果没必要则禁止WINS和DNS服务。RouterCo
fig
oipdomai
lookup如果需要则需要配置:RouterCo
fighost
ameRouterRouterCo
figip
ameserver20296209513明确禁止不使用的端口。RouterCo
figi
terfaceeth03RouterCo
figshutdow
三路由器路由协议安全配置1首先禁止默认启用的ARPProxy,它容易引起路由表的混乱。RouterCo
fig
oipproxyarp或者RouterCo
figif
oipproxyarp2启用OSPF路由协议的认证。默认的OSPF认证密码是明文传输的,建议启用MD5认证。并设置一定强度密钥key相对的路由器必须有相同的Key。RouterCo
figrouterospf100RouterCo
figrouter
etwork1921681000000255area100启用MD5认证。areaareaidauthe
ticatio
启用认证,是明文密码认证。!areaareaidauthe
ticatio
messagedigestRouterCo
figrouterarea100authe
ticatio
messagedigestRouterCo
figexitRouterCo
figi
terfaceeth01!启用MD5密钥Key为routerospfkey。!ipospfauthe
ticatio
keykey启用认证密钥,但会是明文传输。!ipospfmessagedigestkeykeyid1255md5keyRouterCo
figifipospfmessagedigestkey1md5routerospfkey3RIP协议的认证。只有RIPV2支持,RIP1不支持。建议启用RIPV2。并且采用MD5认证。普通认证同样是明文传输的。RouterCo
figco
figtermi
al启用设置密钥链RouterCo
figkeychai
mykeychai
ameRouterCo
figkeychai
key1!设置密钥字串RouterCo
figleychai
keykeystri
gMyFirstKeyStri
gRouterCo
figkeyschai
key2RouterCo
figkeychai
keykeystri
gMySeco
dKeyStri
g!启用RIPV2RouterCo
figrouterripRouterCo
figrouterversio
2RouterCo
figrouter
etwork1921681000RouterCo
figi
terfaceeth01
511
f采用MD5模式认证,并选择已配置的密钥链RouterCo
figifipripauthe
ticatio
modemd5RouterCo
figifipripa
the
ticatio
keychai
mykeychai
ame4启用passivei
terface命令可以禁用一些不需要接收和转发路由信息的端口。建议对于不需要路由的端口,启用passivei
terface。但是,在RIP协议是只是禁止转发路由信息,并没有禁止接收。在OSPF协议中是禁止转发和接收路由信息。Rip中,禁止端口03转发路由信息RouterCo
figrouterRipRouterCo
figrouterpassivei
terfaceeth03!OSPF中,禁止端口03接收和转发路由信息RouterCo
figrouterospf100RouterCo
figrouterpassivei
terfaceeth035启用访问列表过滤一些垃圾和恶意路由信息控制网络的垃圾信息流。RouterCo
figaccesslist10de
y19216810000255RouterCo
figaccesslist10permita
y禁止路由器接收更新19216810网络的路由信息RouterCo
figrouterospf100RouterCo
figrouterdistributelist10i
!禁止路由器转发传播19216810网r