Cisco Device Hardening Securing Management and Reporting Features

  • Slides: 42
Download presentation
Cisco Device Hardening Securing Management and Reporting Features

Cisco Device Hardening Securing Management and Reporting Features

Secure Management and Reporting Planning Considerations

Secure Management and Reporting Planning Considerations

Secure Management and Reporting Architecture

Secure Management and Reporting Architecture

Secure Management and Reporting Architecture

Secure Management and Reporting Architecture

Information Paths

Information Paths

Configuring an SSH Server for Secure Management and Reporting

Configuring an SSH Server for Secure Management and Reporting

Configuring an SSH Server for Secure Management and Reporting 1. Austin 2#configure terminal Austin

Configuring an SSH Server for Secure Management and Reporting 1. Austin 2#configure terminal Austin 2(config)#ip domain-name cisco. com Austin 2(config)#crypto key generate rsa general-keys modulus 1024 2. Sept 22 13: 20: 45: %SSH-5 -ENABLED: SSH 1. 5 has been enabled 3. Austin 2(config)#ip ssh timeout 120 Austin 2(config)#ip ssh authentication-retries 4 Austin 2(config)#line vty 0 4 Austin 2(config-line)#no transport input telnet Austin 2(config-line)#transport input ssh Austin 2(config-line)#end 1. 2. 3. 4. 5. 6. IP domain name 설정 RSA key 생성 SSH timeout interval 구성 SSH 재시도 횟수 Vty의 inbound Telnet session 비활성화 Vty의 inbound SSH sessions 활성화

Using Syslog Logging for Network Security

Using Syslog Logging for Network Security

Implementing Log Messaging for Security • Router는 다음의 사항 중 하나 이상의 방식으로 log를

Implementing Log Messaging for Security • Router는 다음의 사항 중 하나 이상의 방식으로 log를 전송: – Console – Terminal lines – Memory buffer – SNMP traps – Syslog • Syslog logging은 중요한 보안정책 구성요소이다.

Cisco Log Severity Levels Level Name Description 0 Emergencies Router unusable 1 Alerts Immediate

Cisco Log Severity Levels Level Name Description 0 Emergencies Router unusable 1 Alerts Immediate action required 2 Critical Condition critical 3 Errors Error condition 4 Warnings Warning condition 5 Notifications Normal but important event 6 Informational message 7 Debugging Debug message

Log Message Format Time Stamp Message Text Oct 29 10: 01 EST: %SYS-5 -CONFIG_I:

Log Message Format Time Stamp Message Text Oct 29 10: 01 EST: %SYS-5 -CONFIG_I: Configured from console by vty 0 (1 0. 2. 2. 6) Log Message Name and Severity Level

Configuring Syslog Logging

Configuring Syslog Logging

Configuring Syslog Router(config)# logging [host-name | ip-address] 1. Sets the destination logging host Router(config)#

Configuring Syslog Router(config)# logging [host-name | ip-address] 1. Sets the destination logging host Router(config)# logging trap level 2. (Optional) Sets the log severity (trap) level Router(config)# logging facility-type 3. (Optional) Sets the syslog facility

Configuring Syslog (Cont. ) Router(config)# logging source-interface-type interface-number 4. (Optional) Sets the source interface

Configuring Syslog (Cont. ) Router(config)# logging source-interface-type interface-number 4. (Optional) Sets the source interface Router(config)# logging on 5. Enables logging

Syslog Implementation Example R 3(config)#logging 10. 2. 2. 6 trap informational source-interface loopback 0

Syslog Implementation Example R 3(config)#logging 10. 2. 2. 6 trap informational source-interface loopback 0 on

SNMP Version 3

SNMP Version 3

SNMPv 1 and SNMPv 2 Architecture • SNMP NMS는 정보를 위하여 Device에 내장된 Agent에

SNMPv 1 and SNMPv 2 Architecture • SNMP NMS는 정보를 위하여 Device에 내장된 Agent에 Query하거나 Set 명령을 전달할 수 있다.

SNMP Security Models and Levels Definitions: • Security model은 SNMP agent 사용을 위한 보안

SNMP Security Models and Levels Definitions: • Security model은 SNMP agent 사용을 위한 보안 전략이다. • Security level은 Security model내에서 허용된 보안 레벨이다. Model Level Authentication Encryption What Happens v 1 no. Auth. No. Priv Community String No • Authenticates with a community string match v 2 no. Auth. No. Priv Community String No • Authenticates with a community string match v 3 no. Auth. No. Priv Username No • Authenticates with a username auth. No. Priv MD 5 or SHA No • Provides HMAC MD 5 or SHA algorithms for authentication auth. Priv MD 5 or SHA DES • Provides HMAC MD 5 or SHA algorithms for authentication • Provides DES 56 -bit encryption in addition to authentication based on the CBC-DES (DES 56) standard

SNMPv 3 Architecture

SNMPv 3 Architecture

SNMPv 3 Operational Model

SNMPv 3 Operational Model

Configuring an SNMP Managed Node

Configuring an SNMP Managed Node

SNMPv 3 Configuration Task List Cisco IOS SNMPv 3 server configuration tasks: 1. Configuring

SNMPv 3 Configuration Task List Cisco IOS SNMPv 3 server configuration tasks: 1. Configuring the SNMP-server engine ID 2. Configuring the SNMP-server group names 3. Configuring the SNMP-server users 4. Configuring the SNMP-server hosts

Configuring the SNMP-Server Engine ID Router(config)# snmp-server engine. ID [local engineid-string] | [remote ip-address

Configuring the SNMP-Server Engine ID Router(config)# snmp-server engine. ID [local engineid-string] | [remote ip-address udp-port-number engineid-string] • Configures names for both the local and remote SNMP engine (or copy of SNMP) on the router PR 1(config)#snmp-server engine. ID local 1234

Configuring the SNMP-Server Group Names Router(config)# snmp-server groupname {v 1 | v 2 c

Configuring the SNMP-Server Group Names Router(config)# snmp-server groupname {v 1 | v 2 c | v 3 {auth | noauth | priv}} [readview] [writeview] [notifyview] [access-list] • Configures a new SNMP group, or a table that maps SNMP users to SNMP views PR 1(config)#snmp-server group johngroup v 3 auth PR 1(config)#snmp-server group billgroup v 3 auth priv

Configuring the SNMP-Server Users Router(config)# snmp-server username groupname [remote ip-address [udp-port]] {v 1 |

Configuring the SNMP-Server Users Router(config)# snmp-server username groupname [remote ip-address [udp-port]] {v 1 | v 2 c | v 3 [encrypted] [auth {md 5 | sha} auth-password [priv des 56 priv-password]]} [access-list] • Configures a new user to an SNMP group PR 1(config)#snmp-server password 2 PR 1(config)#snmp-server user John johngroup v 3 auth md 5 john 2 passwd user Bill billgroup v 3 auth md 5 bill 3 passwd des 56 group johngroup v 3 auth group billgroup v 3 auth priv

Configuring the SNMP-Server Hosts Router(config)# snmp-server host-address [traps | informs] [version {1 | 2

Configuring the SNMP-Server Hosts Router(config)# snmp-server host-address [traps | informs] [version {1 | 2 c | 3 [auth | noauth | priv]}] community-string [udp-port] [notification-type] • Configures the recipient of an SNMP trap operation. PR 1(config)#snmp-server PR 1(config)#snmp-server engine. ID remote 10. 1. 1. 1 1234 user billgroup remote 10. 1. 1. 1 v 3 group billgroup v 3 noauth enable traps host 10. 1. 1. 1 inform version 3 noauth bill manager

SNMPv 3 Configuration Example Trap_sender(config)#snmp-server des 56 encryptpassword Trap_sender(config)#snmp-server Trap_sender(config)#snmp-server group snmpgroup v 3

SNMPv 3 Configuration Example Trap_sender(config)#snmp-server des 56 encryptpassword Trap_sender(config)#snmp-server Trap_sender(config)#snmp-server group snmpgroup v 3 auth group snmpgroup v 3 priv user snmpgroup v 3 auth md 5 authpassword priv enable traps cpu enable traps config enable traps snmp host 11. 11. 11 traps version 3 priv snmpuser source-interface traps loopback 0 Walked_device(config)#snmp-server group snmpgroup v 3 auth Walked_device(config)#snmp-server group snmpgroup v 3 priv Walked_device(config)#snmp-server user snmpgroup v 3 auth md 5 authpassword priv des 56 encrypt password

Configuring NTP Client

Configuring NTP Client

Configuring NTP Authentication Router(config)# ntp authenticate • Enables the authentication feature Router(config)# ntp authentication-key

Configuring NTP Authentication Router(config)# ntp authenticate • Enables the authentication feature Router(config)# ntp authentication-key number md 5 value • Defines the authentication keys • Used for both peer and server associations Router(config)# ntp trusted-key key-number • Defines the trusted authentication keys • Required to synchronize to a system (server association) R 1(config)#ntp authentication-key 1 md 5 Ne. Ve. Rg. Ue. Ss R 1(config)#ntp trusted-key 1

Configuring NTP Associations Router(config)# ntp server {ip-address | hostname} [version number] [key keyid] [source

Configuring NTP Associations Router(config)# ntp server {ip-address | hostname} [version number] [key keyid] [source interface] [prefer] • Forms a server association with another system Router(config-if)# ntp broadcast client • Receives NTP broadcast packets R 1(config)#ntp server 10. 1. 1. 1 key 1 R 1(config)#ntp server 10. 2. 2. 2 key 2 prefer R 1(config)#interface Fastethernet 0/1 R 1(config-if)#ntp broadcast client

Configuring Additional NTP Options Router(config)# ntp access-group {query-only | serve | peer} access-list-number •

Configuring Additional NTP Options Router(config)# ntp access-group {query-only | serve | peer} access-list-number • Controls NTP message exchange Router(config)# ntp source interface • Modifies the source IP address of NTP packets R 1(config)#access-list 1 permit host 10. 1. 1. 1 R 1(config)#ntp access-group peer 1 R 1(config)#ntp source loopack 0

Configuring NTP Server

Configuring NTP Server

Configuring NTP Server Router(config)# ntp peer ip-address [normal-sync][version number] [key keyid] [source interface] [prefer]

Configuring NTP Server Router(config)# ntp peer ip-address [normal-sync][version number] [key keyid] [source interface] [prefer] • Forms a peer association with another system Router(config)# ntp master [stratum] • Makes the system an authoritative NTP server Router(config-int)# ntp broadcast [version number][destination address][key keyid] • Configures an interface to send NTP broadcast packets R 2(config)#ntp peer 10. 1. 1. 1 key 1 R 2(config)#ntp master 3 R 2(config)#interface Fastethernet 0/0 R 2(config-int)#ntp broadcast

NTP Configuration Example Source(config)#ntp master 5 authentication-key 1 md 5 secretsource peer 172. 16.

NTP Configuration Example Source(config)#ntp master 5 authentication-key 1 md 5 secretsource peer 172. 16. 0. 2 key 1 source loopback 0 Intermediate(config)#ntp authentication-key 1 md 5 secretsource Intermediate(config)#ntp authentication-key 2 md 5 secretclient Intermediate(config)#ntp trusted-key 1 Intermediate(config)#ntp server 172. 16. 0. 1 Intermediate(config)#ntp source loopback 0 Intermediate(config)#interface Fastethernet 0/0 Intermediate(config-int)#ntp broadcast Client(config)#ntp authentication-key 1 md 5 secretclient Client(config)#ntp trusted-key 1 Client(config)#interface Fastethernet 0/1 Client(config-int)#ntp broadcast client