Category
Information Security Policies

Last Updated
Responsible Office
Division of Information Technology

 

Network infrastructure devices do not create or store data. This document provides standards for management access and configuration of the network infrastructure hardware that transports data and adjacent systems that may be employed in support of that infrastructure.

This general guide is based on the Some benchmarks have been generalized to allow for differences between hardware platforms and software versions. An effort was made to look at multiple platforms from the CIS-benchmarks to include some coverage of the differences between platforms as well. DCL 4 infrastructure has some referenced Required settings, but the definitive resource for that configuration should be the DCL 4 and PCI Guidelines. Products that no longer receive security updates from the vendor are not authorized for use on UM networks.

Network Device Hardening StandardDCL
1.1 Authentication 
1.1.1 Use Radius/TACACS+/LDAP for centralized administrative user authentication.Level 1-4 Recommended
  
1.2 Management Access 
1.2.1 Use encrypted mechanisms for management access (ssh/https)Level 1-4 Required
1.2.1.1 Use SSH2 for ssh and TLS>=1.2 for httpsLevel 1-4 Recommended
1.2.1.2 Use a modulus >= 2048 for ssh keyLevel 1-3 Recommended;  Level 4 Required
1.2.2 Set idle timeout of 10 minutes or lessLevel 1-4 Recommended
1.2.3 Set access-list to restrict management accessLevel 1-4 Recommended
1.2.4 Require Use of jump system for accessLevel 4 Required
  
1.3 Banner 
1.3.1 Set an appropriate/consistent system bannerLevel 1-4 Recommended
  
1.4 Passwords 
1.4.1 Use secure encryption for local usernames/passwords stored within local configLevel 1-4 Required
  
1.5 SNMP 
1.5.1 Disable SNMP when unusedLevel 1-4 Recommended
1.5.2 Disable default communitiesLevel 1-4 Required
1.5.3 Do not use RW communitiesLevel 1-3 Recommended;  Level 4 Required
1.5.4 Prefer use of SNMPv3Level 1-4 Recommended
1.5.5 Set an ACL for SNMP AccessLevel 1-4 Recommended
  
2.1 General Settings 
2.1.1 Disable unnecessary services/featuresLevel 1-4 Recommended
  
2.2 Logging 
2.2.1 Set a centralized logging hostLevel 1-4 Recommended
2.2.2  Ensure device logins and configuration changes are loggedLevel 1-4 Recommended
  
2.3 NTP 
2.3.1 Utilize University NTP servers for time synchLevel 1-4 Recommended
  
2.4 Source Interfaces 
2.4.1 If multiple interfaces, source logs/ntp/tftp from Management vrf or LoopbackLevel 1-4 Recommended
  
3.1 Network Operations 
3.1.1 Disable source-routingLevel 1-4 Recommended
3.1.2 Disable proxy arpLevel 1-4 Recommended
3.1.3 Use authentication on routing protocolsLevel 1-4 Recommended
3.1.4 Use ACLs to protect exposed external interfacesLevel 1-4 Recommended
3.1.5 Use DHCP SnoopingLevel 1-4 Recommended
3.1.6 Backup configurations to a central repositoryLevel 1-4 Recommended