Top Banner
Securing the Router Chris Cunningham
21

Securing the Router Chris Cunningham. Chris Cunningham [email protected] CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Dec 14, 2015

Download

Documents

Kristen Folsom
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Securing the RouterChris Cunningham

Page 2: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Chris Cunningham [email protected]

CCSI #33650

CCNA & CCNP Routing and Switching / CCNA Security

MCITP (Server Enter. Admin & Vista),

MCTS (Server 08 & Vista)

A+, Network+, Security+

Page 3: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Before Implementing Security Changes• Consult Change Management Documents and Processes

• Lab it up to be sure it will do what you think it will do

• Consult Security Documentation to verify it fits in with the Security Policy of the organization

• Above all else, when finished. . . Document!!

Page 4: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Planes of Security

Page 5: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Management Plane

Data Plane

Control Plane

How Tech’s Connect to the device

How the Router Decides to forward traffic

The data being forwarded

Page 6: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Management Plane

Page 7: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Encrypted Communications• SSH Version 2

• HTTPs for GUI Configuration

Page 8: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Secure Login• Use Radius or TACACS+

Router(config)# aaa new-model

Router(config)# radius server

Router(config-radius-server)#address ipv4 10.0.0.1 acct-port 1813 auth-port 1812 key apple

Router(config)# aaa authentication login default group radius local

Router(config)# username admin secret 0 apple

• Login Lockouts (local accounts)

Router(config)# aaa local authentication attempts max-fail 3

Router# clear aaa local user lockout [username | all]

• Disable Password Recovery (disables access to RMON by disabling the BREAK sequence)

Router (config)#no service password-recovery

• Access Class

• Exec-timeout

Page 9: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Network Monitoring• Use SNMP Version 3 with ACL to limit which SNMP Servers can

connect

Router(config)#ip access-list extended snmp-server

Router(config-ext-nacl)#permit ip 10.1.0.100 any

Router(config)# snmp-server group group1 v3 auth access snmp-server

Router(config)# snmp-server engineID remote 10.1.0.100 udp-port 120 1a2833c0129a

Router(config)# snmp-server user user1 group1 v3 auth md5 password123

Or

Router(config)#snmp-server community server1 RO snmp-serverRouter(config)#snmp-server community server2 RW snmp-server

• Use Syslog with separate Network (VLAN) for communication• Disable Console Logging to reduce the CPU load on the device

Page 10: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Secure Configurations• Use the Archive Feature to allow for rapid recovery when device is

misconfigured

• Use Secure Boot-Image to secure the IOS so it can’t be deleted

Router(config)# secure boot-image

• Use Secure Boot-Config to secure the startup-config from being removed

Router(config)# secure boot-config

Verify

Router# show secure bootset

Page 11: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Control Plane

Page 12: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Secure Routing Protocols• Use MD5 Password Hashes

Router(config)# enable secret apple

Router(config)# username chris secret 0 apple

• Passive interfaces

• Also Secure FHRP (HSRP, VRRP, GLBP) with Authentication

Router(config)# key chain secure

Router(config-keychain)#key 1

Router(config-keychain-key)#key-string apple

Router(config-keychain-key)#inter fa 0/0

Router(config-if#standby 1 authentication md5 key-chain secure

Page 13: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Preserve CPU Resources• Access Control List logging

Page 14: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Control Plane Policing (CoPP)• Allows you more control over what protocols and data are allowed to

enter the router and thus the Control Plane

Page 15: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Data Plane

Page 16: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

IP Traffic• Fragmentation

Router(config)# ip access-list extended SecureRouter(config-ext-nacl)#deny tcp any any fragmentsRouter(config-ext-nacl)# deny udp any any fragmentsRouter(config-ext-nacl)# deny icmp any any fragmentsRouter(config-ext-nacl)# deny ip any any fragments

• IP Options

Router(config-ext-nacl)# deny ip any any option any-options

• TTL to short to make it through the network

Router(config-ext-nacl)# deny ip any any ttl lt 6

* All this traffic gets Process Switched instead of using CEF

Page 17: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Prevent Spoofed Packets• Unicast Reverse Path Forwarding (Unicast RPF)

Router(config-if)#ip verify unicast source reachable-via rx

Page 18: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Monitor with NetFlow

Page 19: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Wrap-Up

Page 20: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Secure All Planes of a Device• Management Plane

• Control Plane

• Data Plane

• Document, Document, Document

Page 21: Securing the Router Chris Cunningham. Chris Cunningham chris.Cunningham@nhcomputerlearning.com CCSI #33650 CCNA & CCNP Routing and Switching / CCNA Security.

Questions??