Hardening Your Network: A Practical Guide to Network Security
Network security is paramount in today’s interconnected world. A robust network security strategy involves multiple layers of defense, from segmentation and access control to monitoring and backups. This post provides a practical guide to hardening your network infrastructure.
1. Network Segmentation and Segregation: Limiting the Blast Radius
Network segmentation divides your network into smaller, isolated zones, limiting the impact of a security breach. Segregation further categorizes these segments based on role, function, or criticality.
- Physical & Virtual Separation: Separate sensitive data and systems into dedicated network segments (DMZ, Internal, External). Use physical separation where possible, and leverage VLANs for virtual segregation (Admin VLAN, User VLAN, Management VLAN).
- Access Control Lists (ACLs): Implement ACLs to control traffic flow between subnets, allowing only necessary communication.
- RFC 1918 Filtering: Block traffic from RFC 1918 private address space on internet-facing interfaces to prevent spoofing.
- Native VLAN Change: Change the native VLAN ID from the default (VLAN 1) to a different ID.
- 802.1x Authentication: Use 802.1x authentication on switch ports to authorize users before granting LAN access.
- Port Security: Implement port security measures:
- MAC address count restriction
- MAC address stickiness
- Port shutdown and notification on violation
- Unused Ports: Disable all unused ports on network devices.
- Routing Protocol Security: Protect dynamic routing protocols (OSPF, EIGRP) and first-hop redundancy protocols (HSRP, VRRP, GLBP) with passkeys.
- Physical Security: Secure IT equipment in locked rooms or closets with restricted access (smart cards, etc.).
Example Cisco Port Security Configuration:
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security violation restrict
Switch(config-if)# switchport port-security mac-address sticky
Switch(config-if)# switchport port-security aging time 15
2. Protecting Management Interfaces: Locking Down the Control Room
Management interfaces are prime targets for attackers. Implement these safeguards:
- Out-of-Band Management (OoB): Use a separate management network.
- Jump Servers/Bastions: Manage devices through hardened jump servers or bastions.
- ACLs for Management Access: Restrict access to management interfaces by IP address, subnet, or MAC address.
- VPNs for Remote Management: Never expose management interfaces directly to the internet. Use VPNs for secure remote access.
- Disable Unsecure Services: Disable HTTP, Telnet, FTP, SMBv1, LLDP, CDP, and other unnecessary services. Use HTTPS, SSHv2, and other secure protocols.
3. Identity and Access Control: Who Goes Where
- Rename Default Accounts: Change default usernames (Admin, Administrator, Root) to something unique.
- Strong Passwords: Enforce strong password policies.
- Password Encryption: Use built-in hashing/encryption for stored passwords (
service password-encryption
on Cisco devices). - Enable Secret: Use
enable secret
(notenable password
) on Cisco devices. - Password Length: Enforce a minimum password length (at least 13 characters).
- Session Timeouts: Implement timeouts for all management sessions.
- Account Lockouts: Implement account lockout mechanisms to prevent brute-force attacks.
- Role-Based Access Control (RBAC): Use RBAC to grant appropriate access levels (Admin, Operator, Reader).
- AAA (Radius/TACACS): Integrate with AAA servers for centralized authentication, authorization, and accounting.
4. Logging and Monitoring: Eyes on the Network
- Clock Synchronization: Configure accurate clock, date, timezone, and NTP server settings.
- Logging: Set up local logging with rotation and remote syslog.
- SNMPv3: Disable SNMPv1/v2. Use SNMPv3 if needed, with strong community strings.
5. Backups and Upgrades: Planning for the Worst
- Regular Backups: Take regular local and offline backups of device configurations. Securely store these backups. Be mindful of credentials stored in configs when using version control systems like Git.
- Secure Updates: Download software, updates, and patches from trusted sources.
- Hash Verification: Verify downloaded files using hash verification.
- Designated Update Interface: Designate a specific interface for software updates via TFTP.
- Infrastructure as Code (IaC): Consider using IaC tools like Ansible for centralized configuration management.
6. Wireless Network Security: Cutting the Cord Securely
- 802.1x/WPA2/WPA3: Use 802.1x or WPA2/WPA3 for wireless authentication.
- VLAN Segmentation: Segment wireless networks using SSIDs and VLANs.
- Role-Based Access: Grant wireless access based on user roles.
- AES Encryption: Use AES encryption for WAP.
- Guest WLAN: Isolate guest Wi-Fi on a separate VLAN with internet-only access.
- Management Frame Protection: Enable management frame protection.
- Client Isolation: Implement client isolation where possible.
By implementing these security measures, you can create a more secure and resilient network infrastructure. Remember, network security is an ongoing process. Regularly review and update your security practices to stay ahead of evolving threats.