国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 學院 > 網絡通信 > 正文

路由器安全配置速查表(三)

2019-11-05 00:48:12
字體:
來源:轉載
供稿:網友

路由器安全配置速查表(三)

Specific Recommendations: Logging & Debugging

1. Turn on the router’s logging capability, and use it to log errors and blocked packets to an internal (trusted) syslog host. Make sure that the router blocks syslog traffic from untrusted networks. See example commands below.

Central(config)# logging on
Central(config)# logging 14.2.9.1
Central(config)# logging buffered
Central(config)# logging console critical
Central(config)# logging trap informational
Central(config)# logging facility local1

2. Configure the router to include time information in the logging. Configure at least two different NTP servers to ensure availability of good time information. This will allow an administrator to trace network attacks more accurately. See example commands below.

East(config)# service timestamps log datetime localtime show-timezone msec
East(config)# clock timezone GMT 0
East(config)# ntp server 14.1.1.250
East(config)# ntp server 14.2.9.1

3. If your network requires SNMP, then configure an SNMP ACL and hard-to-guess SNMP community strings. The example commands below show how to remove the default community strings and set a better read-only community string, with an ACL.

East(config)# no snmp community public ro
East(config)# no snmp community PRivate rw
East(config)# no access-list 51
East(config)# access-list 51 permit 14.2.9.1
East(config)# snmp community BTRl8+never ro 51

Router Security Checklist

This security checklist is designed to help you review your router security configuration, and remind you of any security area you might have missed.

Router security policy written, approved, distributed.
Router IOS version checked and up to date.
Router configuration kept off-line, backed up, access to it limited.
Router configuration is well-documented, commented.
Router users and passWords configured and maintained.
Password encryption in use, enable secret in use.
Enable secret difficult to guess, knowledge of it strictly limited. (if not, change the enable secret immediately). 
Access restrictions imposed on Console, Aux, VTYs. 
Unneeded network servers and facilities disabled. 
Necessary network services configured correctly (e.g. DNS) 
Unused interfaces and VTYs shut down or disabled. 
Risky interface services disabled. 
Port and protocol needs of the network identified and checked. 
Access lists limit traffic to identified ports and protocols. 
Access lists block reserved and inappropriate addresses. 
Static routes configured where necessary. 
Routing protocols configured to use integrity mechanisms. 
Logging enabled and log recipient hosts identified and configured. 
Router’s time of day set accurately, maintained with NTP. 
Logging set to include consistent time information. 
Logs checked, reviewed, archived in accordance with local policy. 
SNMP disabled or enabled with good community strings and ACLs.




發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 锦屏县| 城步| 敦煌市| 朝阳市| 长汀县| 深水埗区| 龙州县| 贺州市| 大理市| 博乐市| 隆林| 富川| 郎溪县| 临漳县| 鄯善县| 九龙城区| 通江县| 绩溪县| 精河县| 保德县| 英德市| 南开区| 定州市| 阿拉善左旗| 大荔县| 伊宁市| 敦煌市| 和平县| 汕头市| 永新县| 鸡西市| 凤城市| 乌苏市| 全南县| 天津市| 宜章县| 增城市| 鱼台县| 保山市| 望谟县| 靖州|