Cisco Router Security Best Practices
Cisco Router Security Best Practices
CERT-In
Indian Computer Emergency Response Team
Handling Computer Security Incidents
Table of Contents
1. INTRODUCTION ......................................................................................................................................... 3
2. ACCESS MANAGEMENT........................................................................................................................... 3
3. DISABLE UNNECESSARY SERVICES ............................................................................................... 4
4. SNMP SECURITY ........................................................................................................................................ 4
5. ROUTING RULES ........................................................................................................................................ 4
6. ACCESS CONTROL LISTS....................................................................................................................... 5
7. LOGGING........................................................................................................................................................ 7
8. BENCHMARK................................................................................................................................................. 7
9. REFERENCE ................................................................................................................................................... 7
1. Introduction
This document provides Guideline for securing a typical enterprise perimeter (Gateway)
router.
** Security issues related to routing protocols (BGP, OSPF, RIP, VRRP etc) are beyond the
scope of this document.
2. Access Management
I. Console –
Router# config t
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)# line con 0
Router (config-line)# login local //Enforce local user login; Local user must be
created
Router (config-line)# exec-timeout 5 0 //Set automatic session timeout
IOS - Create local users -Create at least one local user with password to enable
console login
Router(config)# username user_name password <Password>
III. VTY -
Router(config)# no access-list 90
Router(config)# access-list 90 deny any log
Router(config)# line vty 0 4
Router(config-line)# access-class 90 in
Router(config-line)# transport input none
Router(config-line)# login local
Router(config-line)# exec-timeout 0 1
Router(config-line)# access-class 99 in
Router(config-line)# exec-timeout 5 0
Router(config-line)# transport input telnet
Router(config-line)# transport output none ---Disable telnet outside
Router(config-line)# login local
Router(config)# service tcp-keepalives-in
4. SNMP Security
Router(config)# no snmp-server
If the network requires SNMP, then configure an SNMP ACL and hard-to-guess SNMP
community strings.
5. Routing Rules
Router(config)# ip cef
Router(config-if)# ip verify unicast reverse-path
The ACLs mentioned here are designed for restricting inbound traffic of a perimeter
router.
**The access_list number (101) given is user defined. User can change it as per
their requirement
**The access list has to be applied to inbound traffic on external interface.
III. Permit the required services for the required IP Addresses only
!! Incoming Requests
!! Return traffic
! Allow only ACKed tcp packets to your network or only to specific IP’s accessing
Internet
7. Logging
Turn on the Router’s logging capability, send all log errors and blocked packets to an
trusted syslog server.
8. Benchmark
http://www.cisecurity.org/
9. Reference
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00
801afc76.shtml