Function | Note |
---|---|
User management |
only provide users with the required rights and set up a strong password; use different passwords for each router/user |
RADIUS server |
authentication via RADIUS server increases IT security |
Access protection for user interface |
deactivate access via unencrypted HTTP connection, if possible; deactivate access via encrypted HTTPS connection, if not required; an authentication with certificates is recommended |
Automatic session timeout for user interface |
as brief as possible to close the configuration channel as quickly as possible after leaving the configuration PC without logging off beforehand |
Access to command line (CLI) |
only via encrypted SSH connection, if required |
VPN connections |
use VPN connections if possible (don’t use PPTP with this) |
NTP synchronisation |
provide for regular synchronisation of the internal clock to be able to check the validity of certificates, for example |
Auto update |
provide for automatic update of the router firmware to avoid security vulnerabilities in an outdated firmware |
DHCP server |
deactivate, if not required |
DNS relay |
deactivate, if not required |
IP filter |
activate and make rules as precise as possible (permit only those packets that are absolutely necessary); verify existing rules with regard to IT security; restrict existing rules to IPv4 or IPv6, if only one IP version is used |
MAC filter |
activate if all connected devices are known; don’t forget in this case to enter the MAC address of the configuration PC |
SNMP |
use only v3 with authentication and encryption if required |
SLAAC |
deactivate, if not required or IPv6 is not used |
Switch |
only activate necessary ports to restrict physical access to the network |
Messages upon IT security-relevant events |
add messages (via SMS, E-Mail, SNMP trap or MCIP) upon IT security-relevant events like login attempts, configuration changes, changes at the switch, etc. to alert users in due time |
Log files |
check regularly for irregularities to recognise these early |
Profile (configuration) |
store, secure and protect against unauthorised access router configuration as profile offline as well as document and comment it if required to impede tampering |
Installation location |
Set up the router in a location protected from access to make physical access to it more difficult |
The check list makes no claim to be complete and has a general nature only.