipher to encrypt all other passwords on the router except the enable secret
password (which uses MD5). The Vigenere cipher is easy to break, and if you
do a show running-config on the router, it appears as follows:
line con 0
 password 7 110A1016141D
logging synchronous
 login
 transport input none
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
 The number 7 after the keyword password indicates that the password has
been encrypted using the Vigenere cipher. This command does not change the
fact that the Vigenere cipher can be cracked. In fact, you can download the
GETPASS utility, which will decrypt the Vigenere cipher for you.
Configuring Session Activity Timeouts
You can also control access to the router by configuring activity
timeouts. You can use the exec-timeout command to accomplish this
task. Here is an example of the configuration:
line console 0 exec-timeout 5 0 end
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Configuring Access Levels on the Router
 You can configure access levels on the routers so the junior administrators do not have
complete access to the router. Cisco routers have 16 different privilege levels that you
can configure. The 16 levels range from 0 to 15, where 15 is equal to full access. You can
customize levels 2 to 15 to provide monitoring abilities to the secondary administrators.
Here is a sample configuration for privilege levels on the router:
Central(config)#username junioradmin privilege 3 password
0 s3cUr!tY
Central(config)#privilege exec level 3 ping
Central(config)#privilege exec level 3 traceroute
Central(config)#privilege exec level 3 show ip route
Central(config-line)#line vty 0 4
Central(config-line)#password CisC0r0cK5
Central(config-line)#login local
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Notice that in addition to the login local command a
password is configured on the VTY lines. However,
users will need to use the local router database to log
in to the VTY lines because the login local command
takes precedence over the password command.
Looking at this config, whenever junioradmin logs
into the router, he or she is allowed only three
commands: ping, traceroute, and show ip route. Using
the privilege command, you can provide another layer
of security to your network backbone.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Configuring Routers with a Statutory Warning
It is imperative that you configure a statutory warning on all your networking devices that
clearly states the repercussions of attempting to log on to an unauthorized system. You
can achieve this by using various banner messages:
 banner exec—You can use this command to specify a message that appears when an
EXEC process is initiated.
 banner motd—You can use this command to enable a message of the day for your
admins and team.
 banner login—You can use this command to enable messages that appear before
username and password prompts.
 You can configure a few more banner messages on routers to ensure that you get the
word out that unauthorized users will be prosecuted.
 Just an FYI: Do not use such phrases as "Welcome to the ABC Network" because they can
create a loophole that a hacker can use to avoid legal action. We highly recommend that
you consult your legal department to come up with the correct verbiage.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing SNMP
SNMP is one of the most exploited protocols and can be
used to gain administrative access to Cisco routers by
establishing communication between a router's internal
SNMP agent and management information base (MIB).
SNMP uses community strings that act as the passwords to
access the routers. Whenever you are setting up SNMP
community strings, make sure you know which strings will
have read-only access; which ones will have read-write
access; and, most of all, which systems will be allowed
SNMP access via ACLs.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Implementing Device Hardening
Secure your Cisco IOS® system devices, which increases the overall security of your
network. Structured around the three planes into which functions of a network device
can be categorized, this document provides an overview of each included feature and
references to related documentation.
The three functional planes of a network, the management plane, control plane, and data
plane, each provide different functionality that needs to be protected.
 Management Plane—The management plane manages traffic that is sent to the Cisco
IOS device and is made up of applications and protocols such as SSH and SNMP.
 Control Plane—The control plane of a network device processes the traffic that is
paramount to maintaining the functionality of the network infrastructure. The control
plane consists of applications and protocols between network devices, which includes
the Border Gateway Protocol (BGP), as well as the Interior Gateway Protocols (IGPs)
such as the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest
Path First (OSPF).
 Data Plane—The data plane forwards data through a network device. The data plane
does not include traffic that is sent to the local Cisco IOS device.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Management Plane
The management plane consists of functions that achieve the management goals of the
network. This includes interactive management sessions using SSH, as well as statistics-
gathering with SNMP or Net Flow. When you consider the security of a network device,
it is critical that the management plane be protected. If a security incident is able to
undermine the functions of the management plane, it can be impossible for you to
recover or stabilize the network.
General Management Plane Hardening
The management plane is used in order to access, configure, and manage a device, as well as
monitor its operations and the network on which it is deployed. The management plane
is the plane that receives and sends traffic for operations of these functions. You must
secure both the management plane and control plane of a device, as operations of the
control plane directly affect operations of the management plane. This list of protocols is
used by the management plane:
 Simple Network Management Protocol
 Telnet
 Secure Shell Protocol
 File Transfer Protocol
 Trivial File Transfer Protocol
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
 Secure Copy Protocol
 TACACS+
 RADIUS
 NetFlow
 Network Time
Protocol
 Syslog
Managing Network Device Security
Password Management
The enable secret command is used in order to set the password that grants privileged
administrative access to the Cisco IOS system. The enable secret command must be
used, rather than the older enable password command. The enable password command
uses a weak encryption algorithm.
The service password-encryption global configuration command directs the Cisco IOS
software to encrypt the passwords, Challenge Handshake Authentication Protocol
(CHAP) secrets, and similar data that are saved in its configuration file. Such encryption
is useful in order to prevent casual observers from reading passwords, such as when they
look at the screen over the muster of an administrator.
While this weak encryption algorithm is not used by the enable secret command, it is used
by the enable password global configuration command, as well as the password line
configuration command. Passwords of this type must be eliminated and the enable
secret command or the Enhanced Password Security feature needs to be used.
The enable secret command and the Enhanced Password Security feature use Message
Digest 5 (MD5) for password hashing. This algorithm has had considerable public review
and is not known to be reversible.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Enhanced Password Security
The feature Enhanced Password Security, introduced in Cisco IOS Software Release
12.2(8)T, allows an administrator to configure MD5 hashing of passwords for
the username command. Prior to this feature, there were two types of passwords: Type 0,
which is a cleartext password, and Type 7, which uses the algorithm from the Vigenère
cipher. The Enhanced Password Security feature cannot be used with protocols that
require the cleartext password to be retrievable, such as CHAP.
In order to encrypt a user password with MD5 hashing, issue the username secret global
configuration command.
!
username <name> secret <password>
!
Refer to Enhanced Password Security for more information about this feature.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Login Password Retry Lockout
The Login Password Retry Lockout feature, added in Cisco IOS Software Release 12.3(14)T,
allows an you to lock out a local user account after a configured number of unsuccessful
login attempts. Once a user is locked out, their account is locked until you unlock it. An
authorized user who is configured with privilege level 15 cannot be locked out with this
feature. The number of users with privilege level 15 must be kept to a minimum.
Note that authorized users can lock themselves out of a device if the number of
unsuccessful login attempts is reached. Additionally, a malicious user can create a denial
of service (DoS) condition with repeated attempts to authenticate with a valid username.
This example shows how to enable the Login Password Retry Lockout feature:
!
aaa new-model
aaa local authentication attempts max-fail <max-attempts>
aaa authentication login default local
!
username <name> secret <password>
!
This feature also applies to authentication methods such as CHAP and Password
Authentication Protocol (PAP).
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
No Service Password-Recovery
In Cisco IOS Software Release 12.3(14)T and later, the No Service Password-Recovery feature
does not allow anyone with console access to insecurely access the device configuration
and clear the password. It also does not allow malicious users to change the
configuration register value and access NVRAM.
!
no service password-recovery
!
Cisco IOS software provides a password recovery procedure that relies upon access to
ROMMON mode using the Break key during system startup. In ROMMON mode, the
device software can be reloaded to prompt a new system configuration that includes a
new password.
The current password recovery procedure enables anyone with console access to access the
device and its network. The No Service Password-Recovery feature prevents the
completion of the Break key sequence and the entering of ROMMON mode during
system startup.
If no service password-recovery is enabled on a device, it is recommended that an offline
copy of the device configuration be saved and that a configuration archiving solution be
implemented. If it is necessary to recover the password of a Cisco IOS device once this
feature is enabled, the entire configuration is deleted.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Disable Unused Services
As a security best practice, any unnecessary service must be disabled. These unneeded
services, especially those that use UDP (User Datagram Protocol), are infrequently used
for legitimate purposes, but can be used in order to launch DoS and other attacks that
are otherwise prevented by packet filtering.
The TCP and UDP small services must be disabled. These services include:
 echo (port number 7)
 discard (port number 9)
 daytime (port number 13)
 chargen (port number 19)
Although abuse of the small services can be avoided or made less dangerous by anti-
spoofing access lists, the services must be disabled on any device accessible within the
network. The small services are disabled by default in Cisco IOS Software Releases 12.0
and later. In earlier software, the no service tcp-small-servers and no service udp-small-
servers global configuration commands can be issued in order to disable them.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
This is a list of additional services that must be disabled if not in use:
 Issue the no ip finger global configuration command in order to disable Finger service.
Cisco IOS software releases later than 12.1(5) and 12.1(5)T disable this service by default.
 Issue the no ip bootp server global configuration command in order to disable
Bootstrap Protocol (BOOTP).
 In Cisco IOS Software Release 12.2(8)T and later, issue the ip dhcp bootp
ignore command in global configuration mode in order to disable BOOTP. This leaves
Dynamic Host Configuration Protocol (DHCP) services enabled.
 DHCP services can be disabled if DHCP relay services are not required. Issue the no
service dhcp command in global configuration mode.
 Issue the no mop enabled command in interface configuration mode in order to
disable the Maintenance Operation Protocol (MOP) service.
 Issue the no ip domain-lookup global configuration command in order to disable
Domain Name System (DNS) resolution services.
 Issue the no service pad command in global configuration mode in order to disable
Packet Assembler/Disassembler (PAD) service, which is used for X.25 networks.
 HTTP server can be disabled with the no ip http server command in global configuration
mode, and Secure HTTP (HTTPS) server can be disabled with the no ip http secure-
server global configuration command.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
 Unless Cisco IOS devices retrieve configurations from the network during startup,
the no service config global configuration command must be used. This prevents the
Cisco IOS device from attempting to locate a configuration file on the network using
TFTP.
 Cisco Discovery Protocol (CDP) is a network protocol that is used in order to discover
other CDP enabled devices for neighbor adjacency and network topology. CDP can be
used by Network Management Systems (NMS) or during troubleshooting. CDP must be
disabled on all interfaces that are connected to untrusted networks. This is
accomplished with the no cdp enable interface command. Alternatively, CDP can be
disabled globally with the no cdp run global configuration command. Note that CDP
can be used by a malicious user for reconnaissance and network mapping.
 Link Layer Discovery Protocol (LLDP) is an IEEE protocol that is defined in 802.1AB.
LLDP is similar to CDP. However, this protocol allows interoperability between other
devices that do not support CDP. LLDP must be treated in the same manner as CDP and
disabled on all interfaces that connect to untrusted networks. In order to accomplish
this, issue the no lldp transmit and no lldp receive interface configuration
commands. Issue the no lldp run global configuration command in order to disable
LLDP globally. LLDP can also be used by a malicious user for reconnaissance and
network mapping.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
EXEC Timeout
In order to set the interval that the EXEC command interpreter waits for user input before
it terminates a session, issue the exec-timeout line configuration command. The exec-
timeout command must be used in order to logout sessions on vty or tty lines that are
left idle. By default, sessions are disconnected after 10 minutes of inactivity.
!
line con 0
exec-timeout <minutes> [seconds]
line vty 0 4
exec-timeout <minutes> [seconds]
!
Keepalives for TCP Sessions
The service tcp-keepalive-in and service tcp-keepalive-out global configuration
commands enable a device to send TCP keepalives for TCP sessions. This configuration
must be used in order to enable TCP keepalives on inbound connections to the device
and outbound connections from the device. This ensures that the device on the remote
end of the connection is still accessible and that half-open or orphaned connections are
removed from the local Cisco IOS device.
!
service tcp-keepalive-in service tcp-keepalive-out
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Using Management Interfaces
The management plane of a device is accessed in-band or out-of-band on a
physical or logical management interface. Ideally, both in-band and out-of-
band management access exists for each network device so that the
management plane can be accessed during network outages.
One of the most common interfaces that is used for in-band access to a device is
the logical loopback interface. Loopback interfaces are always up, whereas
physical interfaces can change state, and the interface can potentially not be
accessible. It is recommended to add a loopback interface to each device as a
management interface and that it be used exclusively for the management
plane. This allows the administrator to apply policies throughout the network
for the management plane. Once the loopback interface is configured on a
device, it can be used by management plane protocols, such as SSH, SNMP,
and syslog, in order to send and receive traffic.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Memory Threshold Notifications
The feature Memory Threshold Notification, added in Cisco IOS Software Release 12.3(4)T,
allows you to mitigate low-memory conditions on a device. This feature uses two
methods to accomplish this: Memory Threshold Notification and Memory Reservation.
Memory Threshold Notification generates a log message in order to indicate that free
memory on a device has fallen lower than the configured threshold. This configuration
example shows how to enable this feature with the memory free low-watermark
global configuration command. This enables a device to generate a notification when
available free memory falls lower than the specified threshold, and again when available
free memory rises to five percent higher than the specified threshold.
!
memory free low-watermark processor <threshold>
memory free low-watermark io <threshold>
!
Memory Reservation is used so that sufficient memory is available for critical notifications.
This configuration example demonstrates how to enable this feature. This ensures that
management processes continue to function when the memory of the device is
exhausted.
!
memory reserve critical <value>
!
08/08/13 Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Reserve Memory for Console Access
In Cisco IOS Software Release 12.4(15)T and later, the Reserve Memory for Console Access
feature can be used in order to reserve enough memory to ensure console access to a
Cisco IOS device for administrative and troubleshooting purposes. This feature is
especially beneficial when the device runs low on memory. You can issue the memory
reserve console global configuration command in order to enable this feature. This
example configures a Cisco IOS device to reserve 4096 kilobytes for this purpose.
!
memory reserve console 4096
!
Network Time Protocol
The Network Time Protocol (NTP) is not an especially dangerous service, but any unneeded
service can represent an attack vector. If NTP is used, it is important to explicitly
configure a trusted time source and to use proper authentication. Accurate and reliable
time is required for syslog purposes, such as during forensic investigations of potential
attacks, as well as for successful VPN connectivity when depending on certificates for
Phase 1 authentication.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
NTP Time Zone—When configuring NTP the time zone needs to be configured so that
timestamps can be accurately correlated. There are usually two approaches to
configuring the time zone for devices in a network with a global presence. One method
is to configure all network devices with the Coordinated Universal Time (UTC)
(previously Greenwich Mean Time (GMT)). The other approach is to configure network
devices with the local time zone. More information on this feature can be found in
“clock timezone” in the Cisco product documentation.
NTP Authentication—Configuring NTP authentication provides assurance that NTP
messages are exchanged between trusted NTP peers. Refer to ntp authenticate and ntp
authentication-key for more information on how to configure NTP authentication.
Limiting Access to the Network with Infrastructure
ACLs
 Devised to prevent unauthorized direct communication to network devices,
infrastructure access control lists (iACLs) are one of the most critical security controls
that can be implemented in networks. Infrastructure ACLs leverage the idea that nearly
all network traffic traverses the network and is not destined to the network itself.
 An iACL is constructed and applied to specify connections from hosts or networks that
need to be allowed to network devices. Common examples of these types of connections
are eBGP, SSH, and SNMP. After the required connections have been permitted, all other
traffic to the infrastructure is explicitly denied. All transit traffic that crosses the network
and is not destined to infrastructure devices is then explicitly permitted.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
The protections provided by iACLs are relevant to both the management and control
planes. The implementation of iACLs can be made easier through the use of distinct
addressing for network infrastructure devices. Refer to A Security Oriented Approach to
IP Addressing for more information on the security implications of IP addressing.
This example iACL configuration illustrates the structure that must be used as a starting
point when you begin the iACL implementation process:
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Once created, the iACL must be applied to all interfaces that face non-infrastructure
devices. This includes interfaces that connect to other organizations, remote access
segments, user segments, and segments in data centers.
ICMP Packet Filtering
The Internet Control Message Protocol (ICMP) is designed as an IP control protocol. As
such, the messages it conveys can have far-reaching ramifications to the TCP and IP
protocols in general. While the network troubleshooting tools ping andtraceroute use
ICMP, external ICMP connectivity is rarely needed for the proper operation of a network.
Cisco IOS software provides functionality to specifically filter ICMP messages by name or
type and code. This example ACL, which must be used with the access control entries
(ACEs) from previous examples, allows pings from trusted management stations and
NMS servers and blocks all other ICMP packets:
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Filtering IP Fragments
 The filtering of fragmented IP packets can pose a challenge to security devices. This is
because the Layer 4 information that is used in order to filter TCP and UDP packets is
only present in the initial fragment. Cisco IOS software uses a specific method to check
non-initial fragments against configured access lists. Cisco IOS software evaluates these
non-initial fragments against the ACL and ignores any Layer 4 filtering information. This
causes non-initial fragments to be evaluated solely on the Layer 3 portion of any
configured ACE.
 In this example configuration, if a TCP packet destined to 192.168.1.1 on port 22 is
fragmented in transit, the initial fragment is dropped as expected by the second ACE
based on the Layer 4 information within the packet. However, all remaining (non-initial)
fragments are allowed by the first ACE based completely on the Layer 3 information in
the packet and ACE. This scenario is shown in this configuration:
!
ip access-list extended ACL-FRAGMENT-EXAMPLE
permit tcp any host 192.168.1.1 eq 80 deny tcp any host 192.168.1.1 eq 22
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
 Due to the no intuitive nature of fragment handling, IP fragments are often
inadvertently permitted by ACLs. Fragmentation is also often used in attempts to evade
detection by intrusion detection systems. It is for these reasons that IP fragments are
often used in attacks, and why they must be explicitly filtered at the top of any
configured iACLs. This example ACL includes comprehensive filtering of IP fragments.
The functionality from this example must be used in conjunction with the functionality
of the previous examples.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
ACL Support for Filtering IP Options
Cisco IOS Software Release 12.3(4)T added support for the use of ACLs to filter IP packets based on the
IP options that are contained in the packet. IP options present a security challenge for network
devices because these options must be processed as exception packets. This requires a level of CPU
effort that is not required for typical packets that traverse the network. The presence of IP options
within a packet can also indicate an attempt to subvert security controls in the network or otherwise
alter the transit characteristics of a packet. It is for these reasons that packets with IP options must
be filtered at the edge of the network.
This example must be used with the ACEs from previous examples in order to include complete filtering
of IP packets that contain IP options:
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing Interactive Management Sessions
Management sessions to devices allow you the ability to view and collect information about
a device and its operations. If this information is disclosed to a malicious user, the device
can become the target of an attack, compromised, and used in order to perform
additional attacks. Anyone with privileged access to a device has the capability for full
administrative control of that device. Securing management sessions is imperative to
prevent information disclosure and unauthorized access.
Management Plane Protection
Beginning with Cisco IOS Software Release 12.4(6)T, the feature Management Plane Protection (MPP)
allows an administrator to restrict on which interfaces management traffic can be received by a
device. This allows the administrator additional control over a device and how the device is accessed.
This example shows how to enable the MPP to only allow SSH and HTTPS on the GigabitEthernet0/1
interface:
!
control-plane host
management-interface GigabitEthernet 0/1 allow ssh https
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Control Plane Protection
Control Plane Protection (CPPr) builds on the functionality of Control Plane Policing in
order to restrict and police control plane traffic that is destined to the route processor of
the IOS device. CPPr, added in Cisco IOS Software Release 12.4(4)T, divides the control
plane into separate control plane categories that are known as subinterfaces. Three
control plane subinterfaces exist: Host, Transit and CEF-Exception. In addition, CPPr
includes these additional control plane protection features:
Port-filtering feature—This feature provides for the policing or dropping of packets
going to closed or non-listening TCP and UDP ports.
Queue-threshold policy feature—This feature limits the number of packets for a
specified protocol that are allowed in the control plane IP input queue.
CPPr allows an administrator to classify, police, and restrict traffic that is sent to a device
for management purposes using the host subinterface. Examples of packets that are
classified for the host subinterface category include management traffic such as SSH or
Telnet and routing protocols.
Note that CPPr does not support IPv6 and is restricted to the IPv4 input path.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Encrypting Management Sessions
Because information can be disclosed during an interactive management session, this traffic
must be encrypted so that a malicious user cannot gain access to the data being
transmitted. Encrypting the traffic allows a secure remote access connection to the
device. If the traffic for a management session is sent over the network in cleartext, an
attacker can obtain sensitive information about the device and the network.
