Security Hardening Checklist Guide For Cisco Routers - Switches in 10 Steps
Security Hardening Checklist Guide For Cisco Routers - Switches in 10 Steps
Security Hardening Checklist Guide For Cisco Routers - Switches in 10 Steps
HOME Cisco Networking Cisco ASA Certifications Training General Cisco Routers
ABOUT RECOMMENDED SOFTWARE MY BOOKS TRAINING
Cisco Switches
You are here: Home / Network Security / Security Hardening Checklist Guide for Cisco Routers/Switches in 10 Steps
Many enterprises focus on protecting their data, servers, applications, databases etc but they
forget about security of network devices which are sometimes installed with out-of-the-box
configurations.
A compromised router for example can be devastating to the whole security of the enterprise
since it can be used to gain access to data, reconfigured to route traffic to other destinations,
used to launch attacks to other networks, used to gain access to other internal resources etc.
Therefore, hardening the network devices themselves is essential for enhancing the whole
security of the enterprise.
Cisco separates a network device in 3 functional elements called “Planes”. These are the
NETWORKS
following: TRAINING
From the three Planes above, the Management Plane first and the Control Plane second are
the most important to secure.
In this article we will focus on Management Plane security and discuss the 10 most important
steps to harden a Cisco IOS network device.
The security checklist below is not exhaustive but it includes the most important commands
and configurations that will lock down a Cisco IOS network device and enhance its security and
that of the whole network as well. The checklist below applies to both Cisco Routers and
Switches as well.
Table of Contents
Make sure to use the “enable secret” command which creates a password with strong
encryption.
The command above uses a fairly weak Vigenere cipher which can be decrypted with software
tools. It is used mainly to prevent casual observers from reading passwords, such as when
they look at the screen over the shoulder of an administrator.
MORE READING: NMAP Commands Cheat Sheet and Tutorial with Examples
(Download PDF)
With a centralized AAA server you can easily change/enable/disable account passwords,
enforce strong password policies, monitor account usage and user access etc.
Here we will see how to configure both TACACS+ and RADIUS AAA servers with “enable
secret” password as fallback if the AAA server is not available.
NETWORKS TRAINING
TACACS+
RADIUS
Router# config terminal
NETWORKS TRAINING
Router(config)# enable secret K6dn!#scfw35 <- Create first an “enable secret”
password
Router(config)# aaa new-model <- Enable the AAA
ABOUT service SOFTWARE
RECOMMENDED MY BOOKS TRAINING
Router(config)# aaa authentication login default group radius enable <- Use RADIUS for
authentication with “enable” password as fallback
Router(config)# radius-server host 192.168.1.10 <- assign the internal AAA server
Router(config)# radius-server key ‘secret-key’ <- secret key configured on AAA server
Router(config)# line vty 0 4
Router(config-line)# login authentication default <- Apply AAA authentication to VTY
lines (Telnet, SSH etc)
Router(config-line)# exit
Router(config)# line con 0 <- Apply AAA authentication to console port
Router(config-line)# login authentication default
If you have for example 3 network administrators and you have to use local device accounts for
them, then create a personalized user account for each administrator. This accomplishes
accountability for each different administrator about the actions performed on the device.
Moreover, from IOS version 12.2(8)T and later you can configure “Enhanced Password
Security” for local accounts created on the device. This means that local accounts will be
encrypted with MD5 hash.
Let’s configure 3 different local administrator accounts with “Enhanced Password Security”.
7) Enable Logging
Logging is very useful for monitoring, incident response and auditing. You can enable logging
to an internal buffer of the device or to an external Log server. The latter is much more flexible
and helpful since you can store much more log data and perform analysis on logs much easier
than local logging.
There are 8 different logging levels (from 0 to 7) each one giving progressively more log data
details. You should avoid logging level 7 (debug) since it will overload the device.
Here we will discuss both buffered logging (internal to the device) and Logging to an external
NETWORKS
Server. You canTRAINING
have both if you want as shown below.
You can either configure an internal or external NTP server (there are several public NTP
servers that you can use as well).
