Perimeter Routers:
Perimeter Routers are usually standard routers providing a serial connection to the outside world, as well as connection between the devices within an internal network. The role of a perimeter router is to filter any outside traffic to implement basic security for the DMZ and preliminary filtering for the inside network. A perimeter router can run a firewall for additional security.
A DMZ is an area or more inside the network perimeter, but not on the inside of the firewall device. There are two types of DMZ. The first is often called a dirty DMZ. It refers to the LAN segment between the firewall and perimeter router. This DMZ only has the protection of the perimeter router and whatever individual security features of the devices placed within this DMZ. The second DMZ is made up of one or more additional LAN interfaces on the firewall. This DMZ is called protected DMZ, as they have the additional protection offered by the firewall device. The following diagram is an example of a protected DMZ.
Securing Routers by Disabling Unused Router Services and Interfaces:
On routers, a whole bunch of services come enabled by default. To make a router more secure, unused services should be disabled.
bootp
bootp is enabled by default, and if you are not using it, you should definitely disable it. You can use the no ip bootp server command in global configuration mode to disable bootp on your routers:
Central(config)# no ip bootp server
CDP
Cisco Discovery Protocol (CDP) is also enabled by default, and we highly recommend that you disable this service on the router globally. You can disable CDP globally by using the no cdp runcommand in global configuration mode, or you can disable CDP on a per-interface basis by using the no cdp enable command in interface configuration mode:
Central(config)#no cdp run
Central(config-if)#no cdp enable
CAUTION
The no cdp run command disables CDP globally on the routers.
ip classless
The
ip classless command is enabled on the Cisco routers by default in version 12.0 and higher. Disable
ip classless if your network does not have a subnetted range of IP addresses. If you are subnetting a block of IP address allocated to you by the American Registry for Internet Numbers (ARIN), you should ensure that
ip classless is enabled. You can learn more about ARIN by going to
http://www.arin.net. It allows the router to advertise the subnetted addresses to its neighbors:
Central(config)#no ip classless
DNS
Domain Name System (DNS) lookup is enabled by default on Cisco routers, and if you are not implementing DNS lookup on your network, it is highly advisable to disable this feature globally by using the no ip domain-lookup command:
Central(config)#no ip domain-lookup
finger
The finger command is enabled by default and can be used to see what users are logged on to the network device. The finger command has been documented in RFC 742, and you should globally disable the finger command on network devices:
Central(config)#no ip finger
CAUTION
The no service finger command has been replaced by the no ip finger command.
CAUTION
Finger service can be disabled on the router in global configuration mode.
HTTP
Cisco routers can be accessed via a Web page, and unless you are implementing authentication proxy, we highly recommend that you turn off the HTTP service running on the router. You can use the no ip http server command to disable it.
If you want to implement HTTP-based management, we recommend that you implement HTTP authentication and limit the HTTP connections to the router using ACLs.
ip mask-reply
By default, the ip mask-reply command is disabled on all Cisco routers. The mask replies respond to Internet Control Message Protocol (ICMP) mask requests by sending out ICMP mask replies, and these mask replies contain important network information. If mask replies are enabled, make sure you disable them on the router by using the no ip mask-reply command in interface configuration mode:
Central(config-if)#no ip mask-reply
IP-Directed Broadcast
The IP-directed broadcast is another service that is commonly used in Smurf attacks. Smurf attacks send ICMP echo requests from a spoofed source address to a directed broadcast that cause all hosts to respond to the ping echo request, creating a lot of traffic on the network. By default on IOS version 12.0 and higher, ip directed broadcast is disabled, and if you are running any version lower than 12.0, it is imperative that you disable IP directed broadcasts on the router by issuing the following command in interface configuration mode:
Central(config-if)#no ip directed-broadcast
CAUTION
Smurf attacks send ICMP echo requests from a spoofed source address to a directed broadcast that cause all hosts to respond to the ping echo request, creating a lot of traffic on the network.
IP Source Routing
IP source routing allows the sender of an IP packet to control the route that packet will take to reach the destination endpoint. By default, IP source routing is disabled on the routers and should only be enabled if your network needs call for it. The following command disables IP source routing on the router globally:
Central(config)#no ip source-route
CAUTION
IP source routing allows the sender of an IP packet to control the route that packet will take to reach the destination endpoint.
IP Unreachable
IP unreachable messages can be used to map out the network topology, and they should be disabled on all interfaces. You can disable IP unreachables on all interfaces by issuing the following command in interface configuration mode:
Central(config-if)#no ip unreachables
CAUTION
IP unreachables should be disabled on all interfaces connected to insecure networks.
Small Servers
Cisco classifies echo, chargen, daytime, and discard as small services and recommends that these services be disabled on the router. By default, on versions 11.3 or higher, the small server service is disabled by default.
Logging:
Perimeter router logs can be used for troubleshooting, capacity planning and dealing with security incidents. For security purposes, status changes, changes to system configurations, access list matches, events detected by the firewall and intrusion detection features are logged. This logs can be viewed in a few ways.
Here are some ways:
- Through the system using the logging console command. As some console ports are unattended or are connected to terminals with no historical storage, this information might be unavailable.
- Servers running the syslog daemon can send logging information to sa server with the server-ip-address command.
- Remote sessions on VTYs and local sessions on TTYs (logging monitor and terminal monitor commands.)
- Routers can store logging information to a local RAM buffer. However, it only shows the most recent information. show memory command shows how much free memory a router has to support a logging buffer. A buffer can be created using the buffer-size
Access List Violation Logs
To manage file size and minimize performance impacts, configure logging for those critical access list entries. Don’t log entries that will match a large number of packets and generate little useful information, such as the
permit any statement.
With traffic filtering and ACLs, logging packets that violate the filter criteria should be logged. Older Cisco IOS software versions used the
log keyword option, which captures the IP addresses and port numbers of packets that match an access list entry. Newer IOS versions use the
log-input keyword, which adds additional information such as the receiving interface information and the MAC address of the host that sent the packet.
Reference:
command.