【正文】
Cisco Device Hardening Securing Management and Reporting Features Secure Management and Reporting Planning Considerations Secure Management and Reporting Planning Considerations ? Which are the most important logs? ? How are important messages separated from routine notifications? ? How do you prevent tampering with logs? ? How do you make sure time stamps match? ? What log data is needed in criminal investigations? ? How do you deal with the volume of log messages? ? How do you manage all the devices? ? How can you track changes when attacks or work failures occur? Secure Management and Reporting Architecture Secure Management and Reporting Architecture Information Paths InBand Management Considerations ? Which management protocols does each device support? ? Does the management channel need to be active at all times? ? Is SNMP necessary? Secure Management and Reporting Guidelines ? Inband management guidelines: – Apply only to devices needing to be managed or monitored. – Use IPsec when possible. – Use SSH or SSL instead of Tel. – Decide whether the management channel needs to be open at all times. – Keep clocks on hosts and work devices synchronized. – Record changes and archive configurations. ? OOB management guidelines: – Provide highest level of security and mitigate the risk of passing insecure management protocols over the production work. – Keep clocks on hosts and work devices synchronized. – Record changes and archive configurations. Configuring an SSH Server for Secure Management and Reporting Configuring an SSH Server for Secure Management and Reporting Austin2configure terminal Austin2(config)ip domainname Austin2(config)crypto key generate rsa generalkeys modulus 1024 Sept 22 13:20:45: %SSH5ENABLED: SSH has been enabled Austin2(config)ip ssh timeout 120 Austin2(config)ip ssh authenticationretries 4 Austin2(config)line vty 0 4 Austin2(configline)no transport input tel Austin2(configline)transport input ssh Austin2(configline)end 1. Configure the IP domain name 2. Generate the RSA keys 3. Configure the SSH timeout interval 4. Configure the SSH retries 5. Disable vty inbound Tel sessions 6. Enable vty inbound SSH sessions Using Syslog Logging for Network Security Implementing Log Messaging for Security ? Routers should be configured to send log messages to one or more of these: – Console – Terminal lines – Memory buffer – SNMP traps – Syslog ? Syslog logging is a key security policy ponent. Syslog Systems ? Syslog