8
1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires that the device have enough networking services installed to be accessed across the network. More to follow. Electronic Access Controls

1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

Embed Size (px)

Citation preview

Page 1: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

1© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Remote access typically involves allowing telnet, SSH connections to the router

• Remote requires that the device have enough networking services installed to be accessed across the network.

• More to follow.

Electronic Access Controls

Page 2: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Cisco issues new IOS versions and upgrades fairly frequently.

• If the IOS is not kept current then the device may be susceptible to information gathering and network attacks.

• The Cisco Product Security Incident Response Team (PSIRT) creates and maintains publications, commonly referred to as PSIRT Advisories, for security−related issues in Cisco products.

• Security advisories and responses are available at http://www.cisco.com/go/psirt

Cisco IOS

Page 3: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Cisco – PSIRT

Page 4: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Loopback Address

• Banner

• Accounts

• Command Privilege Levels

• Passwords

• Management Ports

• AAA

• Network Services

• NTP

• SNMP

Static Configuration Controls

Page 5: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Network devices communicate using various management protocols, such as OSPF, EIGRP, STP, VTP, SNMP, TACACS.

• An internal virtual interface called a loopback interface should be defined and designated as the source interface for most traffic generated by the router itself.

Loopback Address

Page 6: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• A login banner should be set up on each operational network device.

Banner

banner motd ******************Warning! Warning! Warning!*********************** This system is restricted to authorized users for business purposes only. Unauthorized access is a violation of the law. This service may be monitored for administrative and security reasons. By proceeding you consent to this monitoring. *******************Warning! Warning! Warning! ***********************

Page 7: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• By default, no accounts established.

• Accounts can be established:

•On device (Login local)

•On AAA server.

• Cisco IOS releases support the RADIUS and TACACS+

• Using AAA with a security server, access to network devices and network services can be controlled from a centralized location.

Accounts

Page 8: 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires

8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Each administrator should have their own unique login user name for the router.

• User name is included in log messages.

• Only allow accounts that are required on the router.

• Review the running –config and verify that unique user-ids have been created for administrators and any users.

• Verify that the privilege level for the accounts is based on a need to know, least privilege basis.

Accounts – Audit Steps