Network Device Configuration Assessment



SysAdmin Audit Network Security (SANS) Router and Switch Security Policy
https://www.sans.org/security-resources/policies/network-security#router-and-switch-security-policy

1. No local user accounts are configured on the router. Routers and switches must use TACACS+ for all user authentication.

2. The enable password on the router or switch must be kept in a secure encrypted form. The router or switch must have the enable password set to the current production router/switch password from the device’s support organization

3. The following services or features must be disabled:
a. IP directed broadcasts
b. Incoming packets at the router/switch sourced with invalid addresses such as RFC1918 addresses
c. TCP small services
d. UDP small services
e. All source routing and switching
f. All web services running on router

7. Use corporate standardized SNMP community strings. Default strings, such as public or
private must be removed. SNMP must be configured to use the most secure version of
the protocol allowed for by the combination of the device and management systems.

9. Access control lists for transiting the device are to be added as business needs arise.

10. The router must be included in the corporate enterprise management system with a
designated point of contact.

11. Each router must have the following statement presented for all forms of login whether
remote or local:
"UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You musthave explicit permission to access or configure this device. All activities performed onthis device may be logged, and violations of this policy may result in disciplinary action,and may be reported to law enforcement. There is no right to privacy on this device. Useof this system shall constitute consent to monitoring." 

12. Telnet may never be used across any network to manage a router, unless there is a secure
tunnel protecting the entire communication path. SSH version 2 is the preferred
management protocol.





HP Comware Router

  • No Exec Administrative Line Timeout Configured
    • idle-timeout 10
  • User Account Names Contained "admin"
    • local-user
  • No Hypertext Transfer Protocol over SSL (HTTPS) Service Network Access Restrictions
  • Network Time Protocol (NTP) Control Queries Were Permitted
  • No Time Synchronization Configured
    • ntp-service authentication enable
    • ntp-service authentication-keyid key-id authentication-mode md5 key
    • ntp-service unicast-server address authentication-keyid key-id
  • Weak Password Age Policy Setting
    • password-control aging 10
  • No Network Filtering Rules Were Configured
  • No Post Logon Banner Message



Juniper NetScreen Firewall *
  • Filter Rules Allow Packets From Any Source To Any Destination And Any Port
  • Rules Allow Access To Administrative Services
  • Rules Allow Access To Clear-Text Protocol Services
    • set service "HTTP"
  • VPN Configured With Aggressive Mode Enabled
  • Clear Text Telnet Service Enabled
    • set telnet client enable
  • No Hypertext Transfer Protocol over SSL (HTTPS) Server Session Timeout
    • set service https timeout 10
  • Filter Rules Allow Packets From A Network Source To Any Destination And Any Port
  • Virtual Private Network (VPN) Configured With Weak Encryption
    • sec-level compatible
    • sec-level standard
  • Rules Allow Access To Potentially Unnecessary Services
  • Rules Allow Access To Potentially Sensitive Services
  • Filter Rules Allow Packets From A Network Source To A Network Destination And Any Port
  • Filter Rules Allow Packets To Any Destination And Any Port
  • User Account Names Contained "admin"
    • set admin name "admin"
  • AUX Port Not Disabled
    • set interface serial0/0 disable
  • Weak Secure Sockets Layer (SSL) Ciphers Supported
    • set ssl encrypt 3des sha-1
  • Internet Protocol (IP) Packet Fragmentation Attack Blocking Was Disabled
    • set zone <zone> screen block-frag
  • Filter Rules Allow Packets To A Network Destination And Any Port
  • Filter Rules Allow Packets From Any Source To A Network Destination
  • Block Hypertext Transfer Protocol (HTTP) Containing Active Content Was Disabled
    • set zone <zonescreen component-block
  • Weak Administrative Service Network Access Restrictions
    • set admin manager-ip <ip-address> <netmask>
  • Filter Rules That Allow Any Protocol Were Configured
  • Filter Rules Allow Packets From A Network Source To Any Port
  • Block HTTP Containing ActiveX Controls Was Disabled
    • set zone <zone> screen component-block activex
  • Block HTTP Containing Java Was Disabled
    • set zone <zone> screen component-block jar
  • Filter Rules Allow Packets From A Network Source To A Network Destination
  • Filter Rules Allow Packets From Any Source
  • Filter Rule Allows Packets To Any Port
  • Filter Rules Allow Packets To Any Destination
  • Weak VPN Authentication Hashing Algorithm Configured
  • Log Packets With IP Record Route Was Disabled
  • Filter Rules Allow Packets To A Network Destination
  • Filter Rule List Does Not End With Drop All And Log
  • Filter Rules Allow Packets From A Network Source
  • Log IP Security Option Packets Was Disabled
  • Log IP Stream Identifier (ID) Option Packets Was Disabled
  • Log IP Time Stamp Option Packets Was Disabled

Block HTTP Content containing potentially unsafe file types
cat  | grep -oP '(?<=component-block).*' -u | sort --unique


Automating Configuration Audit 

Nessus - Offline Config Audit





 Nipper

Drawback: Only for Cisco Router



nipper --input=switch.cfg --output=switch



Popular posts from this blog

Remote Desktop Protocol (RDP) Security

Penetration Testing - Network

Damn Vulnerable Web Services (DVWS) - Walkthrough

Offensive Security Testing Guide

Server Message Block (SMB) Security

Host Configuration Assessment - Windows