Keep the router configuration safe
Routers are a very important component in enterprise networking. When clients request information, the server provides information, the switch connects clients and servers to each other, and the router works on the network.
The security you add when managing a router can make a lot of difference between providing a functional and responsive network or an independent intranet that does not provide services. Follow these steps to keep the router safe.
Managing routers starts with how you configure them. If there is no detailed documentation for configuring routers, you need to create a copy.
If you need any help, see this guide (English). These instructions are very complete and provide a great starting point.
Setting up and documenting how to configure the router gives you an important first step to securely managing that configuration: Downloading and storing the initial basic configuration in a secure location is a good thing to do. .
Ideally, you should perform the initial configuration from the control device and store it on a network drive. Most importantly, don't store it on a laptop hard drive! Laptop devices (For example, laptops, PDAs, memory sticks .) are vulnerable to theft, which can compromise the integrity and functionality of the entire network.
After downloading the configuration, the next step is to synchronize the running configuration with the boot configuration. But don't think you have completed the router and run it on the network. You need to maintain that configuration and make changes periodically.
Some administrators prefer making changes online, while others prefer making offline changes and then loading configuration data. Both have their own benefits.
When changing online, you can immediately respond and check. For example, the router will alert if you enter an incorrect command. In addition, if you make changes that cause many problems with the network, you will know right away.
On the other hand, if you make offline changes, you have the opportunity to add comments and edit the router configuration. However, this method does not provide syntax checking or feedback if there is a change.
If you decide to use an offline approach, be sure to use a secure method of configuration distribution. The Trivial File Transfer Protocol (TFTP) is not the recommended method because it does not provide security for connection configuration or distribution. You should use the File Transfer Protocol (FTP) transfer protocol as soon as you configure a login and password or a secure backup protocol Secure Copy Protocol (SCP) are the safest methods for a configuration. new.
Regardless of how you manage the updates of router configurations, it is important to save each configuration change and write to all modifications. This allows you and others to better understand the changes and review them when detecting errors.
The last hint
The data has a way of "going out the door" and usually ends with nothing fun. To prevent this, remember not to store the router configuration on mobile devices. Instead, save secure configurations within folders with appropriate network permissions.
You should read it
- How to Secure WiFi with tips on the router
- Log in and configure the Router
- Learn basic functions of network devices
- How to Configure a Cisco Router
- How to find the router IP address on any platform
- How does WiFi work without a router?
- How to configure TP-Link router to Access Point
- How to Block Strangers from Accessing the Internet
May be interested
- 10 security threats on virtual serversvulnerabilities of virtual machine control (hypervisor), phishing scams, network traffic are getting worse ... what are the biggest risks of virtualization technology today and how to deal with them? what? this is the time
- Multi-factor authentication in Windows - Part 1: USB tokens and smart cardsuntil now, passwords were often used as a required authentication mechanism or it was a preferred mechanism when accessing sensitive systems and data. however, due to security needs, it requires more and more convenience, reducing the complexity and need to implement it
- Basic security notessecurity is always a matter of concern. the following basic security notes will remind you to be alert, help keep data safe. emails promoting drugs 'energize men' or 'hot' images of super models ... often serve as users
- 7 Cisco security tipscisco has just released its first annual security report with the launch of cisco security center website (cisco.com/security). the report also makes predictions about security threats in 2008 along with advice from security experts.
- How to enable processor-based securitypcs operating under windows operating systems have the same level of protection as those used by high-performance servers. this technology - known under different names for each manufacturer, such as nx (no execute), evp (enhanced virus p
- Security and identity managementmicrosoft continues to expand its line of security products, especially products for malware protection.