Router Security Policy

advertisement
Information Services and Technology
Router Security Policy
I.
PURPOSE
This document describes a required minimal security configuration for all routers and switches
connecting to a production network or used in a production capacity at or on behalf of UMDNJ.
II.
APPLICABILITY
All routers and switches connected to UMDNJ production networks are affected. Routers and
switches within internal, secured labs are not affected. Routers and switches within DMZ areas fall
under the Internet DMZ Equipment Policy.
III. ACCOUNTABILITY
Under the President, the Senior Vice Presidents shall insure compliance with this policy. The Vice
President for Information Systems and Technology (IST), the President/CEOs of the Healthcare
Units, Deans and Vice Presidents shall implement this policy by means of system specific procedures,
guidelines and standards.
IV. DEFINITIONS
Production Network - The "production network" is the network used in the daily business of UMDNJ.
Any network connected to the university backbone, either directly or indirectly, which lacks an
intervening firewall device. Any network whose impairment would result in direct loss of functionality
to UMDNJ employees or impact their ability to do work.
Lab Network - A "lab network" is defined as any network used for the purposes of testing,
demonstrations, training, etc. Any network that is stand-alone or behind a firewall, which is off from
the production network(s) and whose impairment will not cause direct loss to UMDNJ nor affect the
production network.
V.
POLICY
Every router must meet the following configuration standards:
A. No local user accounts are configured on the router. Routers must use TACACS+ for all user
authentications.
B. The enable password on the router must be kept in a secure encrypted form. The router must have
the enable password set to the current IS&T Telecom production router password.
C. Disallow the following:
1. IP directed broadcasts
2. Incoming packets at the router sourced with invalid addresses such as RFC1918 address
3. TCP small services
4. UDP small services
5. All source routing
6. All web services running on router
Page 1 of 2
Revision 121802
D. On Perimeter Routers and/or interfaces also disallow the following:
1. SNMP
2. Proxy-arp
3. Echo and finger service
4. ICMP unreachable messages
5. Fast switching and autonomous switching
6. Multicast route caching
7. Maintenance Operation Protocol
8. Cisco Discovery Protocol on external interface
E. Use IS&T Telecom standardized SNMP community strings.
F. Access rules are to be added as business needs arise.
G. The router must be included in the university enterprise management system with a designated
point of contact.
H. Each router must have the following statement posted in clear view:
"UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You must have
explicit permission to access or configure this device. All activities performed on this device may be
logged, and violations of this policy may result in disciplinary action, and may be reported to law
enforcement. There is no right to privacy on this device."
VI. NON-COMPLIANCE AND SANCTIONS
Any person found to have violated this policy may be subject to denial or removal of access privileges
to the University network. Disciplinary action under applicable University policies and procedures up
to and including termination; civil litigation; and/or criminal prosecution under applicable state and
federal statutes can occur.
Page 2 of 2
Revision 121802
Download