Link to home
Start Free TrialLog in
Avatar of 99star
99starFlag for United States of America

asked on

Wanted Cisco Router 1721 Security polices

Hi

I have just installed Cisco 1721 on a public network ( internet connectity ) for a small office i have been given 20 ips from my ISP to use .

As of now i have done a NAT between my office ip and ISP ips .

What security measures I can undertake to gaurd against any untoward incident on my office network. please give security settings.

Can any one inform me on how PAT ( Port Address Translation works ) and how to do it , is PAT more secure than NAT.

Thanks
ASKER CERTIFIED SOLUTION
Avatar of Les Moore
Les Moore
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of eheston
eheston

Make sure the IOS is fairly recent General Deployment (GD) version.

Apply a telnet access-list to the router:

access-list 25 permit 192.168.1.0 0.0.0.255
line vty 0 15
 access-class 25 in

Switch to PAT if possible (not using VPN, H.323):

ip nat inside source list 1 interface Serial0/0 overload
access-list 1 permit 192.168.1.0 0.0.0.255

The reason is, PAT makes it pretty much impossible for Internet devices to create a connection to your internal hosts.  If you are using one-to-one NAT for every device, you have to rely on your access-lists much more to provide security or implement firewall IOS properly which can be confusing if you are inexperienced.  You will still need static NAT translations for any servers like e-mail, but if you only have 1 of each type, they can all be done using the same IP address (port forwarding), like this:

ip nat inside source static tcp 192.168.1.2 25 interface Serial0/0 25

The interface command in the above statement tells the router to use the IP address assigned to the Serial 0/0 interface for its NAT translations.  Make sure to coordinate your public DNS changes when making these changes, or you will be in trouble.  Have your ISP set cache times for the zone down low.  Or, you could use your current IPs and just do port forwarding for the necessary services by substituting "interface Serial 0/0 25" with "x.x.x.x 25".

There are a few more things to consider, like disabling/restricting SNMP and HTTP access to the router.  You should also setup good password security.  After you get finished with your config, test the router from the internet with a port scanner, like YAPS to make sure it is secure.

If you host an IIS server, there are few more nice things you can do with NBAR to provide more security for it.  The above are just the basics.

Good luck!
Check the following link from Cisco on improving security on Cisco routers.

http://www.cisco.com/warp/public/707/21.html



Have any of these comments been of any help to you? Do you need more information?
It appears that you have forgotten this question. I will ask Community Support to force close it unless you finalize it within 7 days.

** PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER **

Please take a moment to revisit this question & reward your points or post additional commentary as appropriate.  Unless there is objection or further activity.

EXPERTS, please feel free to make a recommendation for points award.

If you feel that your question was not properly addressed, or that none of the comments received were appropriate answers, please post a request in Community support (with a link to this page) to refund your points.  The link to the Community Support area is:

https://www.experts-exchange.com/jsp/qList.jsp?ta=commspt

** PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER **
------------------------------------------------------------------------------------------------