An administrator is able to establish an encrypted and secure remote access management
connection to a device by using the SSH or HTTPS (Secure Hypertext Transfer Protocol)
features. Cisco IOS software supports SSH version 1.0 (SSHv1), SSH version 2.0 (SSHv2),
and HTTPS that uses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) for
authentication and data encryption. Note that SSHv1 and SSHv2 are not compatible.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Cisco IOS software also supports the Secure Copy Protocol (SCP), which allows an
encrypted and secure connection for copying device configurations or software images.
SCP relies on SSH. This example configuration enables SSH on a Cisco IOS device:
!
ip domain-name example.com
!
crypto key generate rsa modulus 2048
!
ip ssh time-out 60
ip ssh authentication-retries 3
ip ssh source-interface GigabitEthernet 0/1
!
line vty 0 4
transport input ssh
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
This configuration example enables SCP services:
!
ip scp server enable
!
This is a configuration example for HTTPS services:
!
crypto key generate rsa modulus 2048
!
ip http secure-server
!
SSHv2
The SSHv2 support feature introduced in Cisco IOS Software Release 12.3(4)T allows a user
to configure SSHv2. (SSHv1 support was implemented in an earlier release of Cisco IOS
Software.) SSH runs on top of a reliable transport layer and provides strong
authentication and encryption capabilities. The only reliable transport that is defined for
SSH is TCP. SSH provides a means to securely access and securely execute commands on
another computer or device over a network. The Secure Copy Protocol (SCP) feature that
is tunneled over SSH allows for the secure transfer of files.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
The following example configuration enables SSHv2 (with SSHv1 disabled) on a Cisco IOS
device:
!
hostname router
!
ip domain-name example.com
!
crypto key generate rsa modulus 2048
!
ip ssh time-out 60
ip ssh authentication-retries 3
ip ssh source-interface GigabitEthernet 0/1
!
ip ssh version 2
!
line vty 0 4 transport input ssh
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Console and AUX Ports
If password recovery is not required, then an administrator can remove the ability to
perform the password recovery procedure using the no service password-recovery global
configuration command; however, once the no service password-recoverycommand has
been enabled, an administrator can no longer perform password recovery on a device.
In most situations, the AUX port of a device must be disabled to prevent unauthorized
access. An AUX port can be disabled using these commands:
!
line aux 0
transport input none
transport output none
no exec
exec-timeout 0 1
no password
!
Warning Banners
In some legal jurisdictions it can be impossible to prosecute and illegal to monitor
malicious users unless they have been notified that they are not permitted to use the
system. One method to provide this notification is to place this information into a
banner message that is configured with the Cisco IOS software banner login command.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Legal notification requirements are complex, vary by jurisdiction and situation, and should
be discussed with legal counsel. Even within jurisdictions, legal opinions can differ. In
cooperation with counsel, a banner can provide some or all of the this information:
 Notice that the system is to be logged into or used only by specifically authorized
personnel and perhaps information about who can authorize use.
 Notice that any unauthorized use of the system is unlawful and can be subject to civil
and criminal penalties.
 Notice that any use of the system can be logged or monitored without further notice and
that the resulting logs can be used as evidence in court.
 Specific notices required by local laws.
Logging Best Practices
Event logging provides you visibility into the operation of a Cisco IOS device and the
network into which it is deployed. Cisco IOS software provides several flexible logging
options that can help achieve the network management and visibility goals of an
organization.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Send Logs to a Central Location
You are advised to send logging information to a remote syslog server. By doing so, it
becomes possible to correlate and audit network and security events across network
devices more effectively. Note that syslog messages are transmitted unreliably by UDP
and in cleartext. For this reason, any protections that a network affords to management
traffic (for example, encryption or out-of-band access) should be extended to include
syslog traffic.
This configuration example configures a Cisco IOS device to send logging information to a
remote syslog server:
!
logging host <ip-address>
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Control Plane
Control plane functions consist of the protocols and processes that communicate between
network devices to move data from source to destination. This includes routing
protocols such as the Border Gateway Protocol, as well as protocols like ICMP and the
Resource Reservation Protocol (RSVP).
IP ICMP Redirects
There are two types of ICMP redirect messages: redirect for a host address and redirect for
an entire subnet. A malicious user can exploit the ability of the router to send ICMP
redirects by continually sending packets to the router, forcing the router to respond with
ICMP redirect messages, resulting in an adverse impact on the CPU and performance of
the router. In order to prevent the router from sending ICMP redirects, use the no ip
redirects interface configuration command.
ICMP Unreachable
In Cisco IOS software, ICMP unreachable generation is limited to one packet every 500
milliseconds by default. ICMP unreachable message generation can be disabled using
the interface configuration command no ip unreachables. ICMP unreachable rate
limiting can be changed from the default using the global configuration command ip
icmp rate-limit unreachable interval-in-ms.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Proxy ARP
Man-in-the-middle attacks enable a host on the network to spoof the MAC address of the
router, resulting in unsuspecting hosts sending traffic to the attacker. Proxy ARP can be
disabled using the interface configuration command no ip proxy-arp.
Control Plane Protection
Control Plane Protection (CPPr), introduced in Cisco IOS Software Release 12.4(4)T, can be
used in order to restrict or police control plane traffic that is destined to the CPU of the
Cisco IOS device. While similar to CoPP, CPPr has the ability to restrict traffic with finer
granularity. CPPr divides the aggregate control plane into three separate control plane
categories known as subinterfaces. Subinterfaces exist for Host, Transit, and CEF-
Exception traffic categories. In addition, CPPr includes these control plane protection
features:
Port-filtering feature—This feature provides for policing and dropping of packets that are
sent to closed or non-listening TCP or UDP ports.
Queue-thresholding feature—This feature limits the number of packets for a specified
protocol that are allowed in the control-plane IP input queue.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Securing BGP
The Border Gateway Protocol (BGP) is the routing foundation of the Internet. As such, any
organization with more than modest connectivity requirements often finds itself
utilizing BGP. BGP is often targeted by attackers because of its ubiquity and the “set and
forget” nature of BGP configurations in smaller organizations.
TTL-based Security Protections
GTSM for BGP is enabled using the ttl-security option for the neighbor BGP router
configuration command. This example illustrates the configuration of this feature:
!
router bgp <asn>
neighbor <ip-address> remote-as <remote-asn>
neighbor <ip-address> ttl-security hops <hop-count>
!
BGP Peer Authentication with MD5
Peer authentication using MD5 creates an MD5 digest of each packet sent as part of a BGP
session. Specifically, portions of the IP and TCP headers, TCP payload, and a secret key
are used in order to generate the digest.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
!
router bgp <asn>
neighbor <ip-address> remote-as <remote-asn>
neighbor <ip-address> password <secret>
!
Data Plane
Although the data plane is responsible for moving data from source to destination, within
the context of security, the data plane is the least important of the three planes. It is for
this reason that when securing a network device it is important to protect the
management and control planes in preference over the data plane.
IP Options Selective Drop
In the first form of this command, ip options drop, all IP packets containing IP options
that are received by the Cisco IOS device are dropped. This prevents both the elevated
CPU load and possible subversion of security controls that IP options can enable.
The second form of this command, ip options ignore, configures the Cisco IOS device to
ignore IP options that are contained in received packets. While this does mitigate the
threats related to IP options for the local device, it is possible that downstream devices
could be affected by the presence of IP options. It is for this reason that the drop form of
this command is highly recommended. This is demonstrated in the configuration
example:
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Disable IP Source Routing
If IP options have not been completely disabled via the IP Options Selective Drop
feature, it is important that IP source routing is disabled. IP source routing,
which is enabled by default in all Cisco IOS Software Releases, is disabled via
the no ip source-route global configuration command. This configuration
example illustrates the use of this command:
!
no ip source-route
!
Disable ICMP Redirects
In some situations, it may be possible for an attacker to cause the Cisco IOS
device to send many ICMP redirect messages, resulting in an elevated CPU
load. For this reason, it is recommended that the transmission of ICMP
redirects be disabled. ICMP redirects are disabled using the interface
configuration command no ip redirects, as shown in the example
configuration:
!
interface FastEthernet 0 no ip redirects
!08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Disable or Limit IP Directed Broadcasts
Current versions of Cisco IOS software have this functionality disabled by
default; however, it can be enabled via the ip directed-broadcast interface
configuration command. Releases of Cisco IOS software prior to 12.0 have this
functionality enabled by default.
If a network absolutely requires directed broadcast functionality, its use should
be controlled. This is possible using an access control list as an option to the ip
directed-broadcast command. This configuration example limits directed
broadcasts to those UDP packets originating at a trusted network,
192.168.1.0/24:
!
access-list 100 permit udp 192.168.1.0 0.0.0.255 any
!
interface FastEthernet 0
ip directed-broadcast 100
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Anti-Spoofing Protections
Many attacks utilize source IP address spoofing to be effective or to conceal the
true source of an attack and hinder accurate traceback. Cisco IOS software
provides Unicast RPF and IP Source Guard (IPSG) to deter attacks that rely on
source IP address spoofing. In addition, ACLs and null routing are often
deployed as a manual means of spoofing prevention.
Unicast RPF
RPF can be configured in one of two modes: loose or strict. In cases where there
is asymmetric routing, loose mode is preferred because strict mode is known
to drop packets in these situations. During configuration of the ip
verify interface configuration command, the keyword any configures loose
mode while the keyword rx configures strict mode.
This example illustrates configuration of this feature:
!
ip cef
!
interface <interface> ip verify unicast source reachable-via <mode>
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
IP Source Guard
P Source Guard can be applied to Layer 2 interfaces belonging to DHCP
snooping-enabled VLANs. These commands enable DHCP snooping:
!
ip dhcp snooping
ip dhcp snooping vlan <vlan-range>
!
After DHCP snooping is enabled, these commands enable IPSG:
! interface <interface-id>
ip verify source
!
Port security can be enabled with the ip verify source port security interface
configuration command. This requires the global configuration command ip
dhcp snooping information option; additionally, the DHCP server must
support DHCP option 82.
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Port Security
Port Security is used in order to mitigate MAC address spoofing at the access
interface. Port Security can use dynamically learned (sticky) MAC addresses to
ease in the initial configuration. Once port security has determined a MAC
violation.
These modes are protect, restrict, shutdown, and shutdown VLAN. In instances
when a port only provides access for a single workstation utilizing standard
protocols, a maximum number of one may be sufficient. Protocols that
leverage virtual MAC addresses such as HSRP do not function when the
maximum number is set to one.
!
interface <interface>
switchport
switchport mode access
switchport port-security
switchport port-security mac-address sticky
switchport port-security maximum <number>
switchport port-security violation <violation-mode>
!
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security
Lessons Learned:
System hardening
Securing Administrative access.
IP filtering
08/08/13
Instructional Design-Computer Networking -
Bridges Educational Group
Managing Network Device Security

