
Before You Begin 2-5
Considerations
— Think about access control before you connect a console port to the network in any
way, including attaching a modem to the port. Be aware that a break on the console
port might give total control of the firewall, even with access control configured.
— Apply access lists and password protection to all virtual terminal ports. Use access
lists to limit who can Telnet into your router.
— Do not enable any local service (such as Simple Network Management Protocol
[SNMP] or Network Time Protocol [NTP]) that you do not plan to use. Cisco
Discovery Protocol (CDP) and NTP are on by default, and you should turn these off
if you do not need them.
To turn off CDP, enter the no cdp run global configuration command. To turn off
NTP, enter the ntp disable interface configuration command on each interface not
using NTP.
IfyoumustrunNTP,configure NTP onlyon required interfaces,and configure NTP
to listen only to certain peers.
Any enabled service could present a potential security risk. A determined, hostile
party might be able to find creative ways to misuse the enabled services to access
the firewall or the network.
For local services that are enabled, protect against misuse. Protect by configuring
the services to communicate only with specific peers, and protect by configuring
access lists to deny packets for the services at specific interfaces.
— Protect against spoofing: protect the networks on both sides of the firewall from
being spoofed from the other side. You could protect against spoofing by
configuring input access lists at all interfaces to pass only traffic from expected
source addresses, and to deny all other traffic.
You should also disable source routing. For IP, enter the no ip source-route global
configuration command. Disabling source routing at all routers can also help
prevent spoofing.
You should also disable minor services. For IP, enter the no service
tcp-small-servers and no service udp-small-servers global configuration
commands.
— Prevent the firewall from being used as a relay by configuring access lists on any
asynchronous Telnet ports.
Comentarios a estos manuales