Router Configuration Standard V 1.1
Router Configuration Standard V 1.1
Version 1.1
Revision History:
Approval History:
Table of Contents
1. Scope.................................................................................................................................................... 3
2. General Router Requirements ............................................................................................................. 3
2.1 Router Deployment ....................................................................................................................... 3
2.2 Traffic Mediation........................................................................................................................... 3
2.3 Router Configuration ..................................................................................................................... 3
2.4 Router Change Control .................................................................................................................. 4
2.5 Router Properties........................................................................................................................... 4
2.6 Authentication ............................................................................................................................... 4
2.7 Network Information ..................................................................................................................... 5
2.8 Filtering .......................................................................................................................................... 5
2.9 Failover........................................................................................................................................... 5
2.10 Backup.......................................................................................................................................... 6
3. Router Installation ............................................................................................................................... 6
3.1 Installation ..................................................................................................................................... 6
3.2 Operating System Configuration ................................................................................................... 6
3.3 Authorized Administration ............................................................................................................ 6
3.4 Testing the router .......................................................................................................................... 7
4. Router Logging and Alerting ................................................................................................................ 7
4.1 Terminating a Session .................................................................................................................... 7
4.2 Multiple Alerting Capabilities - ...................................................................................................... 7
5. Router Administration ......................................................................................................................... 8
5.1 Assigned Administrators (ISO/IEC 27001:2013 A.6.1.2.) ............................................................... 8
6. Time Synchronization .......................................................................................................................... 8
7. Review of Router Configuration ........................................................................................................... 8
8. Router Maintenance ............................................................................................................................. 8
8.1 Education and Training .................................................................................................................. 8
8.2 Administrative Requirements ........................................................................................................ 9
9. Reporting Router Security Problems .................................................................................................... 9
1. Scope
This standard was developed to provide the primary building blocks for
implementation of a uniform standard for routers at all Voxai Solutions locations. The
requirements specified in this standard must be strictly followed to ensure success of
this globalization effort. Organizations within Voxai Solutions shall cooperate to
ensure compliance with the requirements of this standard.
All traffic coming from or going to addresses associated with networks interfaced to
the router must be mediated by the router. Only authorized traffic must be allowed
to pass through the routers.
Install DMZ to control network traffic entering and leaving the network and
crossing security boundaries.
- Testing all network connections and changes to the router’s configuration (This is
to prevent security problems caused by misconfiguration of the network or
router. Without formal approval and testing of changes)
➢ Network Administrator / Router Administrator must test every change to
router configuration / network connection to ensure it functions as per
business requirement and securely configured to prevent any security
problems. All the results for testing network connections and changes to
the router configuration must be documented formally.
The router’s rule base structure must support an “Explicit Deny statements to deny
all the requests except those specifically permitted” design policy.
2.6 Authentication
• All routers on the LAN / WAN must require a user to enter a login ID and
password to gain access to the command prompt through an encrypted session
like SSH.
• All remote users must be authenticated via a secure method at the router
before being granted access to internal network resources.
• Terminal Timeout must be configured.
• If using external authentication (Radius/ Active Directory / SSO), Password
policy must be enforced.
• Passwords must be changed every 90 days on all routers.
2.7 Network Information
2.8 Filtering
The router must be capable of employing filtering techniques used to permit or deny
services, applications, and protocols to specified network addresses as needed. The
router shall provide user interface for the configuration of filtering based on relevant
attributes, such as, source and destination IP address, protocol type, source and
destination TCP/UDP port, and inbound or outbound interface.
2.8.1SNMP Rules
• All routers being monitored via SNMP must have non-default SNMP
community strings.
• Routers not being monitored via SNMP must have SNMP disabled.
2.9 Failover
2.10 Backup
3. Router Installation
3.1 Installation
When configuring routers, the administration staff must consider the configuration
of other network infrastructure components such as firewalls, web servers, LAN
servers, etc. to ensure no adverse effect in their operation and configuration.
Only authorized administrators are allowed access to routers to set-up, maintain, and
modify security rules (ACL’s) / Routes on Voxai Solutions routers. Access to routers
must comply with the Voxai Solutions Authentication and Access Control Policy.
• Event log information related to the traffic passing through the router must be
exportable to reporting and analysis tools.
• Event logs (audit trails) shall be available on demand online for analysis
purposes for a minimum period of 90 days. This period can be extended if
system resources allow sufficient storage area for the duration.
• Router event logs must be archived offline for at least 365 days (one year).
Event logs must be managed and maintained in a manner compliant with the
Voxai Solutions implemented audit and relevant standards for Information
Security.
The router must provide automatic facilities to terminate a single or multiple active
connection upon detection of intrusion. The router must also provide manual
facilities to terminate a single or multiple active connection by any authorized
administrator.
5. Router Administration
5.1 Assigned Administrators (ISO/IEC 27001:2013 A.6.1.2.)
6. Time Synchronization
Routers must be synchronized against a Central Network Time Source (NTP) exists
at Voxai Solutions. This is to make sure events in the logs can be correlated
accurately.
8. Router Maintenance
8.1 Education and Training
Proper and adequate training must be provided to all LAN, WAN, & Security
administrators to insure appropriate maintenance and administration of the router.
The Information Security Steering Committee is the owner of this document and is responsible for
ensuring that this policy document is reviewed in line with the review requirements stated above.