密码
Boston(config)#security passwords min-length 10 强制最小长度密码
Boston(config)#service password-encryption 加密所有密码
Boston(config)#no service password-recovery 阻止console访问ROMMON
设置失败比率,前提AAA
Boston(config)#security authentication failure rate 10 log 配置允许一定数量的不成功的登陆尝试,默认允许10次登陆失败在15秒延迟初始前,超过时产生系统日志消息
Boston(config)#login block-for 100 attempts 2 within 100 用指定周期配置一定数量尝试登陆失败后,阻止访问。减轻DOS攻击
Boston(config)#login quiet-mode access-class myacl 指定一个ACL应用到路由器当它转换到一个静止模式
Boston(config)#login delay 30 配置延时在连续登陆尝试之间,减轻字典攻击,如果没有设置,默认延时是一秒
Boston(config)#show login 显示登陆参数和失败
Boston(config)#line console 0
Boston(config-line)#exec-timeout 3 30 终止无动作的console,aux连接在3分30秒后
Boston(config)#privilege exec level 2 ping
Boston(config)#enable secret level 2 Patriot 设置多特权级别
Boston(config)#banner motd % WARNING: You are connected to (hostname) on the Cisco Systems, Incorporated network. Unauthorized access and use of this network will be vigorously prosecuted. %
Boston(config)#aaa new-model
Boston(config)#exit
Boston#enable view
Boston(config)#parser view monitor_view
Boston(config-view)#password 5 hErMeNe%GiLdE!
Boston(config-view)#commands exec include show version 增加命令或接口到view
Boston(config)#parser view monitor_audit
Boston(config-view)#password 5 AnA6TaSiA$
Boston(config-view)#view monitor_view
Boston(config-view)#view audit_view 增加view到一个superview
show parser view [all]
debug parser view
配置文件的安全
Boston(config)#secure boot-p_w_picpath 开启IOS p_w_picpath恢复
Boston(config)#secure boot-config 存储主要引导设置的安全copy在一个持久存储体
show secure bootset 显示配置回复状态和主要引导设置文件名
用ACL减轻威胁与攻击
access-list 101 permit tcp 172.31.9.0 0.0.0.255 any eq 80 基于几个属性:协议类型、IP、端口
IP地址哄骗减轻:内部
R2(config)#access-list 150 deny ip 10.2.1.0 0.0.0.255 any log
R2(config)#access-list 150 deny ip 127.0.0.0 0.255.255.255 any log
R2(config)#access-list 150 deny ip 0.0.0.0 0.255.255.255 any log
R2(config)#access-list 150 deny ip 172.16.0.0 0.15.255.255 any log
R2(config)#access-list 150 deny ip 192.168.0.0 0.0.255.255 any log
R2(config)#access-list 150 deny ip 224.0.0.0 15.255.255.255 any log
R2(config)#access-list 150 deny ip host 255.255.255.255 any log
R2(config)#access-list 150 permit ip any 10.2.1.0 0.0.0.255
R2(config)#interface e0/0
R2(config-if)#ip access-group 150 in
R2(config-if)#exit
R2(config)#access-list 105 permit ip 10.2.1.0 0.0.0.255 any
R2(config)#access-list 105 deny ip any any log
R2(config)#interface e0/1
R2(config-if)#ip access-group 105 in
R2(config-if)#end
R2(config)#access-list 109 permit tcp any 10.2.1.0 0.0.0.255 established
R2(config)#access-list 109 deny ip any any log
R2(config)#interface e0/0
R2(config-if)#ip access-group 109 in
R2(config-if)#end
R2(config)#ip tcp intercept list 110
R2(config)#access-list 110 permit tcp any 10.2.1.0 0.0.0.255
R2(config)#access-list 110 deny ip any any
R2(config)#interface e0/0
R2(config-if)#ip access-group 110 in
R2(config-if)#end
R2(config)#access-list 111 deny ip any host 10.2.1.255 log
R2(config)#access-list 111 permit ip any 10.2.1.0 0.0.0.255 log
R2(config)#access-list 112 deny ip any host 10.1.1.255 log
