Catalyst Switch Security Configuration
The security configuration of the Catalyst switch is to prevent potential network security risks. We recommend that you take the following measures on each cisco device: 1. use enable secret to configure a strong password. Select a password that includes letters, numbers, and special characters. For example: $ PECIAL $ Router (config) # enablesecret $ PECIAL $2. use acl to restrict management access and remote access, and prevent unauthorized access to management interfaces and dos attacks. ensure physical security 4. ensure vty access security by using acl to configure a strong vty access password using ssh25. configure warning 6. disable unnecessary services in multi-layer switching networks. Generally, the following services are not used: Tcp small server (echo chargendiscard daytime) Udp small server (echo chargendiscard daytime) finger automatically configures the PadBootp identification service to select Ip proxy arpI for ntp source routes that do not undergo authentication Cmp is not up to Icmp redirection targeted broadcast forwarding Mop7. use cdpCdp as little as possible. disable cdp on each interface to run cdp only when it is needed for management; run cdp only on devices within the control range. Do not use cdp on insecure links. For example: internet8. disable Integrated http background programs. By default, Integrated http servers are disabled in ios-based software switches. If http access is essential, use another http port, and only trusted subnets and workstations can be accessed by using the acl. Noip http server9. configure basic system logs to use Log tools to monitor switch system information. The default buffer size is insufficient to record most events. 10. to ensure the security of snmp, try to avoid the use of snmp read/write features. Use snmpv3 and encrypted password 11. restrict link aggregation connections and vlan propagation manually or use vtp to delete unused VLANs on the trunk to prevent unauthorized link aggregation. 12. ensure the security of the spanning tree topology by configuring the bridge priority to avoid unintentional moving of stp and