Contenu connexe

Tendances

Konfigurasi DHCP Nano Station
Konfigurasi DHCP Nano StationKonfigurasi DHCP Nano Station
Konfigurasi DHCP Nano StationIbnu Syina
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiNaoto MATSUMOTO
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Cisco Security
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco IosF.l. Yu
 
Esp8266 wi fi_module_quick_start_guide_v_1.0.4
Esp8266 wi fi_module_quick_start_guide_v_1.0.4Esp8266 wi fi_module_quick_start_guide_v_1.0.4
Esp8266 wi fi_module_quick_start_guide_v_1.0.4Melvin Gutiérrez Rivero
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks
 
Configuracionde router camilaloaiza
Configuracionde router camilaloaizaConfiguracionde router camilaloaiza
Configuracionde router camilaloaizaOnce Redes
 
Licensing on Cisco 2960, 3560X and 3750X...
Licensing on Cisco 2960, 3560X and 3750X...Licensing on Cisco 2960, 3560X and 3750X...
Licensing on Cisco 2960, 3560X and 3750X...IT Tech
 
Mikrotik
MikrotikMikrotik
Mikrotikhzcom
 
The ifconfig Command
The ifconfig CommandThe ifconfig Command
The ifconfig CommandKevin OBrien
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSCisco Russia
 
Esp8266 - Intro for dummies
Esp8266 - Intro for dummiesEsp8266 - Intro for dummies
Esp8266 - Intro for dummiesPavlos Isaris
 
3 g modem_tutorial
3 g modem_tutorial3 g modem_tutorial
3 g modem_tutorialaljarous
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Mohamed Al-Natour
 

Tendances (20)

SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
Konfigurasi DHCP Nano Station
Konfigurasi DHCP Nano StationKonfigurasi DHCP Nano Station
Konfigurasi DHCP Nano Station
 
Vt6655 linux user_guide
Vt6655 linux user_guideVt6655 linux user_guide
Vt6655 linux user_guide
 
Manejo de redes
Manejo de redesManejo de redes
Manejo de redes
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFi
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios
 
Configure ssh cell
Configure ssh cellConfigure ssh cell
Configure ssh cell
 
Esp8266 wi fi_module_quick_start_guide_v_1.0.4
Esp8266 wi fi_module_quick_start_guide_v_1.0.4Esp8266 wi fi_module_quick_start_guide_v_1.0.4
Esp8266 wi fi_module_quick_start_guide_v_1.0.4
 
M7vcm10
M7vcm10M7vcm10
M7vcm10
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Configuracionde router camilaloaiza
Configuracionde router camilaloaizaConfiguracionde router camilaloaiza
Configuracionde router camilaloaiza
 
Licensing on Cisco 2960, 3560X and 3750X...
Licensing on Cisco 2960, 3560X and 3750X...Licensing on Cisco 2960, 3560X and 3750X...
Licensing on Cisco 2960, 3560X and 3750X...
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
The ifconfig Command
The ifconfig CommandThe ifconfig Command
The ifconfig Command
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
 
Esp8266 - Intro for dummies
Esp8266 - Intro for dummiesEsp8266 - Intro for dummies
Esp8266 - Intro for dummies
 
3 g modem_tutorial
3 g modem_tutorial3 g modem_tutorial
3 g modem_tutorial
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3
 

En vedette

Cables and connectors
Cables and connectorsCables and connectors
Cables and connectorsshowslides
 
Motherboard + ports & connector
Motherboard + ports & connectorMotherboard + ports & connector
Motherboard + ports & connectornorhaslinamj
 
Input output ports and connectors
Input output ports and connectorsInput output ports and connectors
Input output ports and connectorsbhardwaj1992
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectorschrispaul8676
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronousAkhil .B
 
Touch screen technology-bharadwaj
Touch screen technology-bharadwajTouch screen technology-bharadwaj
Touch screen technology-bharadwajdhiru8342
 
Touchscreen technology
Touchscreen technologyTouchscreen technology
Touchscreen technologyslire
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONMrQaz996
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Computer cables and connectors
Computer cables and connectorsComputer cables and connectors
Computer cables and connectorsscottmartin3917
 

En vedette (13)

Cables and connectors
Cables and connectorsCables and connectors
Cables and connectors
 
Motherboard + ports & connector
Motherboard + ports & connectorMotherboard + ports & connector
Motherboard + ports & connector
 
Input output ports and connectors
Input output ports and connectorsInput output ports and connectors
Input output ports and connectors
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronous
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technology
 
Touch screen technology-bharadwaj
Touch screen technology-bharadwajTouch screen technology-bharadwaj
Touch screen technology-bharadwaj
 
Touchscreen technology
Touchscreen technologyTouchscreen technology
Touchscreen technology
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATION
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Touchscreen PPT
Touchscreen PPTTouchscreen PPT
Touchscreen PPT
 
Computer cables and connectors
Computer cables and connectorsComputer cables and connectors
Computer cables and connectors
 

Similaire à Managing Network Device Security

Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideHarris Andrea
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingAmir Jafari
 
How to configure cisco router password
How to configure cisco router passwordHow to configure cisco router password
How to configure cisco router passwordIT Tech
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.pptveracru1
 
Basic Switch Configuration.pptx
Basic Switch Configuration.pptxBasic Switch Configuration.pptx
Basic Switch Configuration.pptxandutokicho
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Netwax Lab
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotiklouisraj
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2Irsandi Hasan
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tooltleroy0928
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp ukJohnsmith5188
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overviewali raza
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5Chaing Ravuth
 
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...Cavanghetboi Cavangboihet
 

Similaire à Managing Network Device Security (20)

Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
 
How to configure cisco router password
How to configure cisco router passwordHow to configure cisco router password
How to configure cisco router password
 
CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.ppt
 
Basic Switch Configuration.pptx
Basic Switch Configuration.pptxBasic Switch Configuration.pptx
Basic Switch Configuration.pptx
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
network security
network securitynetwork security
network security
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT Devices
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tool
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp uk
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
 
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...
003 obf600105 gpon ma5608 t basic operation and maintenance v8r15 issue1.02 (...
 

