Catalyst Switch Security Configuration

Source: Internet
Author: User
Tags strong password

Catalyst Switch Security Configuration
The security configuration of the Catalyst switch is to prevent potential network security risks. We recommend that you take the following measures on each cisco device: 1. use enable secret to configure a strong password. Select a password that includes letters, numbers, and special characters. For example: $ PECIAL $ Router (config) # enablesecret $ PECIAL $2. use acl to restrict management access and remote access, and prevent unauthorized access to management interfaces and dos attacks. ensure physical security 4. ensure vty access security by using acl to configure a strong vty access password using ssh25. configure warning 6. disable unnecessary services in multi-layer switching networks. Generally, the following services are not used: Tcp small server (echo chargendiscard daytime) Udp small server (echo chargendiscard daytime) finger automatically configures the PadBootp identification service to select Ip proxy arpI for ntp source routes that do not undergo authentication Cmp is not up to Icmp redirection targeted broadcast forwarding Mop7. use cdpCdp as little as possible. disable cdp on each interface to run cdp only when it is needed for management; run cdp only on devices within the control range. Do not use cdp on insecure links. For example: internet8. disable Integrated http background programs. By default, Integrated http servers are disabled in ios-based software switches. If http access is essential, use another http port, and only trusted subnets and workstations can be accessed by using the acl. Noip http server9. configure basic system logs to use Log tools to monitor switch system information. The default buffer size is insufficient to record most events. 10. to ensure the security of snmp, try to avoid the use of snmp read/write features. Use snmpv3 and encrypted password 11. restrict link aggregation connections and vlan propagation manually or use vtp to delete unused VLANs on the trunk to prevent unauthorized link aggregation. 12. ensure the security of the spanning tree topology by configuring the bridge priority to avoid unintentional moving of stp and

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.