Vro and vswitch Security Policy Example

Source: Internet
Author: User

As an administrator, it is extremely important to develop a set of basic security configuration policies for all network devices of the Organization. To this end, I share the security policies of routers and switches in a certain organization with you:

Router Security Policy Example:

1. the user account cannot be configured on the vro.

2. The enable password command on the vro must be saved in a secure encrypted format.

3. Disable direct IP address broadcast.

4. the router should block data packets whose source address is invalid.

5. Add access rules when your business needs to grow.

6. A vro should be placed in a safe location and its physical access is limited to authorized individuals.

7. Each vro must clearly identify the following statement:

"NOTE: unauthorized access to this network device is prohibited. You must have a clear permission to access or configure the device. All activities performed on this device must be recorded. Violations of this policy will be disciplined and may be taken to justice ."

Each network switch must meet the following configuration standards:

1. user accounts cannot be configured on vswitches.

2. The enable password command on the vswitch must be saved in a secure encrypted format.

3. If the MAC horizontal address of the switch can be locked, this function should be enabled.

4. If a new or unregistered MAC address appears on a port, disable it.

5. If the link is disconnected and re-established, an SNMP trap should be generated.

6. A vswitch should be placed in a safe location and its physical access should be restricted to authorized individuals.

7. The switch should disable any Web server software. If you need such software to maintain the switch, you should start the server to configure the switch and then disable it. All access control for administrator functions should be enabled.

8. Each vswitch must clearly identify the following statement:

"NOTE: unauthorized access to this network device is prohibited. You must have a clear permission to access or configure the device. All activities performed on this device must be recorded. Violations of this policy will be disciplined and may be taken to justice ." These security requirements may not be suitable for your organization and are for your reference only.

Related Articles]

  • Topic: routing knowledge Column
  • Topic: Switch Security

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.