[c-nsp] BCP for an ISPs large number of network devices authentication

Jason Ackley jason at ackley.net
Sun Jan 9 10:39:38 EST 2005



On Sun, 9 Jan 2005, Kim Onnel wrote:

> so you're saying option B is better because its easier, i just wanna
> strike balance between security and usability,

 You have more flexibility on a full unix box. You can set up all sorts of
 elaborate controls (and key loggers/session loggers if your audit policy
 requires it).

> probably each NOC user has his own settings like batch files,
> SecureCRT scripts which auto authenticates, these all would still be
> valid with the IPSec, but not with the Linux ssh solution,

 This is a policy concern for some people. E.g. do you really want all of 
 your NOC credentials (for multiple NOC staff members no doubt) sitting on 
 a windows machine and set up for auto-login? 

 Making them 'bounce' via a bastion host is one way to enforce that they 
 do things that is the approved and proper method to access the remote 
 devices.

> Another point would be that IOS is a little more secure than linux,
> since its less complex, but that comes with other point, less
> interactivity and monitoring,

 Determine what your needs are first, then select the solution that meets 
 your particular needs.  Balance this with ability to audit and enforce 
 policy and usability for your NOC staff.

> I just wonder whats the common practice for ISPs with similar
> resources like mine,
> whats the trend ?

 Always deploy multiple bastion hosts or you can easily find yourself 
locked out of your network elements until you get something back up on 
that IP.

 I have tossed around VPNs to/from Network Elements. My thoughts are that 
they always tend to break when you dont want them to break. E.g. when your 
remote POP appears to be down for some reason, having IPsec/ISAKMP running 
may be enough to really push it over the edge..

Common practice:

 Place all NOC machines on a specific set of subnets. Restrict SSH to your 
bastion hosts from these subnets only (and maybe a remote VPN IP pool for 
remote work).

SSH into bastion host using a one-time password or other strong method.  

Bastion host has session/audit logging. From there, SSH/telnet into remote
router devices to manage them. 

Network elements use TACACS/RADIUS back to a TACACS/RADIUS server. NOTE:
Password for NEs should be different from what they use on the bastion
host (Just reject password logins on bastion host really). NEs require VTY 
connections from the bastion host network(s).

Deploy multiple setups like this. One for your primary NOC, one for your 
secondary. 


Audit/Session logs are sent to another host that only your Security team 
has access to.

Continue to run RANCID or other homegrown scripts for configuration 
versioning and tracking.




cheers,
--
jason


More information about the cisco-nsp mailing list