iDirect Security Best Practices Technical Note

Share Embed Donate


Short Description

This technical note recommends basic security practices to help ensure that all components of iDirect Networks are secu...

Description

D

R

Technical Note

AF T

Security Best Practices

August 13, 2012

D

R

AF T

Copyright © 2012 VT iDirect, Inc. All rights reserved. Reproduction in whole or in part without permission is prohibited. Information contained herein is subject to change without notice. The specifications and information regarding the products in this document are subject to change without notice. All statements, information, and recommendations in this document are believed to be accurate, but are presented without warranty of any kind, express, or implied. Users must take full responsibility for their application of any products. Trademarks, brand names and products mentioned in this document are the property of their respective owners. All such references are used strictly in an editorial fashion with no intent to convey any affiliation with the name or the product's rightful owner.

Document Name: TN_Security Best Practices_Rev A_08132012 DRAFT.pdf Document Part Number: T0000468

ii

Security Best Practices

Revision History

The following table shows all revisions for this document. To determine if this is the latest revision, check the TAC Web page. Reason for Change(s)

MMM DD, 2012

Initial release of document

Who Updated? JVespoli

D

R

A

Date Released

AF T

Rev

Security Best Practices

iii

Contents

About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

AF T

Contents Of This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi

Security Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Hub and NMS Server Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Network Isolation and External Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

R

Server Password Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Secure Server Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Disabling SNMP on NMS Servers when not Required. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Disabling NMS Config Service on Non-Distributed NMS Servers. . . . . . . . . . . . . . . . . . . . . . 2

D

Encryption of Backup Files Before Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

NMS Client Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 User Passwords and Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Client Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Console Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Clearing Data from Decommissioned Remotes and Line Cards . . . . . . . . . . . . . . . . 4

iv

Security Best Practices

About This Guide

Purpose This technical note recommends basic security practices to help ensure that all components of iDirect Networks are secure.

AF T

Intended Audience

This technical note is intended for iDirect Network Operators and System Administrators responsible for ensuring that iDirect networks are secure.

Contents Of This Guide

This document contains the following major sections: “Hub and NMS Server Security”



“NMS Client Security”



“Console Password Security”



“Clearing Data from Decommissioned Remotes and Line Cards”

R



D

Document Conventions

This section describes and illustrates the conventions used throughout the document. Convention Description

Example

Blue Courier font

Used when the user is required to enter a command at a command line prompt or in a console.

Enter the command:

Courier bold font

Used when showing terminal display information such as output from a command or contents of a file.

crc report all

Security Best Practices

cd /etc/snmp/

3100.3235 : DATA CRC [ 1] 3100.3502 : DATA CRC [5818] 3100.4382 : DATA CRC [ 20]

v

Bold Trebuchet font

Used when referring to text that appears on the screen on a windows-type Graphical User Interface (GUI). Used when specifying names of commands, menus, folders, tabs, dialogs, list boxes, and options.

1. If you are adding a remote to an inroute group, right-click the Inroute Group and select Add Remote.

The Remote dialog box has a number of userselectable tabs across the top. The Information tab is visible when the dialog box opens.

Blue Trebuchet font

Used to show hyperlinked text within a document.

For instructions on adding an line card to the network tree and selecting a Hub RFT for the line card, see “Adding a Line Card” on page 108.

Bold italic Trebuchet font

Used to emphasize information for the user, such as in notes

Note:

Red italic Trebuchet font

Used when the user needs to strictly follow the instructions or have additional knowledge about a procedure or action.

WARNING! The following procedure may cause a network outage.

AF T

Getting Help

Several line card model types can be configured as receive-only line cards.

R

The iDirect Technical Assistance Center (TAC) is available to help you 24 hours a day, 365 days a year. Software user guides, installation procedures, a FAQ page, and other documentation that supports our products are available on the TAC webpage. You can access the TAC webpage at: http://tac.idirect.net.

D

If you are unable to find the answers or information that you need, you can contact the TAC at (703) 648-8151.

vi

Security Best Practices

Security Best Practices

AF T

This technical note recommends basic security practices to help ensure that all components of iDirect Networks are secure. iDirect also recommends implementation of additional security measures over and above these steps as required for your specific network configurations.

Hub and NMS Server Security

An iDirect installation includes a number of Linux servers used to configure and run the networks. These servers include: •

NMS servers for network configuration and monitoring



Protocol Processor Blade servers to manage network traffic at the hub



GKD servers to manage and distribute encryption keys

iDirect recommends securing all hub and NMS servers from unauthorized physical access.

R

In addition, iDirect strongly recommends implementing the security measures in the following sections to protect the servers.

D

Network Isolation and External Access In addition to limiting physical access to your servers, iDirect recommends that isolation of all networks from external access to the extent possible. Access to the iDirect servers should be protected behind a commercial-grade firewall. If external access is required, iDirect recommends use of secure private networks. •

For VNO operators, all connections should be established through carefully managed Virtual Private Networks (VPN).



All iBuilder and iMonitor clients connecting to the NMS over a Wide Area Network (WAN) should do so over a private network or VPN.

Server Password Security iDirect Servers are shipped with default passwords. At installation, the passwords should be changed from the default on all servers for the following users: •

root



idirect (iDX Release 2.1 and later)

Security Best Practices

1

Hub and NMS Server Security

Thereafter, these passwords should be changed periodically. When selecting new passwords, iDirect recommends that you follow common guidelines for constructing strong passwords.

Secure Server Connections iDirect recommends using Secure Shell (SSH) for all remote logins to server machines. SSH was designed as a secure replacement for Telnet and other remote shell protocols that do not encrypt data by default. Once an SSH connection is established, Telnet can be safely used to open sessions on the local host. To further improve security, beginning with iDX Release 2.1, iDirect stopped allowing any remote sessions (including SSH) to log on directly to the root account of an iDirect server. Instead, use SSH to log on to a less privileged account such as the idirect account. Then enter su - from the command line to log on as root if root access is required.

Disabling SNMP on NMS Servers when not Required

AF T

An SNMP Proxy Agent running on the NMS server provides read access to the iDirect MIB and SNMP traps to an external SNMP Manager. If not used, this service should be disabled on the NMS server that runs the snmpsvr process. To disable the SNMP service: 1. TBD 2. .....

Need procedure from engineering

R

Disabling NMS Config Service on Non-Distributed NMS Servers iDirect recommends disabling the nms_config service on non-distributed NMS servers. Do not perform this procedure on a distributed NMS. The NMS servers in a DNMS configuration require the nms_config service.

D

Note:

To disable the nms_config service: 1. TBD

2. .....

Need procedure from engineering.

Encryption of Backup Files Before Archiving iDirect provides a utility that Network Operators can use to back up the NMS databases. Some operators archive the resulting backup files on external storage. iDirect recommends encrypting backup files before copying them to external storage. The Linux gpg command, which is available on the NMS server, is one method that can be used for to encrypt the backup files before archiving.

2

Security Best Practices

NMS Client Security

NMS Client Security iDirect recommends the following measures to ensure secure access to iDirect networks from the iBuilder and iMonitor clients.

User Passwords and Permissions The NMS clients are preconfigured with the following users: •

admin



guest

Client Access

AF T

At installation, use iBuilder to change the passwords for these users from their default settings. In addition, iDirect recommends creating NMS users with permissions tailored to the access level requirements of the network operators. Create strong passwords for all such accounts and change them periodically. See the iBuilder User Guide for your release for details on creating users.

Access to iBuilder and iMonitor sessions should be strictly controlled. Network operators should always log out of any NMS clients when leaving workstations to prevent unauthorized access.

Remote Access

R

All remote access by NMS client applications to iDirect networks should be established over secure private networks.

Console Password Security

D

The following iDirect network elements are pre-configured with a user account and an admin account that allow access to the iDirect applications using a console terminal window. •

Remotes



Line Cards



Protocol Processor Blades

At installation, these passwords should be changed from the default on each of these network elements. Thereafter, these passwords should be changed periodically. All of these passwords can be changed in iBuilder by right-clicking the network element; selecting the Modify option from the menu; and applying the changes as required. (See the iBuilder User Guide for details.) Note:

The user and admin console passwords for protocol processor blades are configured at the Protocol Processor level of the iBuilder tree and shared by all blades configured under that Protocol Processor.

Security Best Practices

3

Clearing Data from Decommissioned Remotes and Line Cards

Clearing Data from Decommissioned Remotes and Line Cards iDirect recommends that you execute the zeroize command to erase sensitive data on all decommissioned remotes and line cards before discarding. 1. Open a console session to the remote modem or line card and log on to the admin account. 2. At the command line prompt, enter the following command to remove all secure data: zeroize all

D

R

AF T

If the zeroize command is unavailable, enter the command csp enable. Then execute the zeroize command again. If the command is still unavailable, contact the iDirect TAC.

4

Security Best Practices

D

R

AF T

Clearing Data from Decommissioned Remotes and Line Cards

Security Best Practices

5

AF T

R

D

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF