[c-nsp] Router security defaults (WAS RE: Proxy ARP -- To disable, or not to disable..)

Justin Shore justin at justinshore.com
Mon Mar 24 00:02:50 EDT 2008


hostname <host>
ip domain-name <domain.tld>
crypto key generate rsa modulus 2048
!
ip ssh time-out 60
ip ssh version 2
ip ssh authentication-retries 3
!
service nagle
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime localtime show-timezone
service password-encryption
service sequence-numbers
ip icmp rate-limit unreachable DF 2000
!
no ip http server
no ip http secure-server

There's a lot more to do.  You should also look into autosecure as well 
as the "Router Security Strategies" book.  Plus all the config for AAA, 
VTY, SNMP, NTP, logging, Lock & Key, CoPP, etc.  The Cymru Secure IOS 
Template is worth looking at too.

http://www.cymru.com/Documents/secure-ios-template.html

Justin


Joseph Jackson wrote:
> After reading this message it brought to mind the default steps I take whenever a new router is configured for our network.  Here's the list of the stuff I do which I got from the hardening cisco routers book.  What do you guys think?  Should there be anything else? I also try to run ssh on any router that can support it.
> 
> GLOBAL CONFIG
> 
> no service finger
> no service pad
> no service udp-small-servers
> no service tcp-small-servers
> service password-encryption
> service tcp-keepalives-in
> service tcp-keepalives-out
> no cdp run
> no ip bootp server
> no ip http server
> no ip finger
> no ip source-route
> no ip gratuitous-arps
> 
> END GLOBAL CONFIG
> 
> 
> Per Interface Config
> 
>  no ip redirects
>  no ip proxy-arp
>  no ip unreachables
>  no ip directed-broadcast
>  no ip mask-reply
>  ip cef
> END Per Interface Config
> 
>> -----Original Message-----
>> From: cisco-nsp-bounces at puck.nether.net [mailto:cisco-nsp-
>> bounces at puck.nether.net] On Behalf Of Eric Cables
>> Sent: Friday, March 21, 2008 2:13 PM
>> To: cisco-nsp at puck.nether.net
>> Subject: [c-nsp] Proxy ARP -- To disable, or not to disable..
>>
>> A recent network audit has discovered that Proxy ARP is enabled on
>> pretty
>> much every L3 interface in the network.  As a Cisco default, this isn't
>> surprising, since no template configs have it disabled.
>>
>> The question is: whether or not I should go back and disable it, or
>> just
>> leave it be, since it doesn't appear to be causing any problems.
>>
>> Any feedback would be appreciated.
>>
>> --
>> Eric Cables
>> _______________________________________________
>> cisco-nsp mailing list  cisco-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> 


More information about the cisco-nsp mailing list