cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1253
Views
4
Helpful
12
Replies

Router security

n.oneill
Level 1
Level 1

We want to put a router in a unsecured area. I have configured the switch for port-security so only valid mac-addresses can use the network and I have disabled password-recovery on the router.

How can I stop someone plugging directly into the routers ethernet port to bypass the mac-address security on the switch and access the central office?

12 Replies 12

owillins
Level 6
Level 6

Is there any device currently connected to the ethernet port? You could shut down the port so that no device that is connected to the port is able to bypass the mac address.

igor-p
Level 1
Level 1

Hi! I believe you should create Ethernet ACL. Range 700-799, if I am not mistake, and apply it to eth interface.

Thanks igor

Do I have to enable irb to use this and create a BVI?

Nick

To my knowledge, MAC based ACLs work only on non IP traffic.

Sankar Nair
UC Solutions Architect
Pacific Northwest | CDW
CCIE Collaboration #17135 Emeritus

Sorry Nick, I had a mistake. Ethernet ACLs on routers are working with non-IP traffic only :-( thisisshanky is true. But I see another solution of your task.

1. Create static MAC-to-IP mappings for permitted hosts

router(config)#arp aaaa.bbbb.cccc xxx.yyy.zzz.ttt arpa

...

2. Disable ARP on ethernet interface

router(config-if)#no arp arpa

3. Clear ARP cache

router#clear arp

It seemed to be working. But I see one drawback. You should also create static entrie on hosts if router interface isn't responding on ARP requests.

Sorry again.

Thant's a great suggestion igor.

Thanks for your help.

And thanks thisisshanky for pointing that out :)

My another idea is the next. You create VLAN on switch and move all desired ports into VLAN. Enable trunk with ISL encapsulation on port connected with router interface. Configure ISL on router's ethernet port. Such way router will expect ISL tagged traffic only. But you should have at least FastEthernet router interface.

I did a simple experiment with router and see the next.

no arp arpa command blocks ARP requests from router only. So dynamic entries appear in arp cache if packet or ARP request is coming to interface. If traffic is initiated by router its working properly. Bad.

Sorted

bridge irb

interface Ethernet0

description "LAN"

no ip address

no ip redirects

no cdp enable

bridge-group 1

bridge-group 1 input-address-list 700

bridge-group 1 spanning-disabled

hold-queue 100 out

interface BVI1

description "LAN"

ip address 192.168.0.254 255.255.255.0

no ip redirects

ip nat inside

access-list 700 permit 0011.2fba.aec4 0000.0000.0000

access-list 700 permit 00c0.49b4.dd92 0000.0000.0000

bridge 1 protocol ieee

bridge 1 route ip

:D

p-dolbow
Level 1
Level 1

I realize that you are most likely looking for a nice technical solution, but you should never forget the basic rule that physical possession = ownership (of the box). I suggest physically locking the device(s) up in a lockable rack/IDF cabinet.

-=Phil=-

Agreed

Unfortunately the comms room where the circuit is terminated is not under our jurisdiction and I realise a packet sniffer and mac spoofing could get round the security but casual attempts will be deterred.

Nick

Anyway you could think use SSH instead telnet for network login and disable password recovery and/or console access.

In this way your password in sent via a ciphered tunnel and not in clear. This would only be posible if your chasis and IOS support SSH.

BR,

jonathan