Defaults Configurations and Secure Alternatives
Telnet vs SSH
Telnet is an antiquated and insecure protocol; it sends all traffic across the wire in clear text. This includes user
names and passwords. Any attacker may eavesdrop on a Telnet session and obtain credentials. Below are the commands detailing how to disable Telnet and and implement SSH.
- crypto key generate ssh
- ip ssh
- no telnet-server
ProCurve switches and routers can, by default, be configured through the web interface. The HTTP
interface has the same limitations as Telnet. It is therefore recommended that the HTTPS interface be configured and the HTTP interface be disabled, like so:
- crypto key generate cert 1024
- web-management ssl
- no web-management plaintext
TFTP client and server should be disabled as they do not require any authentication. Secure File
Transfer Protocol (SFTP) and Secure Copy Protocol (SCP) are part of the SSH protocol suite. As such provide an encrypted session using public/private keys between client and server just like
SSH. You configure it like so:
- crypto key generate ssh
- ip ssh filetransfer
- no tftp server
- no tftp client
SNMP version 2 is enabled by default. SNMPv2 community names are sent across the network as clear text (similiar to Telnet). SNMP version 3 overcomes these weaknesses via encryption. Here's how to configure it:
- snmpv3 enable
- snmpv3 only
- snmp-server community
restricted
- no snmp-server enable
It’s possible to restrict IP access to the switch to certain management IP's only. This is configured via the following command:
- ip authorized-manager <IP address> mask