SSH requires to have a hostname and domain-name configured and also to generate SSH
keys. Also, on VTY lines allow SSH protocol only.
SNMP protocol uses a “Community String” which acts as password for restricting access (Read
Only or Read/Write) to the SNMP data on the device. In addition to configuring a strong
Community String, IP filtering must also be applied to allow SNMP access only from few
management workstations.
Let’s configure two Community strings (one “READ ONLY” and another one “READ/WRITE”)
and also apply IP address control with ACLs.
The above commands allow the administrators subnet 192.168.1.0/28 to have Read Only
SNMP access to devices and also allows host 192.168.1.1 to have full Read/Write SNMP
access to devices.
In a different post I will discuss security of the Control Plane so stay tuned.
Related Posts
5 Best Practices to Keep Rogue Devices at Bay
Cisco Talos Year in Review – Top Cyber Security Threats in 2023 and Beyond
NETWORKS TRAINING
How to Scan an IP Network Range with NMAP (and Zenmap)
What is Cisco Identity Services Engine (ISE)? Use Cases, How it is Used etc
What is Cisco Umbrella Security Service?
ABOUTDiscussion – Use SOFTWARE
RECOMMENDED Cases – Features
MY BOOKS TRAINING
We use Elastic Email as our marketing automation service. By submitting this form, you agree that the
information you provide will be transferred to Elastic Email for processing in accordance with their Terms of
Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.
SUBSCRIBE
Comments
Chuck says
July 18, 2016 at 5:00 pm
This is so beautifully presented. Thank you Andrea for your kindness.
NETWORKS TRAINING
Hey Andrea!
Is there a particular AAA server you would recommend? I have all Cisco switches and
an ASA5506
Thanks – live your books and the tips you send out
Bob
TK says
July 19, 2016 at 4:28 am
Good Topic !
But, What is TACACS+ or RADIUS software that you are using in this topic for AAA
Server?
Hi Robert,
For commercial AAA server, I recommend the Cisco ACS (Access Control System)
which supports both RADIUS and TACACS+ with lots of features.
Also, if you have an internal Microsoft server environment, you can configure Windows
servers as RADIUS
For free options, many people use the popular freeradius (http://freeradius.org/) but
NETWORKS TRAINING
there are many other free AAA servers out there as well.
TK,
Please see my other comment above for AAA server options. It doesn’t matter what
brand or software of AAA server you use. The configuration on the Cisco devices will
be the same.
Harris
TK says
July 19, 2016 at 8:14 am
Hi Andrea!
Ravi says
July 28, 2016 at 9:13 pm
Hello Andrea,
Ravi,
Anurath says
August 27, 2017 at 1:38 pm
Do you have any article about Security Hardening Checklist for Cisco ASA Firewall?
As part of security, what are the main things we need to configure on ASA?
Thank You
Anurath
ASA is pretty much hardened out of the box. You need to take care of configuration for
managing the ASA and create strict rules on SSH or HTTPs access to the ASA for
management. You should allow access only from specific management workstations
etc. Other than that, you must be very careful regarding ACLs and what traffic you
NETWORKS TRAINING
allow to pass through the ASA. Many security weaknesses come from human errors :)
Anurath says
August 28, 2017 at 5:53 am
Hi Harris
Anurath
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name *
NETWORKS TRAINING
POST COMMENT
This site uses Akismet to reduce spam. Learn how your comment data is processed.
We Provide Technical Tutorials and Configuration As an Amazon Associate I earn from qualifying
Examples about TCP/IP Networks with focus on Cisco purchases.
Products and Technologies. This blog entails my own Amazon and the Amazon logo are trademarks of
thoughts and ideas, which may not represent the Amazon.com, Inc. or its affiliates.
thoughts of Cisco Systems Inc. This blog is NOT
affiliated or endorsed by Cisco Systems Inc. All product
SEARCH
names, logos and artwork are copyrights/trademarks of
their respective owners.
Search this website
BLOGROLL
Tech21Century
Firewall.cx
Copyright © 2024 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy