Nipper


Cisco Router Security Report

of the

RBD52 Cisco Router


Contents

1. About This Report
    1.1. Organisation
    1.2. Conventions
2. Security Audit
    2.1. Introduction
    2.2. Dictionary-based Password / Key
    2.3. Weak Passwords / Keys
    2.4. Directed Broadcasts
    2.5. OSPF Authentication
    2.6. Inbound TCP Connection Keep Alives
    2.7. IP Source Routing
    2.8. HyperText Transport Protocol Service
    2.9. Simple Network Management Protocol
    2.10. ICMP Redirects
    2.11. Logging
    2.12. Proxy ARP
    2.13. Cisco Discovery Protocol
    2.14. Classless Routing
    2.15. BOOTP
    2.16. TCP and UDP Small Servers
    2.17. IP Unreachables
    2.18. Packet Assembler / Disassembler
    2.19. Maintenance Operations Protocol
    2.20. Conclusions
3. Device Configuration
    3.1. Introduction
    3.2. General
    3.3. Services
    3.4. Domain Name Settings
    3.5. Time Zone Settings
    3.6. User Accounts and Privilages
    3.7. Logging
    3.8. Simple Network Management Protocol
    3.9. Secure Shell
    3.10. Routing
    3.11. Interfaces
4. Appendix
    4.1. Abbreviations
    4.2. Common Ports
    4.3. Logging Severity Levels
    4.4. Time Zones
    4.5. Nipper Details


1. About This Report

1.1. Organisation

This Cisco Router RBD52 report was produced by Nipper on Friday 24 March 2023. The report contains the following sections:
 

1.2. Conventions

This report makes use of the text conventions outlined in Table 1.
 
Table 1: Report text conventions
Convention Description
command
This text style represents the Cisco Router command text that has to be entered literally.
string
This text style represents the Cisco Router command text that the you have to enter.
[ ]
Used to enclose a Cisco Router command option.
{ }
Used to enclose a Cisco Router command requirement.
|
Divides command option or requirement choices.
 

2. Security Audit

2.1. Introduction

Nipper performed a security audit of the Cisco Router RBD52 on Friday 24 March 2023. This section details the findings of the security audit together with the impact and recommendations.
 

2.2. Dictionary-based Password / Key

Observation: Attackers will often have dictionaries of words that contain names, places, default passwords and other common passwords. If a password or key is likely to be contained within an attacker's dictionary, they could gain access to the system.
 
The passwords and keys of the device RBD52 were tested against a small dictionary and one password / key was identified. The read-only Simple Network Management Protocol (SNMP) community string was public.
 
Impact: An attacker who was able to identify a password or key would be able to gain a level of access to the device, based on what service the password / key was used for.
 
Ease: Tools are available on the Internet that can perform dictionary-based password guessing against a number of network services.
 
Recommendation: Nipper strongly recommends that the password identified be immediately changed to something that is more difficult to guess. Nipper recommends that passwords be made up of at least eight characters in length and contain either uppercase or lowercase characters and numbers.
 

2.3. Weak Passwords / Keys

Observation: Strong passwords tend to contain a number of different types of character, such as uppercase and lowercase letters, numbers and punctuation characters. Weaker passwords tend not to contain a mixture of character types. Additionally, weaker passwords tend to be short in length.
 
Nipper identified two passwords / keys that did not meet the minimum password complexity requirements. These are listed in Table 2.
 
Table 2: Weak passwords / keys
Type Service Username Password
PasswordEnableLevel 15contra_secreta.
CommunitySNMPread-onlypublic
 
Impact: If an attacker were able to gain a password or key, either through dictionary-based guessing techniques or by a brute-force method, the attacker could gain a level of access to RBD52.
 
Ease: A number of dictionary-based password guessing and password brute-force tools are available on the Internet.
 
Recommendation: Nipper strongly recommends that the weak passwords be immediately changed to ones that are stronger. Nipper recommends that passwords be made up of at least eight characters in length and contain either uppercase or lowercase characters and numbers.
 

2.4. Directed Broadcasts

Observation: Internet Control Message Protocol (ICMP) echo requests can be addressed to an entire network or subnet as well as to individual hosts. Disabling directed broadcasts on each individual network interface will help prevent network ping requests. Directed broadcasts are usually enabled by default on Cisco devices running Internet Operating System (IOS) version 11.3 and earlier.
 
Nipper determined that the device RBD52 had support for directed broadcasts enabled on the network interfaces listed in Table 3.
 
Table 3: Interfaces with directed broadcasts enabled
Interface Description
GigabitEthernet0/0
GigabitEthernet0/0.10
GigabitEthernet0/0.30
GigabitEthernet0/1
Serial0/0/1
 
Impact: A Denial of Service (DoS) attack exists that makes use of network echo requests, known as a smurf attack. An attacker would send an ICMP echo request with the victim hosts IP address spoofed as the source. The hosts on the network would then reply to the echo request, flooding the victim host.
 
Ease: Tools are available on the Internet that can perform the smurf attack outlined above.
 
Recommendation: Nipper recommends that directed broadcasts be disabled on all network interfaces. Directed broadcasts can be disabled on each individual network interface using the following command:
 
no ip directed broadcast

 

2.5. OSPF Authentication

Observation: Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) used by routers to update routing tables. OSPF packets can be configured to use one of three levels of security; no authentication, clear-text authentication and MD5 authentication. The clear-text authentication method is almost as insecure as no authentication, as the key is included in the packet. Using the MD5 authentication method the packets are signed to prevent route tampering.
 
Nipper determined that OSPF with no authentication was configured on process ID 10.
 
Impact: An attacker who is able to update the routing tables could capture network traffic, perform a network-wide DoS or a man-in-the-middle attack.
 
Ease: Once an attacker has established what the type of authentication in use, they could use the information to pose as a router and insert routes into the routing tables by sending specially crafted OSPF packets. OSPF packets can be captured using a variety of techniques, and tools are available on the Internet that can be used to exploit insecure OSPF configurations.
 
Recommendation: Nipper recommends that, if possible, all OSPF areas be configured to use MD5-based authentication. Message digest authentication needs to be configured for each OSPF area and a key be specified on each OSPF network interface. The Cisco IOS command to enable MD5 authentication for an area is:
 
area {area id} authentication [message-digest]
 
The command to configure the MD5 authentication key on an interface is:
 
ip ospf message-digest-key {key id} md5

 

2.6. Inbound TCP Connection Keep Alives

Observation: Connections to a Cisco Router device could become orphaned if a connection becomes disrupted. An attacker could attempt a DoS attack against a Cisco Router by exhausting the number of possible connections. Transmission Control Protocol (TCP) keep alive messages can be configured to confirm that a remote connection is valid and then terminate any orphaned connections.
 
Nipper determined that TCP keep alive messages are not sent for connections from remote hosts.
 
Impact: An attacker could attempt a DoS by exhausting the number of possible connections.
 
Ease: Tools are available on the Internet that can open large numbers of TCP connections without correctly terminating them.
 
Recommendation: Nipper recommends that TCP keep alive messages be sent to detect and drop orphaned connections from remote systems. TCP keep alive messages can be enabled for connections from remote systems using the following command:
 
service tcp-keepalives-in

 

2.7. IP Source Routing

Observation: IP source routing is a feature whereby a network packet can specify how it should be routed through the network. Cisco routers normally accept and process source routes specified by a packet, unless the feature has been disabled.
 
Nipper determined that IP source routing was not disabled.
 
Impact: IP source routing can allow an attacker to specify a route for a network packet to follow, possibly to bypass a Firewall device or an Intruder Detection System (IDS). An attacker could also use source routing to capture network traffic by routing it through a system controlled by the attacker.
 
Ease: An attacker would have to control either a routing device or an end point device in order to modify a packets route through the network. However, tools are available on the Internet that would allow an attacker to specify source routes. Tools are also available to modify network routing using vulnerabilities in some routing protocols.
 
Recommendation: Nipper recommends that, if not required, IP source routing be disabled. IP source routing can be disabled by issuing the following IOS command:
 
no ip source routing

 

2.8. HyperText Transport Protocol Service

Observation: Recent Cisco IOS-based devices support web-based administration using the HTTP protocol. Cisco web-based administration facilities can sometimes be basic but they do provide a simple method of administering remote devices. However, HTTP is a clear-text protocol and is vulnerable to various packet-capture techniques.
 
Even though the HTTP service had not been configured, it can be enabled by default on some Cisco devices.
 
Impact: An attacker who was able to monitor network traffic could capture authentication credentials.
 
Ease: Network packet and password sniffing tools are widely available on the Internet. Once authentication credentials have been captured it is trivial to use the credentials to log in using the captured credentials.
 
Recommendation: Nipper recommends that, if not required, the HTTP service be disabled. If a remote method of access to the device is required, consider using HTTPS or Secure Shell (SSH). The encrypted HTTPS and SSH services may require a firmware or hardware upgrade. The HTTP service can be disabled with the following IOS command:
 
no ip http server
 
If it is not possible to upgrade the device to use the encrypted HTTPS or SSH services, additional security can be configured. An access list can be configured to restrict access to the device. An access list can be specified with the following command:
 
ip http access-class {access list number}

 
The authentication method can be changed using the following command (where the authentication method is either local, enable, tacacs or aaa):
 
ip http authentication [authentication method]

 

2.9. Simple Network Management Protocol

Observation: SNMP is used to assist network administrators in monitoring and managing a wide variety of network devices. There are three main versions of SNMP in use. Versions 1 and 2 of SNMP are both secured with a community string and authenticate and transmit network packets without any form of encryption. SNMP version 3 provides several levels of authentication and encryption. The most basic level provides a similar protection to that of the earlier protocol versions. However, SNMP version 3 can be configured to provide encrypted authentication (auth) and secured further with support for encrypted data communications (priv).
 
Nipper determined that SNMP protocol version 1 was configured on RBD52.
 
Impact: Due to the unencrypted nature of SNMP protocol versions 1 and 2c, an attacker who was able to monitor network traffic could capture device configuration settings, including authentication details.
 
Ease: Network packet monitoring and capture tools are widely available on the Internet and SNMP tools are included as standard with some operating systems.
 
Recommendation: Nipper recommends that, if possible, SNMP version 1 be disabled. Furthermore, Nipper recommends that, if SNMP is required, protocol version 3 be configured with Auth and Priv authentication. SNMP protocol version 1 can be disabled with the following command for each community string:
 
no snmp-server community {Community String} {[RO] | [RW]}
 
SNMP version 3 Auth and Priv access can be configured with the following commands:
 
snmp-server group {Group Name} v3 priv
 
snmp-server user {Username} {Group Name} v3 auth md5 {Auth Keyword} priv {[3des] | [aes 128] | [aes 192]} {Priv Keyword}

 

2.10. ICMP Redirects

Observation: ICMP redirect messages allow systems to change the route that network traffic takes. On networks with functional network routing, disabling ICMP redirects will have little to no effect. ICMP redirects are usually enabled by default on Cisco devices.
 
Nipper determined that the device RBD52 had support for ICMP redirects enabled on the network interfaces listed in Table 4.
 
Table 4: Interfaces with ICMP redirects enabled
Interface Description
GigabitEthernet0/0.10
GigabitEthernet0/0.30
GigabitEthernet0/1
Serial0/0/1
 
Impact: An attacker could use ICMP redirect messages to route network traffic through their own router, possibly allowing them to monitor network traffic.
 
Ease: Tools are widely available that can send ICMP redirect messages.
 
Recommendation: Nipper recommends that, if not required, ICMP redirects be disabled on all network interfaces. ICMP redirects can be disabled on each individual network interface using the following command:
 
no ip redirects

 

2.11. Logging

Observation: Logging is an essential component of a secure network configuration. Logging not only assists network administrators to identify issues when troubleshooting, but enables network administrators to react to intrusion attempts or Denial-of-Service attacks. It is therefore critical that logs be monitored, allowing administrators to take immediate action when an attack has been identified. Furthermore, system logs are a key component of a forensic investigation into past intrusions or service disruptions.
 
Nipper determined that, although logging was enabled on RBD52, Syslog logging was not configured.
 
Impact: An attacker could attempt to map and bypass any configured Access Control List (ACL) or to gain access to the Cisco Router without network administrators being alerted to the attempts. Furthermore, after an unauthorised intrusion into the network had been detected, it would be more difficult for an investigation to identify the source of the attack or the entry point without access to logs.
 
Ease: N/A
 
Recommendation: Nipper recommends that Syslog and Buffered logging be configured on RBD52. Logging can be enabled with the following command:
 
logging on

 
To configure Syslog logging, four things need to be set; a source interface for the Syslog messages to be sent from, one or more Syslog hosts to send messages to, the Syslog logging message severity level and the Syslog facility. The following commands can be used to configure Syslog logging:
 
logging source-interface {Interface}
 
logging host {Syslog IP address or hostname}
 
logging trap {Logging message severity level}
 
logging facility {Syslog facility}

 
It is worth noting that older IOS versions do not exclude the host parameter when specifying a host to send Syslog messages to. For older IOS versions you would use the following command:
 
logging {Syslog IP address or hostname}

 

2.12. Proxy ARP

Observation: Address Resolution Protocol (ARP) is a protocol that network hosts use to translate network addresses into media addresses. Under normal circumstances, ARP packets are confined to the sender's network segment. However, a Cisco router with Proxy ARP enabled on network interfaces can act as a proxy for ARP, responding to queries and acting as an intermediary.
 
Nipper identified four interfaces that had Proxy ARP enabled. These are listed in Table 5.
 
Table 5: Interfaces with Proxy ARP enabled
Interface Description
GigabitEthernet0/0.10
GigabitEthernet0/0.30
GigabitEthernet0/1
Serial0/0/1
 
Impact: A router that acts as a proxy for ARP requests will extend layer two access across multiple network segments, breaking perimeter security.
 
Ease: A Cisco device with Proxy ARP enabled will proxy ARP requests for all hosts on those interfaces.
 
Recommendation: Nipper recommends that, if not required, Proxy ARP be disabled on all interfaces. Proxy ARP can be disabled on each interface with the following Cisco IOS command:
 
no ip proxy-arp

 

2.13. Cisco Discovery Protocol

Observation: Cisco Discovery Protocol (CDP) is a proprietary protocol that is primarily used by Cisco, but has been used by others. CDP allows some network management applications and CDP aware devices to identify each other on a Local Area Network (LAN) segment. Cisco devices, including switches, bridges and routers are configured to broadcast CDP packets by default. The devices can be configured to disable the CDP service or disable CDP on individual network interfaces.
 
Nipper determined that the CDP service had not been disabled, and additionally, had not been disabled on all the active network interfaces.
 
Impact: CDP packets contain information about the sender, such as hardware model information, operating system version and IP address details. This information would allow an attacker to gain information about the configuration of the network infrastructure.
 
Ease: CDP packets are broadcast to an entire network segment. An attacker could use one of the many publicly available tools to capture network traffic and view the leaked information.
 
Recommendation: Nipper recommends that, if not required, the CDP service be disabled on the Cisco device RBD52. If CDP is required, Nipper recommends that CDP be disabled on all interfaces except those that are explicitly required.
 
The CDP service can be disabled by issuing the following Cisco IOS command:
 
no cdp run
 
CDP can be disabled on individual interfaces using the following command:
 
no cdp enable
 
In some configurations with IP phones, deployed using either Auto Discovery or Dynamic Host Configuration Protocol (DHCP), the CDP service may need to be enabled. In this situation CDP should be disabled on all network interfaces for which it is not required.
 

2.14. Classless Routing

Observation: Classless routing is enabled by default on Cisco routers. If a router has classless routing enabled and it receives a network packet for which there is no configured route, the router will forward the packet to the best destination. With classless routing disabled, the router would discard any network traffic for which no route is defined.
 
Nipper determined that classless routing was enabled on RBD52.
 
Impact: Network traffic that should not be routed by the router may be routed when classless routing is enabled.
 
Ease: N/A
 
Recommendation: Nipper recommends that, if possible, classless routing be disabled. Classless routing can be disabled with the following command:
 
no ip classless

 

2.15. BOOTP

Observation: BOOTstrap Protocol (BOOTP) is a datagram protocol that allows compatible hosts to load their operating system over the network from a BOOTP server. Cisco routers are capable of acting as BOOTP servers for other Cisco devices and the service is enabled by default. However, BOOTP is rarely used and may represent a security risk.
 
Nipper determined that BOOTP was not disabled. However, it is worth noting that not all Cisco devices support BOOTP.
 
Impact: An attacker could use the BOOTP service to download a copy of the router's IOS software.
 
Ease: Tools are available on the Internet to access BOOTP servers.
 
Recommendation: Nipper recommends that, if not required, the BOOTP service be disabled. The following command can be used to disable BOOTP:
 
no ip bootp server

 

2.16. TCP and UDP Small Servers

Observation: Cisco devices provide a set of simple servers which are collectively known as TCP small servers and User Datagram Protocol (UDP) small servers. The services provide little functionality and include chargen, echo and daytime. Cisco IOS version 11.2 and older enable these services by default; newer IOS versions explicitly require them to be started.
 
Nipper determined that the version of IOS, on the Cisco device RBD52, enables these servers by default and they have not been explicitly disabled.
 
Impact: Each running service increases the chances of an attacker being able to identify the device and successfully compromise it. It is good security practice to disable all unused services.
 
Ease: Tools are widely available to query these services and some operating systems install these tools by default.
 
Recommendation: Nipper recommends that, if not required, TCP and UDP small servers be explicitly disabled. TCP and UDP small services are rarely used and are disabled by default in newer versions of Cisco IOS.
 
TCP small servers can be disabled with the following IOS command:
 
no service tcp-small-servers

 
UDP small servers can be disabled with the following IOS command:
 
no service udp-small-servers

 

2.17. IP Unreachables

Observation: ICMP IP unreachable messages can be generated by a Cisco device when a host attempts to connect to a non-existent host, network, or use an unsupported protocol. ICMP IP unreachable messages will let the connecting host know that the host, network or protocol is not supported or cannot be contacted. Therefore, the host does not have to wait for a connection time-out. ICMP IP unreachable messages are normally enabled by default on Cisco devices and must be explicitly disabled.
 
Nipper determined that the Cisco device RBD52 had ICMP IP unreachable messages enabled on the interfaces listed in Table 6.
 
Table 6: Interfaces with IP unreachables enabled
Interface Description
GigabitEthernet0/0.10
GigabitEthernet0/0.30
GigabitEthernet0/1
Serial0/0/1
 
Impact: An attacker who was performing network scans to determine what services were available would be able to scan a device more quickly.
 
Ease: Tools are available on the Internet that can perform a wide variety of scan types.
 
Recommendation: Nipper recommends that, if not required, IP unreachables be disabled on all network interfaces. However, whilst disabling IP unreachables will not stop scans, it does make it more difficult for an attacker. The IP unreachables option is disabled or enabled individually for each network interface. It can be disabled with the following command:
 
no ip unreachables

 

2.18. Packet Assembler / Disassembler

Observation: The Packet Assembler / Disassembler (PAD) service enables X.25 connections between network systems. The PAD service is enabled by default on most Cisco IOS devices but it is only required if support for X.25 links is necessary.
 
Nipper determined that the PAD service had not been disabled.
 
Impact: Running unused services increases the chances of an attacker finding a security hole or fingerprinting a device.
 
Ease: N/A
 
Recommendation: Nipper recommends that, if not required, the PAD service be disabled. Use the following command to disable the PAD service:
 
no service pad

 

2.19. Maintenance Operations Protocol

Observation: Maintenance Operations Protocol (MOP) is used with the DECnet protocol suite. MOP is enabled by default on ethernet interfaces in some versions of IOS.
 
Nipper determined that MOP had not been disabled on all ethernet interfaces.
 
Impact: Running unused services increases the chances of an attacker finding a security hole or fingerprinting a device.
 
Ease: N/A
 
Recommendation: Nipper recommends that, if not required, MOP be disabled on all ethernet interfaces. MOP can be disabled on each interface with the following command:
 
no mop enabled

 

2.20. Conclusions

Nipper performed a security audit of the Cisco Router device RBD52 on Friday 24 March 2023 and identified 18 security-related issues. Nipper determined that:
 

3. Device Configuration

3.1. Introduction

This section details the configuration settings of the Cisco Router device RBD52.
 

3.2. General

Table 7: General device settings
Description Setting
HostnameRBD52
Service Password EncryptionEnabled
IP Source RoutingEnabled
BOOTPEnabled
Service ConfigDisabled
TCP Keep Alives (In)Disabled
TCP Keep Alives (Out)Disabled
Cisco Express ForwardingDisabled
Classless RoutingEnabled
 

3.3. Services

Table 8: Device services
Service Status
TelnetDisabled
HTTPUnconfigured
FingerDisabled
TCP Small ServicesEnabled
UDP Small ServicesEnabled
SNMPEnabled
CDPEnabled
PADEnabled
 

3.4. Domain Name Settings

Table 9: Domain name settings
Description Setting
Domain Nameislacinco.com
Domain LookupDisabled
DNS Server 15.5.5.5
 

3.5. Time Zone Settings

Table 10: Time zone settings
Description Setting
Time ZoneUTC
UTC OffsetNone
Summer Time ZoneDisabled
Authorative Time SourceNo
 

3.6. User Accounts and Privilages

Table 11: Enable Passwords
Level Password Encryption
15contra_secreta. None
 
Table 12: User Accounts
Username Privilage Password Encryption
leidi15<unknown> Unknown
wilberth15<unknown> Unknown
bianca15<unknown> Unknown
jared15<unknown> Unknown
 
Login banners should provide a warning against unauthorised access to the device. The configured banner on RBD52 was:
 
Acceso no autorizado prohibido. Solo personal autorizado."
line con 0
password linea_de_consola.
login
exit
line vty 0 4
password linea_vty.
login local
transport input ssh
exit
line vty 5 15
password linea_vty.
login local
exit
service timetamps log datetime msec
loggin facility syslog
loggin trap debug
logging host 10.5.20.20
ntp update-calendar
ntp server 10.0.0.254
crypto key-generate rsa

 

3.7. Logging

Table 13: Logging configuration
Description Setting
LoggingEnabled
Log Configuration ChangesDisabled
Console LoggingSystem Default
Console Logging Severity LevelDefault
Syslog LoggingDisabled
Buffer LoggingSystem Default
Buffer SizeDefault
Buffer Logging Severity LevelDebugging (7)
Terminal Line LoggingEnabled
Terminal Line Logging Severity LevelDebugging (7)
 

3.8. Simple Network Management Protocol

SNMP is used to assist network administrators in monitoring and managing a wide variety of network devices. There are three main versions of SNMP in use. Versions 1 and 2 of SNMP are both secured with a community string and authenticate and transmit network packets without any form of encryption. SNMP version 3 provides several levels of authentication and encryption. The most basic level provides a similar protection to that of the earlier protocol versions. However, SNMP version 3 can be configured to provide encrypted authentication (auth) and secured further with support for encrypted data communications (priv).
 
Table 14: General SNMP service configuration
Description Setting
Service enabledYes
Trap Timeout30 seconds
TFTP Server ListDisabled
 
Table 15: SNMP community strings
Community Access View Access-List Enabled
public Read-OnlyYes
 
Table 16: SNMP traps
SNMP Trap
 

3.9. Secure Shell

Table 17: SSH configuration
Description Setting
SSHDisabled
Protocol version2
Login time-outDefault
Login retriesDefault
 

3.10. Routing

A network device's routing tables can be configured with static routes or updated dynamically. Routing protocols are used by network routing devices to dynamically update the routing tables that devices use to forward network traffic to their destination. Router protocols can be split into two different categories; IGPs and Exterior Gateway Protocols (EGPs). IGPs are usually used in situations where the routing devices are all controlled by a single entity, such as within a company. EGPs are usually used in situations where routing devices are managed by a number of entities, such as the Internet. Typically routing devices support a number of standard routing protocols.
 
OSPF protocol is an IGP. OSPF packets are sent when the network configuration changes, such as when a route goes down, and the packets only contain the change. Since the information sent in OSPF packets is limited to any network changes, the protocol is well suited to complex network configurations.
 
For OSPF to work on a network interface it must be included within an OSPF network area.
 
Table 18: OSPF process ID 10 network areas
Network Network Mask Area ID
10.5.1.00.0.0.2550
10.5.10.00.0.0.2550
10.5.20.00.0.0.2550
10.5.30.00.0.0.2550
10.5.40.00.0.0.2550
10.19.0.120.0.0.30
 
Table 19: OSPF process ID 10 interface configuration
Interface Description IP Address Authentication Authentication Key Key Encryption Flood Reduction OSPF Mode
GigabitEthernet0/0.1010.5.10.254 255.255.255.0None NoneOffDefault
GigabitEthernet0/0.3010.5.30.254 255.255.255.0None NoneOffDefault
GigabitEthernet0/110.19.0.13 255.255.255.252None NoneOffDefault
Serial0/0/110.19.0.18 255.255.255.252None NoneOffDefault
 

3.11. Interfaces

Table 20: Interfaces
Interface Active IP Address Proxy ARP IP Unreachable IP Redirect IP Mask Reply IP Direct Broadcast NTP CDP uRPF MOP
GigabitEthernet0/0YesNoneN/AN/AN/AN/AN/AN/AN/AOffN/A
GigabitEthernet0/0.10Yes10.5.10.254 255.255.255.0OnOnOnOffOnOnOnOffN/A
GigabitEthernet0/0.30Yes10.5.30.254 255.255.255.0OnOnOnOffOnOnOnOffN/A
GigabitEthernet0/1Yes10.19.0.13 255.255.255.252OnOnOnOffOnOnOnOffOn
Serial0/0/1Yes10.19.0.18 255.255.255.252OnOnOnOffOnOnOnOffOn
 

4. Appendix

4.1. Abbreviations

ACLAccess Control List
ARPAddress Resolution Protocol
BOOTPBOOTstrap Protocol
CDPCisco Discovery Protocol
CEFCisco Express Forwarding
DHCPDynamic Host Configuration Protocol
DoSDenial of Service
EGPExterior Gateway Protocol
HTTPHyperText Transfer Protocol
HTTPSHyperText Transfer Protocol over SSL
ICMPInternet Control Message Protocol
IDSIntruder Detection System
IGPInterior Gateway Protocol
IOSInternet Operating System
IPInternet Protocol
LANLocal Area Network
MD5Message Digest 5
MOPMaintenance Operations Protocol
NTPNetwork Time Protocol
OSPFOpen Shortest Path First
PADPacket Assembler / Disassembler
SNMPSimple Network Management Protocol
SSHSecure Shell
SSLSecure Sockets Layer
TCPTransmission Control Protocol
TFTPTrivial File Transfer Protocol
UDPUser Datagram Protocol
UTCCoordinated Universal Time
 

4.2. Common Ports

Table 21: Common ports
Service Port
SSH22
DHCP67
TFTP69
HTTP80
NTP123
SNMP161
HTTPS443
 

4.3. Logging Severity Levels

Table 22: Logging message severity levels
Level Level Name Description
0EmergenciesSystem is unstable
1AlertsImmediate action is required
2CriticalCritical conditions
3ErrorsError conditions
4WarningsWarning conditions
5NotificationsSignificant conditions
6InformationalInformational messages
7DebuggingDebugging messages
 

4.4. Time Zones

Table 23: Common time zone acronyms
Region Acronym Time Zone UTC Offset
AustraliaCSTCentral Standard Time+9.5 hours
AustraliaESTEastern Standard/Summer Time+10 hours
AustraliaWSTWestern Standard Time+8 hours
EuropeBSTBritish Summer Time+1 hour
EuropeCESTCentral Europe Summer Time+2 hours
EuropeCETCentral Europe Time+1 hour
EuropeEESTEastern Europe Summer Time+3 hours
EuropeESTEastern Europe Time+2 hours
EuropeGMTGreenwich Mean Time
EuropeISTIrish Summer Time+1 hour
EuropeMSKMoscow Time+3 hours
EuropeWESTWestern Europe Summer Time+1 hour
EuropeWETWestern Europe Time+1 hour
USA and CanadaADTAtlantic Daylight Time-3 hours
USA and CanadaAKDTAlaska Standard Daylight Saving Time-8 hours
USA and CanadaAKSTAlaska Standard Time-9 hours
USA and CanadaASTAtlantic Standard Time-4 hours
USA and CanadaCDTCentral Daylight Saving Time-5 hours
USA and CanadaCSTCentral Standard Time-6 hours
USA and CanadaEDTEastern Daylight Time-4 hours
USA and CanadaESTEastern Standard Time-5 hours
USA and CanadaHSTHawaiian Standard Time-10 hours
USA and CanadaMDTMountain Daylight Time-6 hours
USA and CanadaMSTMountain Standard Time-7 hours
USA and CanadaPDTPacific Daylight Time-7 hours
USA and CanadaPSTPacific Standard Time-3 hours
 

4.5. Nipper Details

This report was generated using Nipper version 0.11.7. Nipper is an Open Source tool designed to assist security professionals and network system administrators securely configure network infrastructure devices. The latest version of Nipper can be found at the following URL:
 
http://nipper.sourceforge.net.