Term Paper: Security of Cisco Routers
Term Paper: Security of Cisco Routers
Term Paper: Security of Cisco Routers
Term paper ON
Security of Cisco routers
Submitted to:
Mr. Parvesh Mor
Submitted By: Amit kumar pandey Roll No.: RD1E26B18 Section: D1E43
Introduction
Cisco IOS is software se! o" #ost Cisco S$ste#s ro ters a"! c rre"t Cisco "etwor% switches. IOS is a &ac%a'e of ro ti"'( switchi"'( i"ter"etwor%i"' a"! te)eco## "icatio"s f "ctio"s i"te'rate! i"to a # )titas%i"' o&erati"' s$ste#.Cisco IOS (originally Internet or! Operating System) is soft are used on most
Cisco Systems routers and current Cisco net or! s itches" (#arlier s itches ran CatOS") IOS is a pac!age of routing$ s itching$ internet or!ing and telecommunications functions integrated into a multitas!ing operating system" The IOS Tcl command line interface pro%ides a fi&ed set of multiple' ord commands" The set a%ailable is determined by the (mode( and the pri%ilege le%el of the current user" ()lobal configuration mode( pro%ides commands to change the system*s configuration$ and (interface configuration mode( pro%ides commands to change the configuration of a specific interface" All commands are assigned a pri%ilege le%el$ from + to ,5$ and can only be accessed by users ith the necessary pri%ilege" Through the C-I$ the commands a%ailable to each pri%ilege le%el can be defined"This document contains information to help you secure your Cisco IOS . system de%ices$ hich increases the o%erall security of your net or!" Structured around the three planes into hich functions of a net or! de%ice can be categori/ed$ this document pro%ides an o%er%ie of each included feature and references to related documentation" The three functional planes of a net or!$ the management plane$ control plane$ and data plane$ each pro%ide different functionality that needs to be protected"
Management Plane0The management plane manages traffic that is sent to the Cisco IOS de%ice and is made up of applications and protocols such as SS1 and S2M3" Control Plane0The control plane of a net or! de%ice processes the traffic that is paramount to maintaining the functionality of the net or! infrastructure" The control plane consists of applications and protocols bet een net or! de%ices$ hich includes the 4order )ate ay 3rotocol (4)3)$ as ell as the Interior )ate ay 3rotocols (I)3s) such as the #nhanced Interior )ate ay 5outing 3rotocol (#I)53) and Open Shortest 3ath 6irst (OS36)" Data Plane0The data plane for ards data through a net or! de%ice" The data plane does not include traffic that is sent to the local Cisco IOS de%ice"
Versioning
2
Cisco IOS is %ersioned using three numbers and some letters$ in the general form a"b(c"d)e$ here7 ,)a is the ma8or %ersion number" 9)b is the minor %ersion number" :)c is the release number$ hich begins at one and increments as ne releases in the same a"b train are released" (Train( is Cisco'spea! for$ ("""a %ehicle for deli%ering Cisco soft are to a specific set of platforms and features""( ;)d (omitted from general releases) is the interim build number" 5)e (/ero$ one or t o letters) is the soft are release train identifier$ such as none ( hich designates the mainline$ see belo )$ T (for Technology)$ # (for #nterprise)$ S (for Ser%ice pro%ider)$ <A as a special functionality train$ <4 as a different special functionality train$ etc"
Bringing Up a Routers = po er'on = self'test (3OST) = load the Cisco IOS from flash memory = IOS loads and loo!s for a %alid configuration(stored by default in non%olatile 5AM$ or 2>5AM)
3
Security: !Router and S"itc #dministrati$e %unctions&security' = 1ostnames = = = 4anners 3ass ord Interface descriptions
(ostnames = 5outerBcon)ig t
4
= #nter configuration commands$ one per line" #nd ith = C2T-CD" = 5outer(config)B ostname *odd = Todd(config)B ostname #tlanta = Atlanta(config)B Banners
= A banner is more than 8ust a little cool0one %ery good reason for ha%ing a banner is to gi%e any and all ho dare attempt to telnet or dial into your internet or! a little security notice"
)our a$ailable banner types = e&ec process creation banner = incoming terminal line banner = login banner = message of the day banner = Message of the day (MOTE) is the most e&tensi%ely used banner" It gi%es a message to e%ery person dialing into or connecting to the router %ia Telnet or au&iliary port$ or e%en through a console port Setting Pass"ords = There are fi%e pass ords used to secure your Cisco routers7
*
F console F Au&iliary F telnet (>TA) F enable pass ord F enable secret" +nable Pass"ords = Console and Au&iliary used to set your enable pass ord that@s used to secure pri%ileged mode" This ill prompt a user for a pass ord hen the enable command is used"
e,ample o) setting t e enable pass"ords: = 5outer(config)Benable secret todd = 5outer(config)Benable pass ord todd = The enable pass ord you ha%e chosen is the same as your enable secret" This is not recommended" 5e'enter the enable pass ord"
= H+'I+? 6irst -ine number = au& Au&iliary line = console 3rimary terminal line = tty Terminal controller = %ty >irtual terminal = &Cy SlotC3ort for Modems = au, Sets the user'mode pass ord for the au&iliary port" = console Sets a console user'mode pass ord" $ty Sets a Telnet pass ord on the router *elnet Pass"ord
= = = = = = 5outer(config'line)Bline %ty + G H,';? -ast -ine 2umber Hcr? 5outer(config'line)Bline %ty + ; 5outer(config'line)B pass ord todd9 5outer(config'line)B login #ncrypting Aour 3ass ords = 4ecause only the enable secret pass ord is encrypted by default$ you@ll need to manually configure the user'mode and enable pass ords for encryption"
To manually encrypt your pass ords$ use the ser%ice pass ord'encryption command"
= = =
5outerBconfig t #nter configuration commands$ one per line" #nd ith C2T-CD" 5outer(config)Bser%ice pass ord'encryption
Secure Operations
Secure net or! operations is a substantial topic" Although most of this document is de%oted to the secure configuration of a Cisco IOS de%ice$ configurations alone do not completely secure a net or!" The operational procedures in use on the net or! contribute as much to security as the configuration of the underlying de%ices"
configuration data" An e&le is the use of the Secure Copy 3rotocol (SC3) in place of 6T3 or T6T3"
Re)erences /' ttp:00""".cisco.com0en0US0products0ps12340 5' ttp:00""".cisco.com0en0US0tec 0t61370t681/0tec nologie s9tec 9note4:/71a4474/54)37.s tml 8' ttp:00""".cisco.com0en0US0tec 0t61370t681/0tec nologie s9tec 9note4:/71a4474/54)37.s tml 3' ttp:00""".cisco.com0en0US0products0ps:8420inde,. tml 2' ttp:00""".cisco.com0en0US0products0s"0securs"0ps28/70
1-
Key fingerprint L A6,M 6A9I 96M; MMNE 6E45 E#:E 6N45 +O#; A,OM ;#;O
11