路由器安全配置速查表.doc_第1頁
路由器安全配置速查表.doc_第2頁
路由器安全配置速查表.doc_第3頁
路由器安全配置速查表.doc_第4頁
路由器安全配置速查表.doc_第5頁
免費預覽已結(jié)束,剩余1頁可下載查看

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

路由器安全配置速查表來源: FUMTEK Blog 作者: FUMTEKSpecific Recommendations: Router Access1. Shut down unneeded services on the router. Servers that are not running cannot break. Also, more memory and processor slots are available. Start by running the show proc command on the router, then turn off clearly unneeded facilities and services. Some servers that should almost always be turned off and the corresponding commands to disable them are listed below. Small services (echo, discard, chargen, etc.) no service tcp-small-servers no service udp-small-servers BOOTP - no ip bootp server Finger - no service finger HTTP - no ip http server SNMP - no snmp-server2. Shut down unneeded services on the routers. These services allow certain packets to pass through the router, or send special packets, or are used for remote router configuration. Some services that should almost always be turned off and the corresponding commands todisable them are listed below. CDP - no cdp run Remote config. - no service config Source routing - no ip source-route3. The interfaces on the router can be made more secure by using certain commands in the Configure Interface mode. These commands should be applied to every interface. Unused interfaces - shutdown No Smurf attacks - no ip directed-broadcast Mask replies - no ip mask-reply Ad-hoc routing - no ip proxy-arp4. The console line, the auxiliary line and the virtual terminal lines on the router can be made more secure in the Configure Line mode. The console line and the virtual terminal lines should be secured as shown below. The Aux line should be disabled, as shown below, if it is not being used. Console Line - line con 0exec-timeout 5 0login Auxiliary Line - line aux 0no execexec-timeout 0 10transport input none VTY lines - line vty 0 4exec-timeout 5 0logintransport input telnet ssh5. Passwords can be configured more securely as well. Configure the Enable Secret password, which is protected with an MD5-based algorithm. Also, configure passwords for the console line, the auxiliary line and the virtual terminal lines. Provide basic protection for the user and line passwords using the service passwordencryption command. See examples below. Enable secret - enable secret 0 2manyRt3s Console Line - line con 0password Soda-4-jimmY Auxiliary Line - line aux 0password Popcorn-4-sara VTY Lines - line vty 0 4password Dots-4-georg3 Basic protection - service password-encryption6. Consider adopting SSH, if your router supports it, for all remote administration. 7. Protect your router configuration file from unauthorized disclosure.Specific Recommendations: Access Lists1. Always start an access-list definition with the privileged command no access-list nnn to clear out any previous versions of access list number nnn.fumtek(config)# no access-list 51fumtek(config)# access-list 51 permit host fumtek(config)# access-list 51 deny any log2. Log access list port messages properly. To ensure that logs contain correct port number information, use the port range arguments shown below at the end of an access list.access-list 106 deny udp any range 1 65535 any range 1 65535 logaccess-list 106 deny tcp any range 1 65535 any range 1 65535 logaccess-list 106 deny ip any any logThe last line is necessary to ensure that rejected packets of protocols other than TCP and UDP are properly logged. 3. Enforce traffic address restrictions using access lists. On a border router, allow only internal addresses to enter the router from the internal interfaces, and allow only traffic destined for internal addresses to enter the router from the outside (external interfaces).Block illegal addresses at the outgoing interfaces. Besides preventing an attacker from using the router to attack other sites, it helps identify poorly configured internal hosts or networks. This approach may not be feasible for complicated networks. RFC 2827fumtek(config)# no access-list 101fumtek(config)# access-list 101 permit ip 55 anyfumtek(config)# access-list 101 deny ip any any logfumtek(config)# no access-list 102fumtek(config)# access-list 102 permit ip any 55fumtek(config)# access-list 102 deny ip any any logfumtek(config)# interface eth 1fumtek(config-if)# ip access-group 101 infumtek(config-if)# exitfumtek(config)# interface eth 0fumtek(config-if)# ip access-group 101 outfumtek(config-if)# ip access-group 102 in4. Block packets coming from the outside (untrusted network) that are obviously fake or have source or destination addresses that are reserved, for example networks /8, /8, /16, /20, /16. This protection should be part of the overall traffic filtering at the interface attached to the external,untrusted network. RFC 19185. Block incoming packets that claim to have a source address of any internal (trusted) networks. This impedes TCP sequence number guessing and other attacks. Incorporate this protection into the access lists applied to interfaces facing any untrusted networks. 6. Drop incoming packets with loopback addresses, network /8. These packets cannot be real. 7. If the network doesnt need IP multicast, then block multicast packets.8. Block broadcast packets. (Note that this may block DHCP and BOOTP services, but these services should not be used on external interfaces and certainlyshouldnt cross border routers.) 9. A number of remote probes and attacks use ICMP echo, redirect, and mask request messages, block them. (A superior but more difficult approach is to permit only necessary ICMP packet types.)The example below shows one way to implement these recommendations.North(config)# no access-list 107North(config)# ! block our internal addressesNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# ! block special/reserved addressesNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# access-list 107 deny ip 55 any logNorth(config)# ! block multicast (if not used)North(config)# access-list 107 deny ip 55 anyNorth(config)# ! block some ICMP message typesNorth(config)# access-list 107 deny icmp any any redirect logNorth(config)# access-list 107 deny icmp any any echo logNorth(config)# access-list 107 deny icmp any any mask-request logNorth(config)# access-list 107 permit ip any 55North(config)# access-list 107 permit ip any 55North(config)# interface Eth 0/0North(config-if)# description External interfaceNorth(config-if)# ip access-group 107 in10. Block incoming packets that claim to have the same destination and source address (i.e. a Land attack on the router itself). Incorporate this protection into the access list used to restrict incoming traffic into each interface, using a rule like the one shown below. access-list 102 deny ip host 50host 50 loginterface Eth 0/1ip address 50 ip access-group 102 in11. Configure an access list for the virtual terminal lines to control Telnet access. See example commands below. South(config)# no access-list 92South(config)# access-list 92 permit South(config)# access-list 92 permit South(config)# line vty 0 4South(config-line)# access-class 92 inSpecific Recommendations: Logging & Debugging1. Turn on the routers logging capability, and use it to log errors and blocked packets to an internal (trusted) syslog host. Make sure that the router blocks syslog traffic from untrusted networks. See example commands below.Central(config)# logging onCentral(config)# logging Central(config)# logging bufferedCentral(config)# logging console criticalCentral(config)# logging trap informationalCentral(config)# logging facility local12. Configure the router to include time information in the logging. Configure at least two different NTP servers to ensure availability of good time information. This will allow an administrator to trace network attacks more accurately. See example commands below.East(config)# service timestamps log datetime localtime show-timezone msecEast(config)# clock timezone GMT 0East(config)# ntp server 50East(config)# ntp server 3. If your network requires SNMP, then configure an SNMP ACL and hard-to-guess SNMP community strings. The example commands below show how to remove the default community strings and set a better read-only community string, with an ACL. East(config)# no snmp community public roEast(config)# no snmp community private rwEast(config)# no access-list 51East(config)# access-list 51 permit East(config)# snmp community BTRl8+never ro 51Router Security ChecklistThis security checklist is designed to help you review your router security configuration, and remind you of any security area you might have missed. Router security policy written, approved, distributed. Router IOS version checked and up to date. Router configuration kept off-line, backed up, access to it limited. Router configuration is well-documented, commented. Router us

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論