强化路由器IOS安全-禁用不必要的服务

发布时间:2020-06-19 18:03:32 作者:luosongtao
来源:网络 阅读:1522

Cisco Discovery Protocol

CDP:思科发现协议(CDPCisco Discovery Protocol,CDP 基本上是用来获取直连设备的协议地址以及发现这些设备的平台。支持ATM, Ethernet, FDDI, frame relay, HDLC, PPP, token ring.

CDP 协议能获取如下信息:

1.     cisco设备名字

2.     cisco设备类型,型号

3.     设备运行IOSversion

4.     设备功能,Eg:路由器,交换机或是其他

5.     三层接口地址

6.     设备获取cdp信息来源

 

Eg:

Router#show cdp neighbors detail

-------------------------

Device ID: R1

Entry address(es):

  IP address: 12.12.12.1

Platform: Cisco 7206VXR,  Capabilities: Router

Interface: FastEthernet1/0,  Port ID (outgoing port): FastEthernet1/0

Holdtime : 166 sec

 

Version :

Cisco IOS Software, 7200 Software (C7200-ADVENTERPRISEK9-M), Version 12.4(20)T, RELEASE SOFTWARE (fc3)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2008 by Cisco Systems, Inc.

Compiled Fri 11-Jul-08 04:22 by prod_rel_team

 

advertisement version: 2

Duplex: full

 

禁用CDP协议:边界路由器一般都需要关闭该功能

Router(config)#no cdp run--------全局模式下,对所有接口生效

 

Router(config-if)#no cdp enable-------------接口模式下禁用,针对当前接口

 

==============================================================================TCP and UDP Small Servers

 

关闭TCPUDP的一些无用的小服务,这些小服务的端口小于19,通常用在以前的UNIX环境中,如chargendaytime等。

Eg

R1#telnet 12.12.12.1 daytime

Trying 12.12.12.1, 13 ... Open

Saturday, July 7, 2012 23:57:19-UTC

 

[Connection to 12.12.12.1 closed by foreign host]

 

Router(config)#no service tcp-small-servers

Router(config)#no service udp-small-servers

R1#telnet 12.12.12.1 daytime

Trying 12.12.12.1, 13 ...

% Connection refused by remote host

 

思科IOS 默认是关闭的服务TCP小型服务器

==============================================================================

Finger

常用在UNIX中,用来确定谁登陆到设备上,现在被E-mailmessenger取代。

Eg

Router#telnet 12.12.12.1 finger

Trying 12.12.12.1, 79 ... Open

 

    Line       User       Host(s)              Idle       Location

   0 con 0                idle                 00:00:02  

*  2 vty 0                idle                 00:00:00 12.12.12.2

 

  Interface    User               Mode         Idle     Peer Address

 

[Connection to 12.12.12.1 closed by foreign host]

 

R1(config)# no ip finger

R1(config)#no service finger

 

Router#telnet 12.12.12.1 finger

Trying 12.12.12.1, 79 ...

% Connection refused by remote host

 

在绝大多数的IOS版本中,该特性默认是禁用的,无论如何建议禁用该特性。

 

==============================================================================

IdentD

一个设备发送一个请求到Ident接口(TCP 113), 目标会回答一个身份识别,如host名称或者设备名称。

Router(config)# no ip identd

 

通过telnet 113端口测试设备是否启用了该服务:

Router#telnet 12.12.12.1 113

Trying 12.12.12.1, 113 ... Open

 

IdentD默认情况下是禁用的。

 

 

 

=============================================================== 

IP Source Routing

 ip source-routing欺骗类似ARP***:A在内网, B,C在外网,A信任B C想访问A上的数据.... 于是它修改了自己的源IP地址,告诉A自己是B... 并加入源路由信息,记下了来时的路径这样A按数据来的路返回给了C

 如果 no  ip source-route A发出的包会自己去寻找B,这样,C还是得不到想要的。

 

默认情况下该特性是开启的,禁用该特性:
Router(config)# no ip source-route

 

==============================================================================

FTP and TFTP

路由能提供FTPTFTP的功能,通过该功能可以从一台路由器copy Ios到另一条路由器。强烈建议禁止此功能。

 
默认情况该功能是禁止的,禁止命令:Router(config)# no ftp-server enable

 

==============================================================================

HTTP/HTTPS

验证路由器是否有启用web服务:

Router#telnet 12.12.12.1 80 -------------------------ISP一般都会封掉80端口,需确认HTTP服务是否指定到了其它端口。

Trying 12.12.12.1, 80 ... Open

 

Router#telnet 12.12.12.1 443

Trying 12.12.12.1, 443 ... Open

 

禁用web服务进程:

Router(config)# no ip http server
 
Router(config)# no ip http secure-server

 

Router#telnet 12.12.12.1 80

Trying 12.12.12.1, 80 ...

% Connection refused by remote host

 

Router#telnet 12.12.12.1 443

Trying 12.12.12.1, 443 ...

% Connection refused by remote host

 

==============================================================================

SNMP

在路由器上禁用snmp需执行如下操作:

Remove the default community strings from your router's configuration

Disable SNMP traps and the system shutdown feature

Disable the SNMP service

确认路由器是否启用了SNMP
Router# show running-config | include snmp
 
Building configuration...
 
snmp-server community public RO
 
snmp-server community private RW
 
Router#
 

 

在路由器上禁用SNMP服务:
Eg
Router(config)# no snmp-server community public RO
Router(config)# no snmp-server community private RW
Router(config)# no snmp-server enable traps
Router(config)# no snmp-server system-shutdown
Router(config)# no snmp-server trap-auth
Router(config)# no snmp-server

 

Eg
Router# show snmp
 
%SNMP agent not enabled
默认情况下,该服务是关闭的

 

=============================================================================

Name Resolution

路由器使用DNS解析域名:

Router(config)#ip domain-name cisco.com    

Router(config)#ip name-server 202.96.128.86

Router(config)#ip domain-lookup

 

在路由器上禁止DNS查询:

Router(config)# no ip domain-lookup

 

==============================================================================

BootP

BootP通常用在无盘网络环境中,为工作站提供ip地址。

目前BootP在网络环境中使用得很少

没有认证机制,任何人都能对BootP服务的路由器提出请求,容易遭遇Dos***

 

禁用BootP服务:

Router(config)# no ip bootp server

 

==============================================================================

DHCP

DHCP服务在IOS中默认都是禁止的,禁用命令:

Router(config)# no service dhcp------------禁止路由器充当Dhcp server或提供Dhcp中继服务

 

==============================================================================

PAD

PAD服务一般用在X.25网络中为远端站点提供可靠连接,PAD服务提供对异步设备(terminals, IC-card readers, computers to public/private X.25 networks)的支持。

 

Router(config)# no service pad

 

=============================================================================

关闭自动加载:

Router(config)#  no boot network-------------------------------------关闭路由器通过TFTP加载IOS启动
Router(config)#  no service config-------------------------
关闭路由器加载IOS成功后通过TFTP加载配置文件

 

==============================================================================

Proxy ARP

IOSProxy ARP缺省是打开的,通过在接口下no ip proxy-arp关闭

通过show ip interface查看接口是否使用了Proxy ARP

Eg

Router#show ip interface fastEthernet 1/0

FastEthernet1/0 is up, line protocol is up

  Internet address is 12.12.12.1/24

  Broadcast address is 255.255.255.255

  Address determined by setup command

  MTU is 1500 bytes

  Helper address is not set

  Directed broadcast forwarding is disabled

  Outgoing access list is not set

  Inbound  access list is not set

  Proxy ARP is disabled

  Local Proxy ARP is disabled

 

==============================================================================

Directed Broadcasts

不同于本地广播,直连广播是能够被路由的,某些DoS***通过在网络中泛洪直连广播来***网络。

查看是否启用了直连广播:Router# show ip interface

Eg

Router#show ip interface fastEthernet 1/0

FastEthernet1/0 is up, line protocol is up

  Internet address is 12.12.12.1/24

  Broadcast address is 255.255.255.255

  Address determined by setup command

  MTU is 1500 bytes

  Helper address is not set

  Directed broadcast forwarding is disabled

 

禁用接口上的直连广播:

Router(config-if)# no ip directed-broadcast

 

==============================================================================

ICMP Messages

网络***能够通过如下三种icmp messages***或勘察网络:

ICMP unreachables

ICMP redirects

ICMP mask replies

 

禁用ICMP

Router(config-if)# no ip unreachable

Router(config-if)# no ip redirect
Router(config-if)# no ip mask-reply
 
Eg
Router#show ip interface ethernet 1/0
Ethernet1/0 is up, line protocol is up
  Internet address is 12.12.12.1/24
  Broadcast address is 255.255.255.255
  Address determined by setup command
  MTU is 1500 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent

 

==============================================================================

 

Maintenance Operation Protocol

MOP协议广泛应用在DEC设备中,主要有一下几个功能:

1.  上传或下载的系统软件

2.  远程测试

3.  问题故障诊断

 

关闭路由器对二层DECnet协议的支持:

Router(config)# interface type [slot_#/]port_#
Router(config-if)# no mop enable
 
==============================================================================

在关闭某些服务之前应了解网络中是否要只用这些服务,以免关闭后出现意想不到的问题。

参考:

Cisco Router Firewall Security   By Richard A. Deal

推荐阅读:
  1. Linux服务器安全强化的技巧有哪些
  2. 强化Linux安全的10个技能分别是什么

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

cisco 安全 路由器

上一篇:solidity[47]-interface

下一篇:大话WEB前端性能优化基本套路

相关阅读

您好,登录后才能下订单哦!

密码登录
登录注册
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》