This article describes how to enhance the security of a Cisco router by using a Nipper. So how should we use it? The following article gives you a detailed answer.
How do I use a Nipper?
Since Nipper supports so many devices and is also known to support a wide range of multi-functional options, it is impossible for me to present them in all aspects. However, we can make a basic demonstration. In our example, we will use the Nipper to review a Cisco router with only the default settings.
Before getting started, I took a Cisco 2600 series router, cleared the configuration, and restarted it. Now we can begin to review this router process.
First, download the Nipper from the famous open-source website, which currently has Windows and Linux versions. Decompress it to your local computer. We assume its location is C: \ nipper.
Next, obtain the configuration file of the vro in this article. Log on to the vro through Telnet or SSH, run the show running-configuration command, copy the displayed configuration to a notepad, and save it to the C: \ nipper.
Of course, you can also use a TFTP server to copy configurations to your local computer. In my example, we can use the tftpd32.exe tool to quickly and easily complete this operation. The command copy running-configuration tftp is used.
Once you have this configuration on your computer, go to the Windows command line window and go to the "Nipper" directory. Run the following command, as shown in:
Nipper -- ios-router --inputpolictestrouterconfig.txt --output?audit.html
Figure 1. run commands
After entering this command, the cursor immediately returns to the prompt without providing any information. But don't worry, it's done.
Next, open a browser and enter c: \ nipper \ audit.html in the address bar. A security report will be presented to you. Is a screenshot.