R2(config)#access-list 112 permit ip any 10.1.1.0 0.0.0.255 log
R2(config)#interface e0/0
R2(config-if)#ip access-group 111 in
R2(config-if)#end
R2(config)#interface e0/1
R2(config-if)#ip access-group 112 in
R2(config-if)#end
access-list 112 deny icmp any any echo log
access-list 112 deny icmp any any redirect log
access-list 112 deny icmp any any mask-request log
access-list 112 permit icmp any 10.2.1.0 0.0.0.255
(access-list 112 permit icmp host 10.0.0.138 host 10.0.0.101
access-list 112 permit icmp host 10.0.0.101 host 10.0.0.138)
R2(config)#interface e0/0
R2(config-if)#ip access-group 112 in
R2(config-if)#end
R2(config)#access-list 114 permit icmp 10.2.1.0 0.0.0.255 any echo
R2(config)#access-list 114 permit icmp 10.2.1.0 0.0.0.255 any parameter-problem
R2(config)#access-list 114 permit icmp 10.2.1.0 0.0.0.255 any packet-too-big
R2(config)#access-list 114 permit icmp 10.2.1.0 0.0.0.255 any source-quench
R2(config)#access-list 114 deny icmp any any log
R2(config)#interface e0/1
R2(config-if)#ip access-group 114 in
R2(config-if)#end
R2(config)#access-list 120 deny udp any any range 33400 34400 log
R2(config)#access-list 120 permit ip any 10.1.1.0 0.0.0.255 log
R2(config)#interface e0/1
R2(config-if)#ip access-group 120 in
R2(config-if)#end
为安全管理报告配置SSH服务
Austin2#configure terminal
Austin2(config)#ip domain-name cisco.com
Austin2(config)#crypto key generate rsa general-keys modulus 1024
Austin2(config)#ip ssh authentication-retries 4
Austin2(config)#line vty 0 4
Austin2(config-line)#no transport input telnet
Austin2(config-line)#transport input ssh
Austin2(config-line)#end
日志
R3(config)#logging 10.0.0.110 主机
R3(config)#logging trap informational 等级
R3(config)#logging source-interface fa0/0 源接口
R3(config)#logging on 开启
10.0.0.110安装客户端
#############################################################################
Router(config)#aaa new-model
Router(config)#tacacs-server host 192.168.229.76 single-connection
Router(config)#tacacs-server key share1
Router(config)#radius-server key shared1
Router#debug aaa authentication
router(config)#aaa authorization exec default group radius local none
Router#debug aaa authorization
R2(config)#aaa accounting exec default start-stop group tacacs+
Router#debug aaa accounting
包过滤
Router(config)# access-list 100 permit tcp any 16.1.1.0 0.0.0.255 established
Router(config)# access-list 100 deny ip any any log
Router(config)# interface Serial0/0
Router(config-if)# ip access-group 100 in
Router(config-if)# end
防火墙的执行
从命令行配置防火墙
Router(config)#logging host 10.0.0.3
Router(config)#ip inspect audit-trail 用系统日志开启审计追踪的传输信息
Router(config)#no ip inspect alert-off 开启实时警报
Router(config)#ip inspect name FWRULE ftp alert on audit-trail on timeout 300
Router(config-if)#ip inspect FWRULE in 应用检查规则到接口的in方向
show ip inspect config
show ip inspect interfaces
show ip inspect session [detail]
show ip inspect statistics
show ip inspect all 显示检查,接口配置,会话和统计
debug ip inspect object-creation
debug ip inspect object-deletion
debug ip inspect events
debug ip inspect timers
debug ip inspect detail 全局调试
debug ip inspect protocol 指定协议调试
2接口
3接口
SDM