S 4.80 Secure access mechanisms for remote administration

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Some active network components can be administered or monitored remotely by accessing the network. Access is attained using either connectionless or connection-oriented protocols. These protocols include:

For all types of access, it must be ensured that unauthorised access cannot be gained.

For this, the default passwords and/or community names of the network components must be replaced by secure passwords and/or community names (see S 4.82 Secure configuration of active network components). In many active network components, the coupling of community names and passwords affects the FTP, Telnet, SNMP and CMIP protocols. Some components also allow access to be restricted based on MAC or IP addresses. This option should be used wherever possible so that access is only granted through dedicated management stations.

Only the network component itself should be able to enable data transmission protocols (TFTP, FTP, RCP). This applies in particular to non-authenticating protocols such as TFTP. For interactive communication protocols (Telnet), the auto-logout option of the network component should be enabled.

It must be noted that in most protocols, passwords and community names are transmitted in clear text, i.e. they can generally be read when someone listens in (refer to S 5.61 Suitable physical segmentation and S 5.62 Suitable logical segmentation)

Example: The "public" and "private" default community names in SNMP should be replaced by other names.

Review questions: