+ All Categories
Home > Documents > Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Date post: 30-Mar-2015
Category:
Upload: maura-day
View: 238 times
Download: 1 times
Share this document with a friend
Popular Tags:
27
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces
Transcript
Page 1: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Cisco Device Hardening

Disabling Unused Cisco Router Network Services and Interfaces

Page 2: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Vulnerable Router Services and Interfaces

Page 3: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Vulnerable Router Services and Interfaces

• Cisco IOS routers can be used as:

– Edge devices

– Firewalls

– Internal routers

• 잠재적 취약점을 갖는 기본 서비스 (CDP, FTP, TFTP, NTP, SNMP, TCP/UDP 등 )

• 네트워크의 모든 라우터에 취약점이 존재한다 .

Page 4: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Router Hardening Considerations

• 공격자는 사용하지 않는 서비스와 인터페이스에 공격을 시도한다 .

• 관리자는 서비스에 대한 공격방법을 알고 있을 필요는 없지만 방어 기법은 알고 있어야 한다 .

• 서비스를 개별적으로 비활성화 하는 작업은 번거롭다 .

• 자동 구성 방법을 통해 빠르고 안정적인 구성을 할 수 있다 .

Page 5: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Locking Down Routers with AutoSecure

Page 6: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

What is AutoSecure?

AutoSecure 는 Cisco IOS Router 에 다음 기능을 수행한다 :• 불안전한 global services Disable 한다 .

• Security-base global services 를 Enable 한다 .

• 불안전한 Interface services 를 Disables 한다 .

• 적절한 security logging 을 활성화 한다 .

• Router 관리 접속 보안설정을 한다 .

Page 7: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

AutoSecure Operation Modes

AutoSecure 는 2 가지 동작 Mode 중 하나를 사용한다 :• Interactive mode: 사용자가 Prompt 를 사용하여

service 와 다른 보안 관련 기능을 활성화 하거나 비활성화 한다 .

• Noninteractive mode: Auto secure 명령을 사용하여 권장되는 기본 설정을 자동으로 구성한다 .

Page 8: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

AutoSecure Functions

AutoSecure can selectively lock down:• 관리단계 services 와 functions:

– Finger, PAD, UDP & TCP small servers, password encryption, TCP keepalives, CDP, BOOTP, HTTP, source routing, gratuitous ARP, proxy ARP, ICMP (redirects, mask-replies), directed broadcast, MOP, banner

– Also provides password security and SSH access

• Forwarding 단계 services and functions:

– CEF, traffic filtering with ACLs

• Firewall services and functions:

– Cisco IOS Firewall inspection for common protocols

• Login functions:

– Password security

• NTP protocol

• SSH access

• TCP Intercept services

Page 9: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

AutoSecure Process Overview

Page 10: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Start and Interface Selection

Router#auto secure--- AutoSecure Configuration ---

*** AutoSecure configuration enhances the security of the router but it will not make router absolutely secure from all security attacks ***All the configuration done as part of AutoSecure will be shown here. For more details of why and how this configuration is useful, and any possible side effects, please refer to Cisco documentation of AutoSecure.At any prompt you may enter '?' for help.Use ctrl-c to abort this session at any prompt.Gathering information about the router for AutoSecure

Is this router connected to internet? [no]: yEnter the number of interfaces facing internet [1]: 1Interface IP-Address OK? Method Status ProtocolEthernet0/0 10.0.2.2 YES NVRAM up upEthernet0/1 172.30.2.2 YES NVRAM up up

Enter the interface name that is facing internet: Ethernet0/1

Page 11: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Securing Management Plane Services

Securing Management plane services..

Disabling service finger

Disabling service pad

Disabling udp & tcp small servers

Enabling service password encryption

Enabling service tcp-keepalives-in

Enabling service tcp-keepalives-out

Disabling the cdp protocol

Disabling the bootp server

Disabling the http server

Disabling the finger service

Disabling source routing

Disabling gratuitous arp

Page 12: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Creating Security Banner

Here is a sample Security Banner to be shown at every access to device. Modify it to suit your enterprise requirements.

Authorised Access only

This system is the property of So-&-So-Enterprise.

UNAUTHORISED ACCESS TO THIS DEVICE IS PROHIBITED.

You must have explicit permission to access this

device. All activities performed on this device

are logged and violations of of this policy result

in disciplinary action.

Enter the security banner {Put the banner between

k and k, where k is any character}:

%This system is the property of Cisco Systems, Inc.

UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED.%

Page 13: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Passwords and AAA

Enable secret is either not configured or is same as enable password

Enter the new enable secret: Curium96

Configuration of local user database

Enter the username: student1

Enter the password: student1

Configuring aaa local authentication

Configuring console, Aux and vty lines for

local authentication, exec-timeout, transport

Securing device against Login Attacks

Configure the following parameters

Blocking Period when Login Attack detected: 300

Maximum Login failures with the device: 3

Maximum time period for crossing the failed login attempts: 60

Page 14: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SSH and Interface-Specific Services

Configure SSH server? [yes]: y

Enter the hostname: R2

Enter the domain-name: cisco.com

Configuring interface specific AutoSecure services

Disabling the following ip services on all interfaces:

no ip redirects

no ip proxy-arp

no ip unreachables

no ip directed-broadcast

no ip mask-reply

Disabling mop on Ethernet interfaces

Page 15: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Forwarding Plane, Verificaton and Deployment

Securing Forwarding plane services..

Enabling CEF (This might impact the memory requirements for your platform)

Enabling unicast rpf on all interfaces connected

to internet

Configure CBAC Firewall feature? [yes/no]: yes

This is the configuration generated:

no service finger

no service pad

no service udp-small-servers

no service tcp-small-servers

service password-encryption..

Apply this configuration to running-config? [yes]: y

Page 16: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Locking Down Routers with the SDM

Page 17: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Security Device Manager

SDM automated hardening features:

• Security Audit

• One-Step Lockdown

Page 18: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit Overview

• 보안감사는 Router 에 요구되는 설정을 비교한다 .

• 감사 (audit) 포함 :

– Shut down unneeded servers.

– Disable unneeded services.

– Apply the firewall to the outside interfaces.

– Disable or harden SNMP.

– Shut down unused interfaces.

– Check password strength.

– Enforce the use of ACLs.

Page 19: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit: Main Window

1.

2.

3.

Page 20: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit Wizard

Page 21: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit Interface Configuration

Page 22: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit

Page 23: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit:Fix the Security Problems

Page 24: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM Security Audit: Summary

Page 25: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM One-Step Lockdown: Main Window

Page 26: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

SDM One-Step Lockdown Wizard

Page 27: Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.

Recommended