Disable Unneeded Services
|
||
Are unused interfaces disabled?
|
Unused interfaces on the router should be disabled.
Router(config-if)# shutdown
|
|
Is DNS lookups for the router turned off ?
|
This client service is enabled by default and is not required on most
routers.
The following command is used to turn DNS lookup off.
Router(config)#no ip domain-lookup
|
|
Is TCP small servers and UDP small servers
service disabled on the router? {applicable
before Cisco IOS 11.3}
|
These services are rarely used and hence can be
disabled. This is disabled by default after Cisco IOS 11.3
Router(config)#no service tcp-small-servers
|
|
Is Cisco Discovery Protocol disabled on the
router?
|
CDP which is used to obtain information such as the ip address, platform
type of the neighboring Cisco devices should be disabled on the router if not
used by any application.
Router(config)# no cdp run OR
Router(config-if)# no cdp enable
|
|
Is the finger service disabled on the router?
{applicable before Cisco IOS 11.3}
|
Unauthorized persons can use the information
obtained through this command for reconnaissance attacks. This service
should be disabled.
Router(config)#no service finger
|
|
Is Bootp server disabled on the routers?
|
The Bootp server service which is enabled by default allows other routers
to boot from this router. This feature should be disabled on the router as it
is rarely used on today’s networks
The following command is used to disable the service.
Router(config)#no ip bootp server
|
|
Is directed broadcast disabled on all interfaces?
|
Directed broadcasts permit a host on one LAN
segment to initiate a physical broadcast on a different LAN segment. This
feature should be disabled on the router as it could be used in
denial-of-service attacks.
The following command is used to disable the service.
{applicable before Cisco IOS 11.3}
Router(config-if)#no ip directed-broadcast
|
|
Is source routing disabled on the router?
|
Source routing is a feature that allows individual
packets to specify routes. This is used in various
attacks.
This feature should be disabled on the router.
The following command is used to disable the service
Router(config)#no ip source-route
|
|
Is Proxy ARP disabled on the router?
|
Proxy ARP helps in extending a LAN at layer 2 across multiple segments
thereby breaking the LAN security perimeter .This feature should be disabled
on the router.
The following command is used to disable the serviceon individual
interfaces.
Router(config-if)#no ip proxy-arp
|
|
Is ICMP redirects disabled on the router?
|
attackers for network mapping and diagnosis are: Host unreachable,
‘Redirect’ and ‘Mask Reply’. Automatic generation of these messages should be
disabled on all interfaces, especially those connected to untrusted networks.
The following command is used to disable the service.
Router(config-if)#no ip redirects
Router(config-if)#no ip unreachables
Router(config-if)#no ip-mask reply
|
|
Password Encryption
|
||
Do passwords appear in encrypted form when
viewed at the configuration file
|
Passwords should appear encrypted when viewed through the configuration
file.
The following command is used to implement the same.
Router(config)#service password-encryption
|
|
Authentication Settings
|
||
Is enable secret used for the router enable
mode?
|
The enable secret command should be enabled to implement MD5 hashed
password on enable mode.
Router(config)#enable secret password
|
|
Does the enable secret password match any
other username password; enable password, or
the enable secret password of another router in
the network?
|
The enable secret password should be unique across each router. If the
routers are too many, instead of keeping a single enable secret password for
all, the password could be different for routers in different
zones
|
|
Is a Message of the Day (MOTD) banner
defined?
|
Login banners should be used as a preventive
measure against unauthorized access to the routers.
Use the following command to enable a MOTD banner:
Router# config t
Router(config)# banner motd ^
|
|
Is the following defined on the console port:
1.
Exec-timeout
2.
Password
|
These parameters should be defined on the console port to reduce the
chance of an unauthorized access on the console port.
The following commands can be used to implement the same:
Cisco(config)#line con 0
Cisco(config-line)#exec-timeout 5 0
Cisco(config-line)#password password
Cisco(config-line)#login
|
|
Is the aux port disabled?
|
The aux port should be disabled if there is no business need for the
same.
Use the following command to disable the aux port:
Router(config)#line aux 0
Router(config-line)#no exec
|
|
Is the following defined on the vty lines:
1. Exec-timeout (Yes/No)
2. Password
|
These parameter should be defined on the vty port to reduce the chance of
an unauthorized access.
Use the following to enable these parameters on the vty lines:
Router(config)#line vty 0 4
Router(config-line)#exec timeout 5 0
Router(config-line)#password password
Router(config-line)#login
Router(config-line)#transport input protocol
|
|
Is the vty lines restricted to certain IP Addresses
only?
|
If the vty lines use telnet as the transport protocol, it is advisable to
restrict access to certain IP Addresses only since telnet transmits data in
clear text.
Use the following command to restrict vty access to certain ip addresses:
Router(config)#access-list 50 permit 192.168.1.x (x
represents the IP address of the administrator’s
machine)
Router(config)#access-list 50 deny any log
Router(config)#line vty 0 4
Router(config-line)#access-class 50 in
|
|
According to policy, how often do router
passwords (telnet, username, enable) have to be
changed?
|
Router passwords need to be changed periodically, typically once every
4-6 months depending on the functionality of the router.
|
|
Do the router passwords meet with the required
complexity as defined by the policy?
|
All password defined on the router should meet the
following criteria:
· Minimum 8 characters in length
· Should be alphanumeric along with special
characters (@#$%)
· Should not include organization’s name in it
|
|
Is SSH used for the vty lines?
|
SSH is a preferred protocol over Telnet for vty access since it encrypts
the data while in transit on the network.
|
|
Do any applications use telnet to perform
management activities such as backing up
configuration?
|
The Telnet protocol transfers data in clear text thereby allowing an
intruder to sniff valuable data such as passwords.
As a remedy the following can be done:
· Using secure protocols such as SSH
wherever possible
· Restricting access from certain
workstations only
· Maintaining strong passwords
|
|
Administrator Authentication
|
||
Is authentication on the router done through:
· Locally configured usernames and
passwords
· TACACS+/RADUIS server
|
||
Is there a documented procedure for creation of
users?
|
A documented procedure for creation of administrators on the router
should exist.
The procedure should address:
· Approval from the department head
· Recording the authorization level given to
the new administrator and the duration
|
|
Does each router administrator have a unique
account for himself/herself?
|
Each router administrator should have a unique
Account for him/her to maintain accountability.
The following commands can be executed to create unique local usernames
on the router:
Router(config)#username username password
password
Router(config)#line vty 0 4
Router(config-line)#login local
|
|
Is login and logout tracking/command logging for
the router administrators through the TACACS+
system enabled?
|
A detailed log of every command typed on the router as well as when an
administrator logged in or out can be recorded for audit purposes.
Router(config)#aaa accounting exec default start-stop group tacacs+
Router(config)aaa accounting commands 15 default start-stop group tacacs+
|
|
Are all user accounts assigned the lowest
privilege level that allows them to perform their
duties? (Principle of Least Privilege)
|
All user accounts should be assigned the lowest privilege level that
allows them to perform their duties.
If multiple administrators exist on the router, each administrator should
be given an individual username and password and assigned the lowest
privilege levels
|
|
Management Access
|
||
Is the http/https Server used for router
management?
|
This service allows the router to be monitored or have its configuration
modified from the web browser.
If not used, this service should be disabled.
Router(config)#no ip http server
If this service is required, restrict access to the
http/https service using access control lists.
Router(config)#ip http access-class 22
Router(config)#access-list 22 permit host mgmt ip
Router(config)#access-list 22 deny any log
|
|
Which version of SNMP is used to manage the
router?
|
Ideally SNMP version 3 should be used on the router since it introduces
authentication in the form of a username and password and offers encryption
as well.Since the SNMP process is enabled by default, it should be disabled
if not used.
Router(config)# no snmp-server
|
|
Is the SNMP process restricted to certain range
of IP Addresses only?
|
If SNMP v1 or v2c is used, ACL’s should be configured to limit the
addresses that can send SNMP commands to the device. SNMP v1 or v2c uses the
community string as the only form of authentication and is sent in clear text
across the network
Router(config)#access-list 67 permit host snmp-server
Router(config)#access-list 67 deny any log
|
|
Is the default community strings such as ‘public’
and ‘private’ changed?
|
Default community strings such as ‘public’ and ‘private’ should be
changed immediately before bring the router on the network
|
|
How often is the SNMP community string
changed?
|
If SNMP v1 or v2c is being used, the SNMP community strings should be
treated like root passwords by changing them often and introducing complexity
in them
|
|
Is any access list defined restricting the syslog
host to receive log messages from the routers
only and only administrators’ systems to connect
to the log host?
|
||
Is the NTP server service used to synchronize
the clocks of all the routers?
|
The NTP service which is disabled by default helps to synchronize clocks
between networking devices thereby maintaining a consistent time which is essential
for diagnostic and security alerts and log
data. However if configured insecurely, it could used to corrupt the time
clock of the network devices. To prevent this, restrict which devices have
access to NTP.
The service should also be disabled if not used.
|
|
Ingress/Egress Filtering
|
||
Is RFC 1918 filtering implemented?
|
RFC 1918 addresses are meant to be used for internal networks only and
have no reason to be seen on the Internet.
The following access-lists should be implemented on the Internet router:
Router(config)#access-list 101 deny ip 10.0.0.0
0.255.255.255 any log
Router(config)#access-list 101 deny ip 172.16.0.0
0.15.255.255 any log
Router(config)#access-list 101 deny ip 192.168.0.0
0.0.255.255 any log
Router(config)#access-list 101 permit ip any any
|
|
Is uRPF enabled on the Cisco router?
|
Unicast Reverse Path Forwarding is an alternative to RFC 2827 filtering.
It can enabled using the following commands:
Router(config-if)#ip verify unicast reverse-path
|
|
Route Protocol Security
|
||
Is routing protocol message authentication
enabled?
|
Message authentication helps prevent the spoofing or modification of a
valid routing protocol message
|
|
Configuration Maintenance
|
||
How often is the router configurations backed
up?
|
Router configurations should be backed up periodically
depending on importance and frequency of changes
|
|
Is the backup moved to an off-site/DR site?
|
Backup copies should be maintained off-site for quick recovery during a
disaster
|
|
On the system where the configuration files are
stored, is the local operating system’s security
mechanisms used for restricting access to the
files (i.e., the machine should be password
enabled and prevent unauthorized individuals
from accessing the machine.)?
|
If a file server is used to store configuration files, the files should
be restricted to authorized personnel only.
|
|
Is the TFTP protocol used to transfer
configuration or image files to and from the
router?
If yes,
Is the TFTP process restricted to
certain addresses only?
Is the TFTP service disabled when
not in use?
|
The TFTP protocol which is disabled by default transfers files in clear
text and hence is unsafe to use.
If yes,
The TFTP process should be restricted to certain addresses only
(management workstations) to reduce the risk. The service should also be
disabled when not in use because it allows access to certain files in the
Router flash.
|
|
Is there a documented procedure for backup of
router configurations?
|
||
Router Change Management
|
||
Are all router changes and updates documented
in a manner suitable for review according to a
change management procedure?
|
||
Router Redundancy
|
||
Is there a router redundancy in cold standby or
hot standby?
|
||
Are disaster recovery procedures for the
router/network documented and are they tested
|
||
Log monitoring and Incident Handling
|
||
Are all attempts to any port, protocol, or service
that is denied logged?
|
||
Is the CPU utilization/memory of the router
monitored?
|
||
Is logging to a syslog server enabled on the
router
|
Syslog messages allows for easy troubleshooting of the network.
Use the following commands to enable syslog
Router(config)#logging syslog-ip-address
Router(config)#service timestamps log datetime localtime msec show-timezone
|
|
Are procedures for audit log review generated by
the router documented and followed?
|
||
How often is the router logs (covering
administrator access /access control) reviewed
|
||
Are reports and analyses carried out based on
the log messages?
|
||
What is the course of action to be followed if any
malicious incident is noticed
|
||
Security Updates
|
||
Is the network engineer aware of the latest vulnerabilities that could
affect the router?
|
The network engineer should receive periodic updates on the vulnerabilities
and patches affecting the route
|
|
Monday, 29 July 2013
Router And Switch (L2,L3) Audit Check List
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment