S 4.82 Secure configuration of active network components

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

In addition to neglecting the security of server systems and end devices, the actual network infrastructure with the active network components is often neglected in many cases as well. Central active network components in particular, though, need to be configured with care. While the incorrect configuration of a server system will only affect the users who use the corresponding services on this system, the incorrect configuration of a router can lead to the failure of large subnetworks or even of the entire network, or can allow data to become compromised unnoticed.

The secure configuration of the active network components should be specified as well in the framework of the network concept (see S 2.141 Development of a network concept). The following in particular must be taken into account:

For active network components with routing functionality, it is also necessary to protect the routing updates suitably. The routing tables need to be updated in order to enable dynamic adaptation to the current situation in the local network. Two different security mechanisms can be used in this case:

The selection of a suitable routing protocol is a prerequisite for adequate protection of the routing updates. RIP-2 (Routing Information Protocol Version 2, RFC 1723) and OSPF (Open Shortest Path First, RFC 1583) support passwords in their basic specification, and can also be extended to make use of cryptographic checksums.

Review questions: