S 2.282 Regular checking of routers and switches

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

In order to ensure proper operation of the active network components and the correctness of all configuration parameters, a regular control process that is as automated as possible must be established. For example, this includes regular functional tests, the instigation of changes and checking their implementation, as well as analysis of the log files and alarms.

In order to be able to efficiently process the large amount of relevant data accruing during live operations, it is usually necessary to use suitable tools in order to achieve controls that are as automated as possible. For example, this may be performed by integration into a network management system (NMS).

Checklist for the control

The checklist in S 4.203 Configuration checklist for routers and switches may be used for the control. The security policy drawn up for routers and switches should be used as a basis (see S 2.279 Drawing up a security policy for routers and switches). Additionally, the following items should be taken into consideration during configuration:

What is being tested and/or checked?

For this, S 2.31 Documentation of authorised users and rights profiles and S 2.64 Checking the log files must be taken into consideration.

How are the tests performed?

When are the tests performed?

Who performs the tests?

Which information are the tests based on?

Reviewing the configuration

When configuring the routers and switches, all default settings must be checked and modified, if required. Here, unneeded services are disabled and presettings are adapted to the operational and security-related requirements, for example. An explanation of the steps required for this can be found in S 4.201 Secure basic local configuration of routers and switches and S 4.202 Secure basic network configuration of routers and switches.

The implementation of the specifications on how to handle default settings must be checked within the framework of regular audits. This way, accidental or deliberate changes can be detected and the implementation of current manufacturer recommendations can be verified. This may be performed on the basis of the installation instructions to be drawn up for every device type and/or for every operating system version and should be verified on the respective device. Here, it must be taken into consideration that operating system commands do not display all default settings with some manufacturers. For this reason, it is recommendable to use separate software tools in order to perform a complete analysis.

For comprehensively testing all devices, software products allowing for automated testing with configurable parameters may be used.

Mirror port

In order to analyse the data traffic, it is possible to configure one port of the router or switch as "mirror port". Here, the entire data traffic of any port is replicated to the mirror port and can be analysed using the corresponding analysis programs. As opposed to other analysis methods, the data traffic is not interrupted or impaired in so doing.

The mechanism offers two analysis methods: mirroring of the entire data traffic for a defined port or mirroring of the data traffic for a MAC address. In the second case, the entire data volume passing through the device with a defined source and/or destination address is mirrored to the mirror port.

The mirror port must not belong to any productive LAN or spanning tree group (STG). By default, "port mirroring" must be switched off. Access to the "port mirroring" configuration must be protected. After having used the mirror port, the port must be disabled. It must be checked regularly whether the port mirroring function is disabled during normal operations.

Review questions: