Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 248 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
248
Dung lượng
2,33 MB
Nội dung
UNCLASSIFIED
Report Number: C4-054R-00
Router Security
Configuration Guide
Principles and guidance for secure configuration of IP routers,
with detailed instructions for Cisco Systems routers
Router Security Guidance Activity
of the
System and Network Attack Center (SNAC)
Authors:
Vanessa Antoine
Patricia Bosmajian
Daniel Duesterhaus
Michael Dransfield
Brian Eppinger
James Houser
Andrew Kim
Phyllis Lee
David Opitz
Michael Wiacek
Mark Wilson
Neal Ziring
Updated: November 21, 2001
Version: 1.0j
National Security Agency
9800 Savage Rd. Suite 6704
Ft. Meade, MD 20755-6704
W2KGuides@nsa.gov
UNCLASSIFIED
Router SecurityConfigurationGuide UNCLASSIFIED
Warnings
This document is only a guide to recommended security settings for Internet Protocol
(IP) routers, particularly routers running Cisco Systems Internet Operating System
(IOS) versions 11 and 12. It is not meant to replace well-designed policy or sound
judgment. This guide does not address site-specific configuration issues. Care must
be taken when implementing the security steps specified in this guide. Ensure that
all security steps and procedures chosen from this guide are thoroughly tested and
reviewed prior to imposing them on an operational network.
This document is current as of September, 2001.
Acknowledgements
The authors would like to acknowledge Daniel Duesterhaus, author of the original
NSA “Cisco RouterSecurityConfiguration Guide,” and the management and staff of
the Applications and Architectures division for their patience and assistance with the
development of this guide. Special thanks also go to Ray Bongiorni for his quality
assurance and editorial work. Additional contributors to the development effort
include Andrew Dorsett, Jennifer Dorrin, Charles Hall, Scott McKay, and Jeffrey
Thomas.
Trademark Information
Cisco, IOS, and CiscoSecure are registered trademarks of Cisco Systems, Inc. in the
U.S.A. and other countries. Windows 2000 is a registered trademark of Microsoft
Corporation in the US.A. and other countries. All other names are trademarks or
registered trademarks of their respective companies.
Revision History
1.0 Sep 2000 First complete draft, extensive internal review.
1.0b Oct 2000 Revised after review by Ray Bongiorni
1.0d Dec 2000 Revised after additional testing, submitted
for classification and pre-publication review.
1.0e Jan 2001 Polished format, cover page, fixed up
grammar, etc. First release version.
1.0f Mar 2001 Second release version: fixed typos and errors,
added references, passed second pre-pub review
1.0g Apr 2001 Third release version: incorporated external
feedback, fixed typos.
1.0h Aug 2001 Fourth release version: incorporated more external
feedback, added SSH section, fixed more typos,
updated some links. Another QA review.
1.0j Nov 2001 Fifth release version; more external feedback,
added some tools and polished some procedures.
2 UNCLASSIFIED Version 1.0j
UNCLASSIFIED Contents
Contents
Preface 5
1. Introduction 7
1.1. The Roles of Routers in Modern Networks 7
1.2. Motivations for Providing RouterSecurity Guidance 9
1.3. Typographic and Diagrammatic Conventions Used in this Guide 10
1.4. Structural Overview 12
2. Background and Review 15
2.1. Review of TCP/IP Networking 15
2.2. TCP/IP and the OSI Model 17
2.3. Review of IP Routing and IP Architectures 19
2.4. Basic Router Functional Architecture 22
2.5. Review of Router-Relevant Protocols and Layers 25
2.6. Quick “Review” of Attacks on Routers 27
2.7. References 28
3. RouterSecurity Principles and Goals 31
3.1. Protecting the Router Itself 31
3.2. Protecting the Network with the Router 32
3.3. Managing the Router 36
3.4. Security Policy for Routers 38
3.5. References 43
4. Implementing Security on Cisco Routers 45
4.1. Router Access Security 46
4.2. Router Network Service Security 60
4.3. Access Lists and Filtering 72
4.4. Routing and Routing Protocols 85
4.5. Audit and Management 106
4.6. Security for Router Network Access Services 141
4.7. Collected References 161
5. Advanced Security Services 163
5.1. Role of the Router in Inter-Network Security 163
5.2. IP Network Security 164
5.3. Using a Cisco Router as a Firewall 186
5.4. Using SSH for Remote Administration Security 195
5.5. References 200
6. Testing and Security Validation 203
6.1. Principles for RouterSecurity Testing 203
6.2. Testing Tools 203
6.3. Testing and Security Analysis Techniques 204
Version 1.0j UNCLASSIFIED 3
