{"id":203,"date":"2011-06-23T10:57:00","date_gmt":"2011-06-23T10:57:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/06\/23\/control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches\/"},"modified":"2011-06-23T10:57:00","modified_gmt":"2011-06-23T10:57:00","slug":"control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches\/","title":{"rendered":"Control 4 – Secure Configurations of Network Devices Such as Firewalls, Routers, and Switches"},"content":{"rendered":"
Control 4 is similar to Control 3<\/a> in that it is concerned with maintaining a secure configuration. This time the focus is on network devices.<\/p>\n What is the last thing you did on your network devices? Likely it was add a rule to permit a new traffic flow. When was the last time you made sure the configuration is exactly what you expected? <\/p>\n Where to start?<\/u> CheckPoint Firewall Benchmarks What else?<\/u><\/p>\n Always maintain an updated network diagram. I know. You still should.<\/p>\n Change control forms should be completed (with appropriate approvals) before logging in to the device. <\/p>\n Speaking of logging in, require two factor authentication for every device login.<\/p>\n Alert all administrators of all attempted logins and rule changes.<\/p>\n Compare the current configuration of your network devices to a known good configuration.<\/p>\n","protected":false},"excerpt":{"rendered":" Control 4 is similar to Control 3 in that it is concerned with maintaining a secure configuration. This time the focus is on network devices. What is the last thing you did on your network devices? Likely it was add a rule to permit a new traffic flow. When was the last time you made […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,18,22],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n
Several authoritative hardening guides exist and are freely available. Choose one of the below and plan to spend a few hours making sure your network device configurations are secure.<\/p>\n\n
\n
Cisco Device Benchmarks
Juniper Device Benchmarks
Network Device Benchmarks
Novell Netware Benchmarks
Wireless Network Devices Benchmarks<\/p>\n\n