08-25-2014 10:32 AM - edited 03-04-2019 11:36 PM
So I just had a white hat security finding on my external router. I appeared to be low in the findings and I am unsure if this protocol is even used any more. My router is a Cisco 3825 running IOS 12.3(11r)T2. This is what they reported:
One or more Cisco routers have the MOP RC (Maintenance Operation Protocol -Remote Console) function enabled, which is a poor security practice. MOP enables personnel on the local network, or a remote network that is bridged to the local network, to obtain access to a remote console on the router if they possess credentials for the device. This is significant because access to router management is usually protected by IP-based ACLs. As a Layer 2 protocol, MOP allows for the circumvention of this type of ACL, making brute force login attempts possible if account lockout is not enabled. If account lockout is enabled, such attempts could result in a denial of service due to user accounts being locked out.
I fixing this as easy as just running the no mop enabled command in the interface like this article suggests? http://blogs.cisco.com/security/router_spring_cleaning_-_no_mop_required/
08-25-2014 02:26 PM
Hello
Nice artical
FYI - I do apply no mop enabled to all my L3 interfaces learned from my CCIE studies, but I wasnt aware this is still an open protocol in ios 15 train though!
res
Paul
08-25-2014 03:44 PM
ya it was a great easy to read article on a feature you should turn off. Still I wonder how many master hackers try to hack that. DECnet who knew right
Do you apply no mop enable the interface or the subinterface?? Also I should only need to apply it to the interface facing the "internet" right?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide