ESR-Series. User manual
91
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
7 Safe configuration recommendations
General recommendations
Event logging system configuration
Recommendations
Warnings
Configuration example
Password usage policy configuration
Recommendations
Configuration example
Recommendations
Warnings
Configuration example
Remote management configuration
Recommendations
Configuration example
Configuration of protection against network attacks mechanisms
Recommendations
Configuration example
The safe configuration recommendations are general and suitable for most installations. These
recommendations greatly improve the safe operation of the unit, but are not exhaustive. Depending on the
application of the device, other safety parameters must also be configured. In some specific cases, the
implementation of these recommendations may result in a non-functional network. When configuring the
device, firstly it is necessary to follow the technical requirements and regulations of the networks in which the
device will be used.
7.1 General recommendations
It is recommended to always disable unused physical interfaces with the
shutdown
The command is
described in detail in the
Interface monitoring and configuration
section of the CLI Command Reference.
It is recommended to always set the system clock to synchronize with trusted network time sources
(NTP). The NTP setup algorithm is described in the
NTP configuration
section of this manual. For
detailed information on the NTP configuration commands, see
Command Reference.
It is recommended to disable the NTP broadcast client, which is enabled by default in the factory
configuration.
It is not recommended to use the
ip firewall disable
command that disables firewalling. Always assign
appropriate security zones to interfaces and configure the correct firewall rules. The firewall
configuration algorithm is described in the
section of this manual. For detailed
information on the Firewall configuration commands, see
in the CLI Command
Reference.
7.2 Event logging system configuration
Event logging system configuration algorithms are described in the «Syslog configuration» subsection of the
section of this manual.
For detailed information on the Event logging system configuration commands, see
section in the CLI Command Reference.
Содержание ESR Series
Страница 218: ...ESR Series User manual 218 ...
Страница 234: ...ESR Series User manual 234 In addition to RIP protocol configuration open UDP port 520 in the firewall ...
Страница 306: ...ESR Series User manual 306 Parameter targeted LDP Hold timer 45 seconds Keepalive holdtime 180 seconds ...
Страница 452: ...ESR Series User manual 452 Step Description Command Keys 4 Enable Tracking object esr config tracking enable ...
Страница 514: ...ESR Series User manual 514 esr show ntp peers ...