Plus de Arnold Derrick Kinney (17)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Network device management
Network device managementNetwork device management
Network device management
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Wan networks
Wan networksWan networks
Wan networks
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
IPV6
IPV6 IPV6
IPV6
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Managing Network Device Security

  • 2. Managing Network Device Security 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Lesson Objectives: Securing Administrative Access Implementing Device Hardening Implementing Traffic Filtering 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 4. Securing Administrative Access to a Cisco Router Configuring administrative access on the Cisco router is an important step toward network security. You can access all Cisco routers in various ways: Console VTY Aux SNMP HTTP 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 5. Connection Through the Console Port To protect administrative access to the routers, you must protect the console port via a password policy. You can store passwords locally on the router or use some kind of remote administration using a Cisco Secure Access Control Server authentication, authorization, and accounting (AAA) server. You can store passwords locally on the router or use Remote Authentication Dial-In User Service (RADIUS) or Terminal Access Controller Access Control System + (TACACS+) for remote AAA using CSACS. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 6. Password Policy You should keep the following rules in mind when formulating a password policy: Acceptable password length must be between 1 and 25 characters. Blank passwords are not a part of a good security policy. The passwords should contain alphanumeric, uppercase, and lowercase characters. On Cisco equipment, the first character in the password cannot be a number. Leading spaces in the password are ignored; however. spaces after the first character are not ignored. Passwords must be changed often, and using the same passwords over again should be avoided. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 7. Securing Privilege EXEC Mode Using the enable secret Command When you first power on the router, assuming that there is no prior configuration stored in the nonvolatile RAM (NVRAM), the router enters the Initial Configuration dialog box. The Initial Configuration dialog box is a menu system that assists you in applying basic configuration on the router. You can use Ctrl+Z to break out of the Initial Configuration dialog box. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 8. To make changes to the router configuration, you have to first enter privilege EXEC mode. By default, you do not need a password to access privilege EXEC mode. You can use the enable command to access the privilege EXEC mode of a router: Router> enable Router#Once you are in privilege EXEC mode, you can then secure privilege EXEC mode on the routers using the enable secret command in global configuration mode. The enable secret command encrypts the password to the privilege EXEC mode using the Message Digest 5 (MD5) hashing algorithm. It is a one-way hash. In other words, once you have a password using MD5, you cannot unhash it: 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 9. Router> enable  Router# configure terminal Router(config)# enable secret Passwordciscorocks Router(config)# 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 10. if you do a show running-config on the router, you will note that the enable secret is encrypted and the 5 after enable secret identifies that it is an MD5 hash. Here is an example to illustrate this concept: Router# show running-config  ! Last configuration change at 14:34:43 MST Wed Jul 16 2003 ! NVRAM config last updated at 14:34:44 MST Wed Jul 16 2003 ! version 12.3 service timestamps debug uptime service timestamps log uptime service password-encryption ! hostname Router !  enable secret 5 $1$oeJp$08vrQkQWGgsz5S5h.VqQe/ ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 11. Securing Console Access Using a Console Password A Cisco router's console port is the most important port on the device. Password recovery on the router can only be done using the console port. This port can be used to access the ROMMON mode on the router as well. The console port allows a hard break signal that interrupts the boot sequence of the router. You can issue the break sequence on a router within 60 seconds of the reboot, and it gives complete access to the user issuing this command. Cisco routers are vulnerable if you have physical access to the devices. However, if someone is trying to access the console port of the router remotely, you can apply an additional layer of security by prompting the user for a password. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 12. Here is how you protect the console port on the router:  Router> enable  Router# configure terminal  Router(config)# line console 0  Router(config-line)# password Ciscorocks123 Router(config-line)# login  Router(config-line)# end Router# 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 13. Securing VTY Access Using a Telnet Password By default, all Cisco routers support up to five simultaneous Telnet sessions, and by default, no passwords are assigned to these Telnet or VTY lines. There is built-in security on the VTY lines that mandates the use of passwords to access the router via a Telnet session. If a Telnet session is initiated to a router that does not have a password assigned to the VTY lines, the following message appears on the screen: telnet 172.31.100.11 Trying... Connected to 172.31.100.11 Escape character is '^]'. Password required, but not set Connection closed by remote host 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 14. Here is how you protect the Telnet lines on the router: Router> enable Router# configure terminal Router(config)# line vty 0 4 Router(config-line)# password VtyLines123 Router(config-line)# login Router(config-line)# end Router# 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 15. You should consider a few guidelines when configuring VTY access to the router: If there is no password set on the router to access the privilege EXEC mode, you will not be able to access the privilege EXEC mode of the router via the Telnet session. Telnet transmits and receives all data in clear text, even the passwords. To provide additional security in this aspect, you can use Secured Shell (SSH) or administer the router via an IPSec tunnel. You can provide additional security by using access lists to manage administrative access to the routers from specific IP addresses. Remember, Cisco routers work with SSH1 only. Make sure you have a password assigned to the VTY lines of the router; otherwise, no one will be able to access the router via Telnet. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 16. The aux port on the router is another way you can gain access to the router. You can protect the aux port on the router by assigning a password to it. Here is how you accomplish the task: Router> enable Router# configure terminal Router(config)# line aux 0 Router(config-line)# password ProtectAux0 Router(config-line)# login Router(config-line)# end Router#In this example, every time a user accesses the router via the aux port, he or she will be prompted for a password. If you are not using the aux port on the router, you can disable it by issuing the following command: Router(config)# line aux 0 Router(config-line)# no exec 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 17. Encrypting All Passwords on the Router By default, only the enable secret password is encrypted. To encrypt all other passwords configured on the router, issue the following command in global configuration mode: Router(config)# service password-encryption The service password-encryption command uses a Cisco proprietary Vigenere cipher to encrypt all other passwords on the router except the enable secret password (which uses MD5). The Vigenere cipher is easy to break, and if you do a show running-config on the router, it appears as follows: line con 0  password 7 110A1016141D logging synchronous  login  transport input none 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 18.  The number 7 after the keyword password indicates that the password has been encrypted using the Vigenere cipher. This command does not change the fact that the Vigenere cipher can be cracked. In fact, you can download the GETPASS utility, which will decrypt the Vigenere cipher for you. Configuring Session Activity Timeouts You can also control access to the router by configuring activity timeouts. You can use the exec-timeout command to accomplish this task. Here is an example of the configuration: line console 0 exec-timeout 5 0 end 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 19. Configuring Access Levels on the Router  You can configure access levels on the routers so the junior administrators do not have complete access to the router. Cisco routers have 16 different privilege levels that you can configure. The 16 levels range from 0 to 15, where 15 is equal to full access. You can customize levels 2 to 15 to provide monitoring abilities to the secondary administrators. Here is a sample configuration for privilege levels on the router: Central(config)#username junioradmin privilege 3 password 0 s3cUr!tY Central(config)#privilege exec level 3 ping Central(config)#privilege exec level 3 traceroute Central(config)#privilege exec level 3 show ip route Central(config-line)#line vty 0 4 Central(config-line)#password CisC0r0cK5 Central(config-line)#login local 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 20. Notice that in addition to the login local command a password is configured on the VTY lines. However, users will need to use the local router database to log in to the VTY lines because the login local command takes precedence over the password command. Looking at this config, whenever junioradmin logs into the router, he or she is allowed only three commands: ping, traceroute, and show ip route. Using the privilege command, you can provide another layer of security to your network backbone. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 21. Configuring Routers with a Statutory Warning It is imperative that you configure a statutory warning on all your networking devices that clearly states the repercussions of attempting to log on to an unauthorized system. You can achieve this by using various banner messages:  banner exec—You can use this command to specify a message that appears when an EXEC process is initiated.  banner motd—You can use this command to enable a message of the day for your admins and team.  banner login—You can use this command to enable messages that appear before username and password prompts.  You can configure a few more banner messages on routers to ensure that you get the word out that unauthorized users will be prosecuted.  Just an FYI: Do not use such phrases as "Welcome to the ABC Network" because they can create a loophole that a hacker can use to avoid legal action. We highly recommend that you consult your legal department to come up with the correct verbiage. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 22. Securing SNMP SNMP is one of the most exploited protocols and can be used to gain administrative access to Cisco routers by establishing communication between a router's internal SNMP agent and management information base (MIB). SNMP uses community strings that act as the passwords to access the routers. Whenever you are setting up SNMP community strings, make sure you know which strings will have read-only access; which ones will have read-write access; and, most of all, which systems will be allowed SNMP access via ACLs. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 23. Implementing Device Hardening Secure your Cisco IOS® system devices, which increases the overall security of your network. Structured around the three planes into which functions of a network device can be categorized, this document provides an overview of each included feature and references to related documentation. The three functional planes of a network, the management plane, control plane, and data plane, each provide different functionality that needs to be protected.  Management Plane—The management plane manages traffic that is sent to the Cisco IOS device and is made up of applications and protocols such as SSH and SNMP.  Control Plane—The control plane of a network device processes the traffic that is paramount to maintaining the functionality of the network infrastructure. The control plane consists of applications and protocols between network devices, which includes the Border Gateway Protocol (BGP), as well as the Interior Gateway Protocols (IGPs) such as the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF).  Data Plane—The data plane forwards data through a network device. The data plane does not include traffic that is sent to the local Cisco IOS device. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 24. Management Plane The management plane consists of functions that achieve the management goals of the network. This includes interactive management sessions using SSH, as well as statistics- gathering with SNMP or Net Flow. When you consider the security of a network device, it is critical that the management plane be protected. If a security incident is able to undermine the functions of the management plane, it can be impossible for you to recover or stabilize the network. General Management Plane Hardening The management plane is used in order to access, configure, and manage a device, as well as monitor its operations and the network on which it is deployed. The management plane is the plane that receives and sends traffic for operations of these functions. You must secure both the management plane and control plane of a device, as operations of the control plane directly affect operations of the management plane. This list of protocols is used by the management plane:  Simple Network Management Protocol  Telnet  Secure Shell Protocol  File Transfer Protocol  Trivial File Transfer Protocol 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group  Secure Copy Protocol  TACACS+  RADIUS  NetFlow  Network Time Protocol  Syslog Managing Network Device Security
  • 25. Password Management The enable secret command is used in order to set the password that grants privileged administrative access to the Cisco IOS system. The enable secret command must be used, rather than the older enable password command. The enable password command uses a weak encryption algorithm. The service password-encryption global configuration command directs the Cisco IOS software to encrypt the passwords, Challenge Handshake Authentication Protocol (CHAP) secrets, and similar data that are saved in its configuration file. Such encryption is useful in order to prevent casual observers from reading passwords, such as when they look at the screen over the muster of an administrator. While this weak encryption algorithm is not used by the enable secret command, it is used by the enable password global configuration command, as well as the password line configuration command. Passwords of this type must be eliminated and the enable secret command or the Enhanced Password Security feature needs to be used. The enable secret command and the Enhanced Password Security feature use Message Digest 5 (MD5) for password hashing. This algorithm has had considerable public review and is not known to be reversible. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 26. Enhanced Password Security The feature Enhanced Password Security, introduced in Cisco IOS Software Release 12.2(8)T, allows an administrator to configure MD5 hashing of passwords for the username command. Prior to this feature, there were two types of passwords: Type 0, which is a cleartext password, and Type 7, which uses the algorithm from the Vigenère cipher. The Enhanced Password Security feature cannot be used with protocols that require the cleartext password to be retrievable, such as CHAP. In order to encrypt a user password with MD5 hashing, issue the username secret global configuration command. ! username <name> secret <password> ! Refer to Enhanced Password Security for more information about this feature. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 27. Login Password Retry Lockout The Login Password Retry Lockout feature, added in Cisco IOS Software Release 12.3(14)T, allows an you to lock out a local user account after a configured number of unsuccessful login attempts. Once a user is locked out, their account is locked until you unlock it. An authorized user who is configured with privilege level 15 cannot be locked out with this feature. The number of users with privilege level 15 must be kept to a minimum. Note that authorized users can lock themselves out of a device if the number of unsuccessful login attempts is reached. Additionally, a malicious user can create a denial of service (DoS) condition with repeated attempts to authenticate with a valid username. This example shows how to enable the Login Password Retry Lockout feature: ! aaa new-model aaa local authentication attempts max-fail <max-attempts> aaa authentication login default local ! username <name> secret <password> ! This feature also applies to authentication methods such as CHAP and Password Authentication Protocol (PAP). 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 28. No Service Password-Recovery In Cisco IOS Software Release 12.3(14)T and later, the No Service Password-Recovery feature does not allow anyone with console access to insecurely access the device configuration and clear the password. It also does not allow malicious users to change the configuration register value and access NVRAM. ! no service password-recovery ! Cisco IOS software provides a password recovery procedure that relies upon access to ROMMON mode using the Break key during system startup. In ROMMON mode, the device software can be reloaded to prompt a new system configuration that includes a new password. The current password recovery procedure enables anyone with console access to access the device and its network. The No Service Password-Recovery feature prevents the completion of the Break key sequence and the entering of ROMMON mode during system startup. If no service password-recovery is enabled on a device, it is recommended that an offline copy of the device configuration be saved and that a configuration archiving solution be implemented. If it is necessary to recover the password of a Cisco IOS device once this feature is enabled, the entire configuration is deleted. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 29. Disable Unused Services As a security best practice, any unnecessary service must be disabled. These unneeded services, especially those that use UDP (User Datagram Protocol), are infrequently used for legitimate purposes, but can be used in order to launch DoS and other attacks that are otherwise prevented by packet filtering. The TCP and UDP small services must be disabled. These services include:  echo (port number 7)  discard (port number 9)  daytime (port number 13)  chargen (port number 19) Although abuse of the small services can be avoided or made less dangerous by anti- spoofing access lists, the services must be disabled on any device accessible within the network. The small services are disabled by default in Cisco IOS Software Releases 12.0 and later. In earlier software, the no service tcp-small-servers and no service udp-small- servers global configuration commands can be issued in order to disable them. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 30. This is a list of additional services that must be disabled if not in use:  Issue the no ip finger global configuration command in order to disable Finger service. Cisco IOS software releases later than 12.1(5) and 12.1(5)T disable this service by default.  Issue the no ip bootp server global configuration command in order to disable Bootstrap Protocol (BOOTP).  In Cisco IOS Software Release 12.2(8)T and later, issue the ip dhcp bootp ignore command in global configuration mode in order to disable BOOTP. This leaves Dynamic Host Configuration Protocol (DHCP) services enabled.  DHCP services can be disabled if DHCP relay services are not required. Issue the no service dhcp command in global configuration mode.  Issue the no mop enabled command in interface configuration mode in order to disable the Maintenance Operation Protocol (MOP) service.  Issue the no ip domain-lookup global configuration command in order to disable Domain Name System (DNS) resolution services.  Issue the no service pad command in global configuration mode in order to disable Packet Assembler/Disassembler (PAD) service, which is used for X.25 networks.  HTTP server can be disabled with the no ip http server command in global configuration mode, and Secure HTTP (HTTPS) server can be disabled with the no ip http secure- server global configuration command. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 31.  Unless Cisco IOS devices retrieve configurations from the network during startup, the no service config global configuration command must be used. This prevents the Cisco IOS device from attempting to locate a configuration file on the network using TFTP.  Cisco Discovery Protocol (CDP) is a network protocol that is used in order to discover other CDP enabled devices for neighbor adjacency and network topology. CDP can be used by Network Management Systems (NMS) or during troubleshooting. CDP must be disabled on all interfaces that are connected to untrusted networks. This is accomplished with the no cdp enable interface command. Alternatively, CDP can be disabled globally with the no cdp run global configuration command. Note that CDP can be used by a malicious user for reconnaissance and network mapping.  Link Layer Discovery Protocol (LLDP) is an IEEE protocol that is defined in 802.1AB. LLDP is similar to CDP. However, this protocol allows interoperability between other devices that do not support CDP. LLDP must be treated in the same manner as CDP and disabled on all interfaces that connect to untrusted networks. In order to accomplish this, issue the no lldp transmit and no lldp receive interface configuration commands. Issue the no lldp run global configuration command in order to disable LLDP globally. LLDP can also be used by a malicious user for reconnaissance and network mapping. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 32. EXEC Timeout In order to set the interval that the EXEC command interpreter waits for user input before it terminates a session, issue the exec-timeout line configuration command. The exec- timeout command must be used in order to logout sessions on vty or tty lines that are left idle. By default, sessions are disconnected after 10 minutes of inactivity. ! line con 0 exec-timeout <minutes> [seconds] line vty 0 4 exec-timeout <minutes> [seconds] ! Keepalives for TCP Sessions The service tcp-keepalive-in and service tcp-keepalive-out global configuration commands enable a device to send TCP keepalives for TCP sessions. This configuration must be used in order to enable TCP keepalives on inbound connections to the device and outbound connections from the device. This ensures that the device on the remote end of the connection is still accessible and that half-open or orphaned connections are removed from the local Cisco IOS device. ! service tcp-keepalive-in service tcp-keepalive-out ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 33. Using Management Interfaces The management plane of a device is accessed in-band or out-of-band on a physical or logical management interface. Ideally, both in-band and out-of- band management access exists for each network device so that the management plane can be accessed during network outages. One of the most common interfaces that is used for in-band access to a device is the logical loopback interface. Loopback interfaces are always up, whereas physical interfaces can change state, and the interface can potentially not be accessible. It is recommended to add a loopback interface to each device as a management interface and that it be used exclusively for the management plane. This allows the administrator to apply policies throughout the network for the management plane. Once the loopback interface is configured on a device, it can be used by management plane protocols, such as SSH, SNMP, and syslog, in order to send and receive traffic. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 34. Memory Threshold Notifications The feature Memory Threshold Notification, added in Cisco IOS Software Release 12.3(4)T, allows you to mitigate low-memory conditions on a device. This feature uses two methods to accomplish this: Memory Threshold Notification and Memory Reservation. Memory Threshold Notification generates a log message in order to indicate that free memory on a device has fallen lower than the configured threshold. This configuration example shows how to enable this feature with the memory free low-watermark global configuration command. This enables a device to generate a notification when available free memory falls lower than the specified threshold, and again when available free memory rises to five percent higher than the specified threshold. ! memory free low-watermark processor <threshold> memory free low-watermark io <threshold> ! Memory Reservation is used so that sufficient memory is available for critical notifications. This configuration example demonstrates how to enable this feature. This ensures that management processes continue to function when the memory of the device is exhausted. ! memory reserve critical <value> ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 35. Reserve Memory for Console Access In Cisco IOS Software Release 12.4(15)T and later, the Reserve Memory for Console Access feature can be used in order to reserve enough memory to ensure console access to a Cisco IOS device for administrative and troubleshooting purposes. This feature is especially beneficial when the device runs low on memory. You can issue the memory reserve console global configuration command in order to enable this feature. This example configures a Cisco IOS device to reserve 4096 kilobytes for this purpose. ! memory reserve console 4096 ! Network Time Protocol The Network Time Protocol (NTP) is not an especially dangerous service, but any unneeded service can represent an attack vector. If NTP is used, it is important to explicitly configure a trusted time source and to use proper authentication. Accurate and reliable time is required for syslog purposes, such as during forensic investigations of potential attacks, as well as for successful VPN connectivity when depending on certificates for Phase 1 authentication. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 36. NTP Time Zone—When configuring NTP the time zone needs to be configured so that timestamps can be accurately correlated. There are usually two approaches to configuring the time zone for devices in a network with a global presence. One method is to configure all network devices with the Coordinated Universal Time (UTC) (previously Greenwich Mean Time (GMT)). The other approach is to configure network devices with the local time zone. More information on this feature can be found in “clock timezone” in the Cisco product documentation. NTP Authentication—Configuring NTP authentication provides assurance that NTP messages are exchanged between trusted NTP peers. Refer to ntp authenticate and ntp authentication-key for more information on how to configure NTP authentication. Limiting Access to the Network with Infrastructure ACLs  Devised to prevent unauthorized direct communication to network devices, infrastructure access control lists (iACLs) are one of the most critical security controls that can be implemented in networks. Infrastructure ACLs leverage the idea that nearly all network traffic traverses the network and is not destined to the network itself.  An iACL is constructed and applied to specify connections from hosts or networks that need to be allowed to network devices. Common examples of these types of connections are eBGP, SSH, and SNMP. After the required connections have been permitted, all other traffic to the infrastructure is explicitly denied. All transit traffic that crosses the network and is not destined to infrastructure devices is then explicitly permitted. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 37. The protections provided by iACLs are relevant to both the management and control planes. The implementation of iACLs can be made easier through the use of distinct addressing for network infrastructure devices. Refer to A Security Oriented Approach to IP Addressing for more information on the security implications of IP addressing. This example iACL configuration illustrates the structure that must be used as a starting point when you begin the iACL implementation process: 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 38. Once created, the iACL must be applied to all interfaces that face non-infrastructure devices. This includes interfaces that connect to other organizations, remote access segments, user segments, and segments in data centers. ICMP Packet Filtering The Internet Control Message Protocol (ICMP) is designed as an IP control protocol. As such, the messages it conveys can have far-reaching ramifications to the TCP and IP protocols in general. While the network troubleshooting tools ping andtraceroute use ICMP, external ICMP connectivity is rarely needed for the proper operation of a network. Cisco IOS software provides functionality to specifically filter ICMP messages by name or type and code. This example ACL, which must be used with the access control entries (ACEs) from previous examples, allows pings from trusted management stations and NMS servers and blocks all other ICMP packets: 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 39. Filtering IP Fragments  The filtering of fragmented IP packets can pose a challenge to security devices. This is because the Layer 4 information that is used in order to filter TCP and UDP packets is only present in the initial fragment. Cisco IOS software uses a specific method to check non-initial fragments against configured access lists. Cisco IOS software evaluates these non-initial fragments against the ACL and ignores any Layer 4 filtering information. This causes non-initial fragments to be evaluated solely on the Layer 3 portion of any configured ACE.  In this example configuration, if a TCP packet destined to 192.168.1.1 on port 22 is fragmented in transit, the initial fragment is dropped as expected by the second ACE based on the Layer 4 information within the packet. However, all remaining (non-initial) fragments are allowed by the first ACE based completely on the Layer 3 information in the packet and ACE. This scenario is shown in this configuration: ! ip access-list extended ACL-FRAGMENT-EXAMPLE permit tcp any host 192.168.1.1 eq 80 deny tcp any host 192.168.1.1 eq 22 ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 40.  Due to the no intuitive nature of fragment handling, IP fragments are often inadvertently permitted by ACLs. Fragmentation is also often used in attempts to evade detection by intrusion detection systems. It is for these reasons that IP fragments are often used in attacks, and why they must be explicitly filtered at the top of any configured iACLs. This example ACL includes comprehensive filtering of IP fragments. The functionality from this example must be used in conjunction with the functionality of the previous examples. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 41. ACL Support for Filtering IP Options Cisco IOS Software Release 12.3(4)T added support for the use of ACLs to filter IP packets based on the IP options that are contained in the packet. IP options present a security challenge for network devices because these options must be processed as exception packets. This requires a level of CPU effort that is not required for typical packets that traverse the network. The presence of IP options within a packet can also indicate an attempt to subvert security controls in the network or otherwise alter the transit characteristics of a packet. It is for these reasons that packets with IP options must be filtered at the edge of the network. This example must be used with the ACEs from previous examples in order to include complete filtering of IP packets that contain IP options: 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 42. Securing Interactive Management Sessions Management sessions to devices allow you the ability to view and collect information about a device and its operations. If this information is disclosed to a malicious user, the device can become the target of an attack, compromised, and used in order to perform additional attacks. Anyone with privileged access to a device has the capability for full administrative control of that device. Securing management sessions is imperative to prevent information disclosure and unauthorized access. Management Plane Protection Beginning with Cisco IOS Software Release 12.4(6)T, the feature Management Plane Protection (MPP) allows an administrator to restrict on which interfaces management traffic can be received by a device. This allows the administrator additional control over a device and how the device is accessed. This example shows how to enable the MPP to only allow SSH and HTTPS on the GigabitEthernet0/1 interface: ! control-plane host management-interface GigabitEthernet 0/1 allow ssh https ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 43. Control Plane Protection Control Plane Protection (CPPr) builds on the functionality of Control Plane Policing in order to restrict and police control plane traffic that is destined to the route processor of the IOS device. CPPr, added in Cisco IOS Software Release 12.4(4)T, divides the control plane into separate control plane categories that are known as subinterfaces. Three control plane subinterfaces exist: Host, Transit and CEF-Exception. In addition, CPPr includes these additional control plane protection features: Port-filtering feature—This feature provides for the policing or dropping of packets going to closed or non-listening TCP and UDP ports. Queue-threshold policy feature—This feature limits the number of packets for a specified protocol that are allowed in the control plane IP input queue. CPPr allows an administrator to classify, police, and restrict traffic that is sent to a device for management purposes using the host subinterface. Examples of packets that are classified for the host subinterface category include management traffic such as SSH or Telnet and routing protocols. Note that CPPr does not support IPv6 and is restricted to the IPv4 input path. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 44. Encrypting Management Sessions Because information can be disclosed during an interactive management session, this traffic must be encrypted so that a malicious user cannot gain access to the data being transmitted. Encrypting the traffic allows a secure remote access connection to the device. If the traffic for a management session is sent over the network in cleartext, an attacker can obtain sensitive information about the device and the network. An administrator is able to establish an encrypted and secure remote access management connection to a device by using the SSH or HTTPS (Secure Hypertext Transfer Protocol) features. Cisco IOS software supports SSH version 1.0 (SSHv1), SSH version 2.0 (SSHv2), and HTTPS that uses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) for authentication and data encryption. Note that SSHv1 and SSHv2 are not compatible. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 45. Cisco IOS software also supports the Secure Copy Protocol (SCP), which allows an encrypted and secure connection for copying device configurations or software images. SCP relies on SSH. This example configuration enables SSH on a Cisco IOS device: ! ip domain-name example.com ! crypto key generate rsa modulus 2048 ! ip ssh time-out 60 ip ssh authentication-retries 3 ip ssh source-interface GigabitEthernet 0/1 ! line vty 0 4 transport input ssh ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 46. This configuration example enables SCP services: ! ip scp server enable ! This is a configuration example for HTTPS services: ! crypto key generate rsa modulus 2048 ! ip http secure-server ! SSHv2 The SSHv2 support feature introduced in Cisco IOS Software Release 12.3(4)T allows a user to configure SSHv2. (SSHv1 support was implemented in an earlier release of Cisco IOS Software.) SSH runs on top of a reliable transport layer and provides strong authentication and encryption capabilities. The only reliable transport that is defined for SSH is TCP. SSH provides a means to securely access and securely execute commands on another computer or device over a network. The Secure Copy Protocol (SCP) feature that is tunneled over SSH allows for the secure transfer of files. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 47. The following example configuration enables SSHv2 (with SSHv1 disabled) on a Cisco IOS device: ! hostname router ! ip domain-name example.com ! crypto key generate rsa modulus 2048 ! ip ssh time-out 60 ip ssh authentication-retries 3 ip ssh source-interface GigabitEthernet 0/1 ! ip ssh version 2 ! line vty 0 4 transport input ssh ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 48. Console and AUX Ports If password recovery is not required, then an administrator can remove the ability to perform the password recovery procedure using the no service password-recovery global configuration command; however, once the no service password-recoverycommand has been enabled, an administrator can no longer perform password recovery on a device. In most situations, the AUX port of a device must be disabled to prevent unauthorized access. An AUX port can be disabled using these commands: ! line aux 0 transport input none transport output none no exec exec-timeout 0 1 no password ! Warning Banners In some legal jurisdictions it can be impossible to prosecute and illegal to monitor malicious users unless they have been notified that they are not permitted to use the system. One method to provide this notification is to place this information into a banner message that is configured with the Cisco IOS software banner login command. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 49. Legal notification requirements are complex, vary by jurisdiction and situation, and should be discussed with legal counsel. Even within jurisdictions, legal opinions can differ. In cooperation with counsel, a banner can provide some or all of the this information:  Notice that the system is to be logged into or used only by specifically authorized personnel and perhaps information about who can authorize use.  Notice that any unauthorized use of the system is unlawful and can be subject to civil and criminal penalties.  Notice that any use of the system can be logged or monitored without further notice and that the resulting logs can be used as evidence in court.  Specific notices required by local laws. Logging Best Practices Event logging provides you visibility into the operation of a Cisco IOS device and the network into which it is deployed. Cisco IOS software provides several flexible logging options that can help achieve the network management and visibility goals of an organization. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 50. Send Logs to a Central Location You are advised to send logging information to a remote syslog server. By doing so, it becomes possible to correlate and audit network and security events across network devices more effectively. Note that syslog messages are transmitted unreliably by UDP and in cleartext. For this reason, any protections that a network affords to management traffic (for example, encryption or out-of-band access) should be extended to include syslog traffic. This configuration example configures a Cisco IOS device to send logging information to a remote syslog server: ! logging host <ip-address> ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 51. Control Plane Control plane functions consist of the protocols and processes that communicate between network devices to move data from source to destination. This includes routing protocols such as the Border Gateway Protocol, as well as protocols like ICMP and the Resource Reservation Protocol (RSVP). IP ICMP Redirects There are two types of ICMP redirect messages: redirect for a host address and redirect for an entire subnet. A malicious user can exploit the ability of the router to send ICMP redirects by continually sending packets to the router, forcing the router to respond with ICMP redirect messages, resulting in an adverse impact on the CPU and performance of the router. In order to prevent the router from sending ICMP redirects, use the no ip redirects interface configuration command. ICMP Unreachable In Cisco IOS software, ICMP unreachable generation is limited to one packet every 500 milliseconds by default. ICMP unreachable message generation can be disabled using the interface configuration command no ip unreachables. ICMP unreachable rate limiting can be changed from the default using the global configuration command ip icmp rate-limit unreachable interval-in-ms. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 52. Proxy ARP Man-in-the-middle attacks enable a host on the network to spoof the MAC address of the router, resulting in unsuspecting hosts sending traffic to the attacker. Proxy ARP can be disabled using the interface configuration command no ip proxy-arp. Control Plane Protection Control Plane Protection (CPPr), introduced in Cisco IOS Software Release 12.4(4)T, can be used in order to restrict or police control plane traffic that is destined to the CPU of the Cisco IOS device. While similar to CoPP, CPPr has the ability to restrict traffic with finer granularity. CPPr divides the aggregate control plane into three separate control plane categories known as subinterfaces. Subinterfaces exist for Host, Transit, and CEF- Exception traffic categories. In addition, CPPr includes these control plane protection features: Port-filtering feature—This feature provides for policing and dropping of packets that are sent to closed or non-listening TCP or UDP ports. Queue-thresholding feature—This feature limits the number of packets for a specified protocol that are allowed in the control-plane IP input queue. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 53. Securing BGP The Border Gateway Protocol (BGP) is the routing foundation of the Internet. As such, any organization with more than modest connectivity requirements often finds itself utilizing BGP. BGP is often targeted by attackers because of its ubiquity and the “set and forget” nature of BGP configurations in smaller organizations. TTL-based Security Protections GTSM for BGP is enabled using the ttl-security option for the neighbor BGP router configuration command. This example illustrates the configuration of this feature: ! router bgp <asn> neighbor <ip-address> remote-as <remote-asn> neighbor <ip-address> ttl-security hops <hop-count> ! BGP Peer Authentication with MD5 Peer authentication using MD5 creates an MD5 digest of each packet sent as part of a BGP session. Specifically, portions of the IP and TCP headers, TCP payload, and a secret key are used in order to generate the digest. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 54. ! router bgp <asn> neighbor <ip-address> remote-as <remote-asn> neighbor <ip-address> password <secret> ! Data Plane Although the data plane is responsible for moving data from source to destination, within the context of security, the data plane is the least important of the three planes. It is for this reason that when securing a network device it is important to protect the management and control planes in preference over the data plane. IP Options Selective Drop In the first form of this command, ip options drop, all IP packets containing IP options that are received by the Cisco IOS device are dropped. This prevents both the elevated CPU load and possible subversion of security controls that IP options can enable. The second form of this command, ip options ignore, configures the Cisco IOS device to ignore IP options that are contained in received packets. While this does mitigate the threats related to IP options for the local device, it is possible that downstream devices could be affected by the presence of IP options. It is for this reason that the drop form of this command is highly recommended. This is demonstrated in the configuration example: 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 55. Disable IP Source Routing If IP options have not been completely disabled via the IP Options Selective Drop feature, it is important that IP source routing is disabled. IP source routing, which is enabled by default in all Cisco IOS Software Releases, is disabled via the no ip source-route global configuration command. This configuration example illustrates the use of this command: ! no ip source-route ! Disable ICMP Redirects In some situations, it may be possible for an attacker to cause the Cisco IOS device to send many ICMP redirect messages, resulting in an elevated CPU load. For this reason, it is recommended that the transmission of ICMP redirects be disabled. ICMP redirects are disabled using the interface configuration command no ip redirects, as shown in the example configuration: ! interface FastEthernet 0 no ip redirects !08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 56. Disable or Limit IP Directed Broadcasts Current versions of Cisco IOS software have this functionality disabled by default; however, it can be enabled via the ip directed-broadcast interface configuration command. Releases of Cisco IOS software prior to 12.0 have this functionality enabled by default. If a network absolutely requires directed broadcast functionality, its use should be controlled. This is possible using an access control list as an option to the ip directed-broadcast command. This configuration example limits directed broadcasts to those UDP packets originating at a trusted network, 192.168.1.0/24: ! access-list 100 permit udp 192.168.1.0 0.0.0.255 any ! interface FastEthernet 0 ip directed-broadcast 100 ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 57. Anti-Spoofing Protections Many attacks utilize source IP address spoofing to be effective or to conceal the true source of an attack and hinder accurate traceback. Cisco IOS software provides Unicast RPF and IP Source Guard (IPSG) to deter attacks that rely on source IP address spoofing. In addition, ACLs and null routing are often deployed as a manual means of spoofing prevention. Unicast RPF RPF can be configured in one of two modes: loose or strict. In cases where there is asymmetric routing, loose mode is preferred because strict mode is known to drop packets in these situations. During configuration of the ip verify interface configuration command, the keyword any configures loose mode while the keyword rx configures strict mode. This example illustrates configuration of this feature: ! ip cef ! interface <interface> ip verify unicast source reachable-via <mode> ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 58. IP Source Guard P Source Guard can be applied to Layer 2 interfaces belonging to DHCP snooping-enabled VLANs. These commands enable DHCP snooping: ! ip dhcp snooping ip dhcp snooping vlan <vlan-range> ! After DHCP snooping is enabled, these commands enable IPSG: ! interface <interface-id> ip verify source ! Port security can be enabled with the ip verify source port security interface configuration command. This requires the global configuration command ip dhcp snooping information option; additionally, the DHCP server must support DHCP option 82. 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 59. Port Security Port Security is used in order to mitigate MAC address spoofing at the access interface. Port Security can use dynamically learned (sticky) MAC addresses to ease in the initial configuration. Once port security has determined a MAC violation. These modes are protect, restrict, shutdown, and shutdown VLAN. In instances when a port only provides access for a single workstation utilizing standard protocols, a maximum number of one may be sufficient. Protocols that leverage virtual MAC addresses such as HSRP do not function when the maximum number is set to one. ! interface <interface> switchport switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security maximum <number> switchport port-security violation <violation-mode> ! 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security
  • 60. Lessons Learned: System hardening Securing Administrative access. IP filtering 08/08/13 Instructional Design-Computer Networking - Bridges Educational Group Managing Network Device Security