S 4.203 Configuration checklist for routers and switches

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

In summary, the following configuration checklist can be used in order to check the most important security-relevant settings on routers and switches. However, it must be stated that the secure configuration of routers and switches strongly depends on the operational purpose. For example, the configuration of ACLs, anti-spoofing configuration, etc. must be taken into consideration for border routers. Therefore, the following table should only be used as a general guideline. Security safeguards to be applied to routers are also applicable to switches, if these support routing functions and insofar as these functions are being used.

Configuration checklist for routers and switches
Drawing up a security policy for routers and switches  

Check and possibly update of the operating system
 
Offline storage, backup, and protection against unauthorised access of the router and switch configurations (use of a TFTP server only in connection with out-of-band management (separate administration network))  
Documentation and commenting of the configuration  
Configuration of password protection for all accesses (console, VTY, etc.)  
Configuration of a session timeout  
Do not use any trivial passwords  
Encrypted storage of the passwords  
Configuration of physical access protection for the console connection  
Replace ELNET by SSH as far as possible for administration purposes.  
If possible, use RADIUS or TACACS+ for authentication  
Limitation of the administration accesses (e.g. SSH, SNMP, TELNET) by ACLs, use of SNMP and TELNET only in connection with out-of-band management (separate administration network), for SNMP, change of the community strings  
Disabling of unneeded network services  
Switching off of unneeded interfaces on routers, also disabling of unneeded ports or assignment of unneeded ports to "Unassigned VLAN" for switches  
Blocking of critical interface services and protocols  
Enabling of the logging function  
Integration of the time information during logging  
Analysis, auditing, and archiving of the log files according to the security policy  
Disabling of SNMP, if possible, use only in connection with out-of-band management (administration network) or use of SNMPv3Disabling of SNMP, if possible, use only in connection with out-of-band management (administration network) or use of SNMPv3  

Auditing of the default settings
 
Configuration of a login banner  
Disabling of CDP on terminal ports  
Specifically for switches::  
When using VTP: Use of authentication  
Disabling of trunk negotiation on terminal ports  
The default VLAN must not be used  
Configuration of a separate VLAN for all trunk ports  
Configuration of an Unassigned VLAN for all ports used  
Disabling of STP (Spanning Tree) on terminal ports  
Determination of a root bridge  
Specifically for routers:  
Configuration checklist for routers and switches  
Configuration of a communication matrix for cross-network data traffic  
Limitation of cross-network data traffic when comparing to communication matrix with the help of access lists  
Blocking of unknown addresses with the help of access lists (ACLs)  
If required (particularly in the DMZ): Configuration of static routes  
Configuration of integrity mechanisms of the routing protocols used  

Review questions: