![Alcatel-Lucent OmniAccess 700 Cli Configuration Manual Download Page 759](http://html.mh-extra.com/html/alcatel-lucent/omniaccess-700/omniaccess-700_cli-configuration-manual_2891856759.webp)
Security - Best Practices
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
733
Alcatel-Lucent
Beta
Beta
CLI Configuration Guide
ICMP R
ULES
ICMP packets can be forged to trick computers into re-directing their
communications, stopping all communications or even crashing. Following rules
should be kept in mind when creating policies for ICMP:
•
Allow source quench: This tells external host when the local network is saturated
•
Allow echo request outbound
•
Allow echo reply inbound
•
Allow destination unreachable inbound
•
Allow service unavailable inbound
•
Allow TTL exceeded inbound
•
Drop echo request inbound
•
Drop and log redirect inbound
•
Drop destination unreachable outbound
•
Drop service unavailable outbound
•
Drop TTL exceeded outbound
•
Drop all other ICMP packets.
IP R
ULES
These are some rules that you would want to configure for all packets regardless
of whether they contain TCP or UDP traffic inside them.
•
Drop all packets arriving on the internal interface that have source field indicating
that the packet came from outside the network.
•
Drop all incoming packets to interior computers that have no externally accessible
service.
•
Drop and log all private addresses coming on the external interface. As per RFC
1918, the address blocks 10.0.0.0 to 10.255.255.255.255, 172.16.0.0 to
172.16.31.255 and 192.168.0.0 to 192.168.255.255 are reserved for private
allocation. Hence, any packet arriving with any of the said IP's on the interface
which is connected to the internet should be dropped and logged. If there is
occurrence of the same, it might be because some hacking taking place.
UDP R
ULES
Once the rules for generic IP traffic are put in place, it is better to have some UDP
rules to block egregious security holes, such as X-windows. Each of these UDP
rules specifically denies a port or range of ports:
•
Drop packets using ports below 21: There are no services below port 21 that an
average Internet user finds useful.
•
Drop X-Windows (packets using ports 600-6003). It is possible for a hacker to
control mouse and keyboard for a host inside the network.
•
Drop SNMP (packets using ports 161 and 162).
Summary of Contents for OmniAccess 700
Page 38: ...Left running head Chapter name automatic 12 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 176: ...Left running head Chapter name automatic 150 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 260: ...Left running head Chapter name automatic 234 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 434: ...Left running head Chapter name automatic 408 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 464: ...Left running head Chapter name automatic 438 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 638: ...Left running head Chapter name automatic 612 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 940: ...Left running head Chapter name automatic 914 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 1002: ...Left running head Chapter name automatic 976 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 1120: ...Left running head Chapter name automatic 2 Beta Beta CLI Configuration Guide Alcatel Lucent ...