Network security-device security reinforcement

Source: Internet
Author: User

 

Network equipment is also an important device in the network boundary. It is the main road to the entire data center and cannot cause any loss. In the past two days, the Nexus network equipment was reinforced with simple security measures, the main operations are summarized as follows:

1. Create a read-only account on nexus, for example, to view configuration and other information. Because nexus has a good and easy-to-operate RBAC control mechanism, this is a better implementation.

A. Create a role named maintain and determine the executable command.

N7k (config) # rolename maintain

N7k (config) # rule1 permit command show running-config

N7k (config) # rule2 permit command show MAC address-table

N7k (config) # rule3 permit command show access-lists

B. Create an account that belongs to maintain. maintainonly

N7k (config) # usernamemaintainonly secret 0 xxxxxx role maintain

C. Log On With maintainonly. Check it.

N7k #? ...... I tried it with a question mark and there is no show command.

End go to EXEC mode

Exit exit from Command Interpreter

N7k # Show run ...... This is acceptable for direct execution here.

! Command: Show running-config

! Time: Thu Sep 4 :35:522014

Version 6.1 (2)

Switchname n7k

.

.

. N7k # Show int ...... The interface is not allowed to be viewed. The actual permissiondenied.

% Permission deniedfor the role


2. Add a bannermotd warning message to the vswitch. Unauthorized users are not allowed to log on to the device.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/48/6D/wKioL1QH_xrylcx0AAE5oZVVVdk387.jpg "Title =" banner.png "alt =" wkiol1qh_xrylcx0aae5ozvvvdk387.jpg "/>

3. Change the device to SSH Login

Feather SSH

No feather Telnet

4. Add access-class access control to vty and set the idle logon timeout time to 10 min.

Create an ACL:

IP access-listlogin_auth

1 permit IP 172.10.10.0/24 any

Then, the call is under vty.

Line vty

Access-class login_auth in

Exec-Timeout 10

5. Enable root protection on some necessary interfaces

Spanning-tree guard Root

6. enable some other security protection features

No ip redirects

No IP unreachables

No IP proxy-ARP

 

So much to summarize, and continue next time.


This article from the "the brightest star in the night sky" blog, please be sure to keep this source http://wangxl.blog.51cto.com/621714/1548708

Network security-device security reinforcement

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.