Router SecurityConfigurationGuide UNCLASSIFIED
6.4. References 211
7. Future Issues in RouterSecurity 213
7.1. Routing and Switching 213
7.2. ATM and IP Routing 215
7.3. IPSec and Dynamic Virtual Private Networks 216
7.4. Tunneling Protocols and Virtual Network Applications 217
7.5. IP Quality of Service and RSVP 218
7.6. Secure DNS 219
7.7. References 220
8. Appendices 223
8.1. Top Ways to Quickly Improve the Security of a Cisco Router 223
8.2. Application to Ethernet Switches and Related Non-Router Network Hardware 229
8.3. Overview of Cisco IOS Versions and Releases 232
8.4. Glossary of Router Security-related Terms 238
9. Additional Resources 243
9.1. Bibliography 243
9.2. Web Site References 245
9.3. Tool References 247
4 UNCLASSIFIED Version 1.0j
UNCLASSIFIED Preface
Preface
Routers direct and control much of the data flowing across computer networks. This
guide provides technical guidance intended to help network administrators and
security officers improve the security of their networks. Using the information
presented here, you can configure your routers to control access, resist attacks, shield
other network components, and even protect the integrity and confidentiality of
network traffic.
This guide was developed in response to numerous questions and requests for
assistance received by the NSA System and Network Attack Center (SNAC). The
topics covered in the guide were selected on the basis of customer interest, and the
SNAC’s background in securing networks.
The goal for this guide is a simple one: improve the security provided by routers on
US Department of Defense (DoD) operational networks.
Who Should Use This Guide
Network administrators and network security officers are the primary audience for
this configuration guide, throughout the text the familiar pronoun “you” is used for
guidance directed specifically to them. Most network administrators are responsible
for managing the connections within their networks, and between their network and
various other networks. Network security officers are usually responsible for
selecting and deploying the assurance measures applied to their networks. For this
audience, this guide provides security goals and guidance, along with specific
examples of configuring Cisco routers to meet those goals.
Firewall administrators are another intended audience for this guide. Often, firewalls
are employed in conjunction with filtering routers; the overall perimeter security of
an enclave benefits when the configurations of the firewall and router are
complementary. While this guide does not discuss general firewall topics in any
depth, it does provide information that firewall administrators need to configure their
routers to actively support their perimeter security policies. Section 5 includes
information on using the firewall features of the Cisco Integrated Security facility.
Information System Security Engineers (ISSEs) may also find this guide useful.
Using it, an ISSE can gain greater familiarity with security services that routers can
provide, and use that knowledge to incorporate routers more effectively into the
secure network configurations that they design.
Sections 4, 5, and 6 of this guide are designed for use with routers made by Cisco
Systems, and running Cisco’s IOS software. The descriptions and examples in those
sections were written with the assumption that the reader is familiar with basic Cisco
router operations and command syntax.
Version 1.0j UNCLASSIFIED 5
Router SecurityConfigurationGuide UNCLASSIFIED
Feedback
This guide was created by a team of individuals in the System and Network Attack
Center (SNAC), which is part of the NSA Information Assurance Directorate. The
editor was Neal Ziring. Comments and feedback about this guide may be directed to
the SNAC (Attn: Neal Ziring), Suite 6704, National Security Agency, Ft. Meade,
MD, 20755-6704, or via e-mail to rscg@thematrix.ncsc.mil.
6 UNCLASSIFIED Version 1.0j
UNCLASSIFIED Introduction
1. Introduction
1.1. The Roles of Routers in Modern Networks
On a very small computer network, it is feasible to use simple broadcast or sequential
mechanisms for moving data from point to point. An Ethernet local area network
(LAN) is essentially a broadcast network. In larger, more complex computer
networks, data must be directed specifically to the intended destination. Routers
direct network data messages, or packets, based on internal addresses and tables of
routes, or known destinations that serve certain addresses. Directing data between
portions of a network is the primary purpose of a router.
Most large computer networks use the TCP/IP protocol suite. See Section 2.3 for a
quick review of TCP/IP and IP addressing. Figure 1-1, below, illustrates the primary
function of a router in a small IP network.
Router 2
File Server
14.2.9.10
Router 1
User Host
190.20.2.12
Wide Area
N
etwor
k
LAN 2
14.2.6.0
LAN 3
14.2.9.0
LAN 1
190.20.2.0
Figure 1-1 – A Simple Network with Two Routers
If the user host (top left) needs to send a message to the file server (bottom right), it
simply creates a packet with address 14.2.9.10, and sends the packet over LAN 1 to
its gateway, Router 1. Consulting its internal routing table, Router 1 forwards the
packet to Router 2. Consulting its own routing table, Router 2 sends the packet over
LAN 3 to the File Server. In practice, the operation of any large network depends on
the routing tables in all of its constituent routers. Without robust routing, most
modern networks cannot function. Therefore, the security of routers and their
configuration settings is vital to network operation.
Version 1.0j UNCLASSIFIED 7
Router SecurityConfigurationGuide UNCLASSIFIED
In addition to directing packets, a router may be responsible for filtering traffic,
allowing some data packets to pass and rejecting others. Filtering is a very important
responsibility for routers; it allows them to protect computers and other network
components from illegitimate or hostile traffic. For more information, consult
Sections 3, 4, and 6.
8 UNCLASSIFIED Version 1.0j
UNCLASSIFIED Introduction
1.2. Motivations for Providing RouterSecurity Guidance
Routers provide services that are essential to the correct, secure operation of the
networks they serve. Compromise of a router can lead to various security problems
on the network served by that router, or even other networks with which that router
communicates.
! Compromise of a router’s routing tables can result in reduced
performance, denial of network communication services, and exposure of
sensitive data.
! Compromise of a router’s access control can result in exposure of network
configuration details or denial of service, and can facilitate attacks against
other network components.
! A poor router filtering configuration can reduce the overall security of an
entire enclave, expose internal network components to scans and attacks,
and make it easier for attackers to avoid detection.
! On the other hand, proper use of router cryptographic security features can
help protect sensitive data, ensure data integrity, and facilitate secure
cooperation between independent enclaves.
In general, well-configured secure routers can greatly improve the overall security
posture of a network. Security policy enforced at a router is difficult for negligent or
malicious end-users to circumvent, thus avoiding a very serious potential source of
security problems.
There are substantial security resources available from router vendors. For example,
Cisco offers extensive on-line documentation and printed books about the security
features supported by their products. These books and papers are valuable, but they
are not sufficient. Most vendor-supplied routersecurity documents are focused on
documenting all of the security features offered by the router, and do not always
supply security rationale for selecting and applying those features. This guide
attempts to provide security rationale and concrete security direction, with pertinent
references at the end of each section identifying the most useful vendor
documentation. This guide also provides pointers to related books, vendor
documents, standards, and available software.
Version 1.0j UNCLASSIFIED 9
Router SecurityConfigurationGuide UNCLASSIFIED
1.3. Typographic and Diagrammatic Conventions Used in this Guide
To help make this guide more practical, most of the sections include extensive
instructions and examples. The following typographic conventions are used as part
of presenting the examples.
! Specific router and host commands are identified in the text using Courier
bold typeface: “to list the current routing table, use the command
show ip
route
.” Command arguments are shown in Courier italics: “syntax for a
simple IP access list rule is
access-list number permit host
address
.”
! Sequences of commands to be used in a configuration are shown
separately from the text, using Courier typeface. The exclamation point
begins a comment line, usually a remark about the line that follows it.
! set the log host IP address and buffer size
logging 14.2.9.6
logging buffered 16000
! Transcripts of router sessions are shown separately from the text, using
Courier typeface. Input in the transcript is distinguished from output, user
input and comments are shown in Courier bold typeface. Elision of long
output is denoted by two dots. In some cases, output that would be too
wide to fit on the page is shown with some white space removed, to make
it narrower.
Central> enable
Password:
Central# ! list interfaces in concise format
Central# show ip interface brief
Interface IP Address OK? Method
Ethernet 0/0 14.2.15.250 YES NVRAM
Ethernet 0/1 14.2.9.250 YES Manual
.
.
Central# exit
! IP addresses will be shown in the text and in diagrams as A.B.C.D, or as
A.B.C.D/N, where N is the number of set bits in the IP netmask. For
example, 14.2.9.150/24 has a netmask of 255.255.255.0. (In general, this
classless netmask notation will be used where a netmask is relevant.
Otherwise, the bare address will be used.)
! Cisco IOS accepts the shortest unique, unambiguous abbreviation for any
command or keyword. For commands that are typed very frequently, this
guide uses the abbreviations commonly employed in the Cisco
documentation and literature. For example, the interface name
ethernet
is commonly abbreviated “
eth” and the command configure terminal
is commonly abbreviated “
config t”.
10 UNCLASSIFIED Version 1.0j
[...]... UNCLASSIFIED 29 Router SecurityConfigurationGuide 30 UNCLASSIFIED UNCLASSIFIED Version 1.0j UNCLASSIFIED RouterSecurity Principles and Goals 3 RouterSecurity Principles and Goals Routers can play a role in securing networks This section describes general principles for protecting a router itself, protecting a network with a router, and managing a router securely 3.1 Protecting the Router Itself 3.1.1... control for routers ! Section 5 describes advanced security services that some routers can provide, with a focus on Cisco routers’ capabilities The three main topics of this section are IP security (IPSec), SSH, and using a Cisco router as a simple firewall ! Section 6 presents testing and troubleshooting techniques for routersecurity It is essential for good security that any router security configuration. .. and network security, and describes some simple network security threats ! Section 3 presents a security model for routers, and defines general goals and mechanisms for securing routers Security mechanisms must be applied in support of security policy; this section describes some areas that a routersecurity policy should address, along with a discussion of relationships between routersecurity and... improve routersecurity Section 4.4 – for routing protocol security instructions (unless the routers are using static routes exclusively) UNCLASSIFIED 13 Router SecurityConfigurationGuide 14 UNCLASSIFIED UNCLASSIFIED Version 1.0j UNCLASSIFIED Background and Review 2 Background and Review This section reviews some background information about TCP/IP networking, router hardware architecture, router. .. high-level view of routersecurity is more important than the details of Cisco router commands Read the sections listed below if your role is security planner or security designer ! Section 2 – for a review of TCP/IP, network, and router operational concepts ! Section 3 – for general routersecurity principles ! Section 4.1 through 4.3 – for an idea of what Cisco routers can do for network security ! Section... the guide, including pointers to web sites and security tools 12 UNCLASSIFIED Version 1.0j UNCLASSIFIED Introduction How to Use This Guide Several different roles are involved in securing a network, and each may need some information about routersecurity The paragraphs below offer roadmaps for using this guide for several different network security roles For network security planners and system security. .. stored in NVRAM It is executed when the router boots As part of the boot process a copy of this configuration is loaded into RAM Changes made to a running configuration are usually made only in RAM and Version 1.0j UNCLASSIFIED 23 Router SecurityConfigurationGuide UNCLASSIFIED generally take effect immediately If changes to a configuration are written to the startup configuration, then they will also... and overall network security ! Section 4 details the methods and commands for applying security to Cisco routers, using recent versions of the Cisco IOS software It is divided into six main parts: ! ! ! ! ! ! securing access to the router itself, securing router network services, controlling and filtering using a router, configuring routing protocols security, security management for routers, and network... the router for connectivity Also, adding memory to an operational router requires taking that router out of service In the Internet Service Provider community, for example, it is considered an industry best practice to equip every operational router with as much memory as it can hold Version 1.0j UNCLASSIFIED 31 Router SecurityConfigurationGuide UNCLASSIFIED 3.2 Protecting the Network with the Router. .. Internet Router Premises or Gateway routerRouter Firewall Protected Network Internal or Local net router Figure 3-2: Typical Two -router Internet Connection Configuration 32 UNCLASSIFIED Version 1.0j UNCLASSIFIED RouterSecurity Principles and Goals 3.2.2 Packet Filters for TCP/IP A packet filter for TCP/IP services provides control of the data transfer between networks based on addresses and protocols Routers .
Router Security
Configuration Guide
Principles and guidance for secure configuration of IP routers,
with detailed instructions for Cisco Systems routers. 36
3.4. Security Policy for Routers 38
3.5. References 43
4. Implementing Security on Cisco Routers 45
4.1. Router Access Security 46
4.2. Router Network