Idirect Security Best Practices Technical Note
Idirect Security Best Practices Technical Note
Idirect Security Best Practices Technical Note
Technical Note
AF
T
AF
T
Copyright 2012 VT iDirect, Inc. All rights reserved. Reproduction in whole or in part without permission is
prohibited. Information contained herein is subject to change without notice. The specifications and information
regarding the products in this document are subject to change without notice. All statements, information, and
recommendations in this document are believed to be accurate, but are presented without warranty of any kind,
express, or implied. Users must take full responsibility for their application of any products. Trademarks, brand
names and products mentioned in this document are the property of their respective owners. All such references
are used strictly in an editorial fashion with no intent to convey any affiliation with the name or the product's
rightful owner.
ii
Revision History
The following table shows all revisions for this document. To determine if this is the latest
revision, check the TAC Web page.
Reason for Change(s)
Who Updated?
JVespoli
Date Released
AF
T
Rev
iii
Contents
AF
T
iv
Purpose
This technical note recommends basic security practices to help ensure that all components
of iDirect Networks are secure.
AF
T
Intended Audience
This technical note is intended for iDirect Network Operators and System Administrators
responsible for ensuring that iDirect networks are secure.
Document Conventions
This section describes and illustrates the conventions used throughout the document.
Convention Description
Example
Blue
Courier
font
Courier
bold font
cd /etc/snmp/
Bold
Trebuchet
font
The Remote dialog box has a number of userselectable tabs across the top. The Information tab is
visible when the dialog box opens.
Blue
Trebuchet
font
Bold italic
Trebuchet
font
Used to emphasize
information for the user,
such as in notes
Note:
Red italic
Trebuchet
font
AF
T
Getting Help
The iDirect Technical Assistance Center (TAC) is available to help you 24 hours a day, 365 days
a year. Software user guides, installation procedures, a FAQ page, and other documentation
that supports our products are available on the TAC webpage. You can access the TAC
webpage at: http://tac.idirect.net.
If you are unable to find the answers or information that you need, you can contact the TAC at
(703) 648-8151.
vi
AF
T
This technical note recommends basic security practices to help ensure that all components
of iDirect Networks are secure. iDirect also recommends implementation of additional
security measures over and above these steps as required for your specific network
configurations.
An iDirect installation includes a number of Linux servers used to configure and run the
networks. These servers include:
iDirect recommends securing all hub and NMS servers from unauthorized physical access.
In addition, iDirect strongly recommends implementing the security measures in the following
sections to protect the servers.
For VNO operators, all connections should be established through carefully managed
Virtual Private Networks (VPN).
All iBuilder and iMonitor clients connecting to the NMS over a Wide Area Network (WAN)
should do so over a private network or VPN.
root
Thereafter, these passwords should be changed periodically. When selecting new passwords,
iDirect recommends that you follow common guidelines for constructing strong passwords.
AF
T
An SNMP Proxy Agent running on the NMS server provides read access to the iDirect MIB and
SNMP traps to an external SNMP Manager. If not used, this service should be disabled on the
NMS server that runs the snmpsvr process.
To disable the SNMP service:
1. TBD
2. .....
Note:
2. .....
admin
guest
Client Access
AF
T
At installation, use iBuilder to change the passwords for these users from their default
settings. In addition, iDirect recommends creating NMS users with permissions tailored to the
access level requirements of the network operators. Create strong passwords for all such
accounts and change them periodically. See the iBuilder User Guide for your release for
details on creating users.
Access to iBuilder and iMonitor sessions should be strictly controlled. Network operators
should always log out of any NMS clients when leaving workstations to prevent unauthorized
access.
Remote Access
All remote access by NMS client applications to iDirect networks should be established over
secure private networks.
The following iDirect network elements are pre-configured with a user account and an admin
account that allow access to the iDirect applications using a console terminal window.
Remotes
Line Cards
At installation, these passwords should be changed from the default on each of these network
elements. Thereafter, these passwords should be changed periodically.
All of these passwords can be changed in iBuilder by right-clicking the network element;
selecting the Modify option from the menu; and applying the changes as required. (See the
iBuilder User Guide for details.)
Note:
The user and admin console passwords for protocol processor blades are
configured at the Protocol Processor level of the iBuilder tree and shared by all
blades configured under that Protocol Processor.
AF
T
If the zeroize command is unavailable, enter the command csp enable. Then execute
the zeroize command again. If the command is still unavailable, contact the iDirect
TAC.
AF
T
AF
T