Security - Best Practices
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
733
Alcatel-Lucent
Beta
Beta
CLI Configuration Guide
ICMP R
ULES
ICMP packets can be forged to trick computers into re-directing their
communications, stopping all communications or even crashing. Following rules
should be kept in mind when creating policies for ICMP:
•
Allow source quench: This tells external host when the local network is saturated
•
Allow echo request outbound
•
Allow echo reply inbound
•
Allow destination unreachable inbound
•
Allow service unavailable inbound
•
Allow TTL exceeded inbound
•
Drop echo request inbound
•
Drop and log redirect inbound
•
Drop destination unreachable outbound
•
Drop service unavailable outbound
•
Drop TTL exceeded outbound
•
Drop all other ICMP packets.
IP R
ULES
These are some rules that you would want to configure for all packets regardless
of whether they contain TCP or UDP traffic inside them.
•
Drop all packets arriving on the internal interface that have source field indicating
that the packet came from outside the network.
•
Drop all incoming packets to interior computers that have no externally accessible
service.
•
Drop and log all private addresses coming on the external interface. As per RFC
1918, the address blocks 10.0.0.0 to 10.255.255.255.255, 172.16.0.0 to
172.16.31.255 and 192.168.0.0 to 192.168.255.255 are reserved for private
allocation. Hence, any packet arriving with any of the said IP's on the interface
which is connected to the internet should be dropped and logged. If there is
occurrence of the same, it might be because some hacking taking place.
UDP R
ULES
Once the rules for generic IP traffic are put in place, it is better to have some UDP
rules to block egregious security holes, such as X-windows. Each of these UDP
rules specifically denies a port or range of ports:
•
Drop packets using ports below 21: There are no services below port 21 that an
average Internet user finds useful.
•
Drop X-Windows (packets using ports 600-6003). It is possible for a hacker to
control mouse and keyboard for a host inside the network.
•
Drop SNMP (packets using ports 161 and 162).
Содержание OmniAccess 700
Страница 38: ...Left running head Chapter name automatic 12 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 176: ...Left running head Chapter name automatic 150 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 224: ...Per VLAN Spanning Tree Left running head Chapter name automatic 198 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 258: ...Port Monitoring Left running head Chapter name automatic 232 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 260: ...Left running head Chapter name automatic 234 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 296: ...T1E1 Line Card Left running head Chapter name automatic 270 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 360: ...Point to Point Protocol Left running head Chapter name automatic 334 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 434: ...Left running head Chapter name automatic 408 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 462: ...Common Classifiers Left running head Chapter name automatic 436 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 464: ...Left running head Chapter name automatic 438 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 534: ...Border Gateway Protocol Left running head Chapter name automatic 508 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 638: ...Left running head Chapter name automatic 612 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 762: ...Filter and Firewall Left running head Chapter name automatic 736 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 890: ...Transparent Firewall Left running head Chapter name automatic 864 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 940: ...Left running head Chapter name automatic 914 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1000: ...Quality of Service Left running head Chapter name automatic 974 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1002: ...Left running head Chapter name automatic 976 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1044: ...DNS Domain Name Service Client Left running head Chapter name automatic 1018 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1046: ...Left running head Chapter name automatic 1020 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1058: ...Left running head Chapter name automatic 1032 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1074: ...Lifeline Left running head Chapter name automatic 1048 Beta Beta CLI Configuration Guide Alcatel Lucent line con 0 end ...
Страница 1076: ...Left running head Chapter name automatic 1050 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1118: ...Web Cache Server Left running head Chapter name automatic 1092 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1120: ...Left running head Chapter name automatic 2 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1140: ...QoS Values and Mnemonics Left running head Chapter name automatic 22 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1156: ...IPsec Interoperability of OA 700 Left running head Chapter name automatic 38 Beta Beta CLI Configuration Guide Alcatel Lucent ...