Router Auditing
Router Auditing
HRD Division
Department of Electronics and Information Technology
Ministry of Communications and Information Technology
Government of India
ROUTER AUDITING
1
TABLE OF CONTENTS:
2
24. FOR CHECKING ANY PRIVILEGED EXEC MODE IN ROUTER SETTINGS
3
1. Latest stable software version shall be selected.
CDAC-R09R06-C01-R-2#show version
CDAC-R09R06-C01-R-2#show users
Note: All the users who are authenticated can be viewed only by login
administrators.
Note: All the users/admin who are authenticated can be viewed only by login
through the tacacs server and different privilege levels can also be seen by the
4
CDAC-R09R06-C01-R-2#show run | i password
Note: All the users/admin password shall be managed as per the Password
Management Guidelines only by login through the tacacs server and different
privilege levels can also be seen by the using the same tacacs server.
Per the cyber security policies for NICNET Information Infrastructure - Time
Synchronization Guidelines)
CDAC-R09R06-C01-R-2#show clock
caution.
9. Protocols / Services using encrypted channel (such as, SSH, SSL, IPSec, RDP)
5
CDAC-R09R06-C01-R-2#show run | i line
SUMMARY STEPS
• configure
• router ospf process-name
• router-id {router-id}
• authentication [message-digest [keychain keychain] | null]
• message-digest-key key-id md5 {key | clear key | encrypted key}
• area area-id
• interface type instance
• Repeat Step 7 for each interface that must communicate, using the same
authentication.
• exit
• area area-id
• authentication [message-digest [keychain keychain] | null]
• interface type instance
• Repeat Step 12 for each interface that must communicate, using the same
authentication.
• interface type instance
• authentication [message-digest [keychain keychain] | null]
• end Or commit
DETAILED STEPS:
Command Purpose
configure Enters global configuration mode.
Step 1 Example:
RP/0/RSP0/CPU0:router# configure
6
Note The process-name argument is
any alphanumeric string no longer
than 40 characters.
message-digest-key key-id md5 {key |clear key Specifies the MD5 authentication key
| encrypted key} for the OSPF process.
Step 5 Example: The neighbor routers must have the
RP/0/RSP0/CPU0:router(config-ospf)# same key identifier.
message-digest-key 4 md5 yourkey
7
area 0.0.3.232. However, you must
choose one form or the other for an
area. We recommend using the IPv4
address notation.
8
RP/0/RSP0/CPU0:router(config-ospf-ar-if)# exiting(yes/no/cancel)?
commit [cancel]:
SUMMARY STEPS
• 1. configure
• 2. ethernet egress-filter strict
• 3. interface {GigabitEthernet | TenGigE | FastEthernet |
Bundle-Ether} instance.subinterface
• 4. ethernet egress-filter {strict | disabled}
• 5. exit
DETAILED STEPS:
9
Step 2 ethernet egress-filter strict Enables strict egress filtering
on all subinterfaces on the
RP/0/RSP0/CPU0:PE44_ASR-9010(config)# ethernet device by default.
egress-filter strict
RP/0/RSP0/CPU0:PE44_ASR-9010(config)# interface
GigabitEthernet 0/1/0/1.1
RP/0/RSP0/CPU0:PE44_ASR-9010(config-subif)#
Step 4 ethernet egress-filter {strict | disabled} Allows egress filtering to be
explicitly enabled or
RP/0/RSP0/CPU0:PE44_ASR-9010(config-subif)# disabled on any L2
ethernet egress-filter strict subinterface. It can also be
used to override global
settings.
Step 5 exit Exit from the configuration
RP/0/RSP0/CPU0:PE44_ASR-9010(config-subif)# exit mode.
RP/0/RSP0/CPU0:PE44_ASR-9010(config)# exit
FOR EXAMPLE:
• R2# conf t
• Enter configuration commands, one per line. End with CNTL/Z.
• R2(config)# ip route 192.168.0.0 255.255.0.0 Null0
• R2(config)# end
CDAC-R09R06-C01-R-2#show run | i Null
10
14. Anti-spoofing should be configured on all interfaces
SUMMARY STEPS
1. enable
2. configure terminal
3. ip cef
4. interface type slot / port-adapter / port
5. ip verify unicast source reachable-via any
DETAILED STEPS:
Step 4 interface type slot / port-adapter / port Configures an interface type and
Example: enters interface configuration mode.
Router (config)# interface serial5/0/0
Step 5 ip verify unicast source reachable-via any Enables Unicast RPF using loose
Example: mode.
Router (config-if)# ip verify unicast
source reachable-via any
11
Note: Anti-Spoofing feature is not configured so that’s why screen shot is not
attached.
15. Back up of the current operating system and the running configuration
shall be taken prior to upgrade with SNMP Protocol .check for the
following:
• Enable SNMP if required and check SNMPv3 or higher should be used.
CDAC-R09R06-C01-R-2#show snmp host
CDAC-R09R06-C01-R-2#show log
12
17. For checking console and other direct access port connections of the
router.
18. For checking what are the various networks allowed in router.
19. For checking the router network traffic flow and loopback interface.
21. For checking for any virtual terminal unit i.e. VTY’s enabled on device.
13
23. For checking ACL written with respect to access to VTY or remote
25. For checking the router is configured with local or AAA encryption
mechanism.
CDAC-R09R06-C01-R-2#show tacacs
Note: AAA encryption mechanism managed as per the Cyber Security Policies
NICNET Information Infrastructure only by login through the tacacs server and
different privilege levels can also be seen by the using the same tacacs server.
14
• For checking the ospf neighbor.
CDAC-R09R06-C01-R-2#show tacacs
CONTRIBUTED BY:
1. Mr Ch A.S Murty
2. Mr Tyeb Naushad
3. Mr Devi Satish
4. Mr Shrinath Rusia
5. Ms Vertika Singh
6. Mr Vinay Kumar
C-DAC, Hyderabad
15