This guide provides key configuration recommendations for securing Cisco IOS devices, aligned with the NIST Cybersecurity Framework (CSF) and based on the Center for Internet Security (CIS) benchmarks. These configurations help network administrators enhance the security posture of their Cisco routers and switches.
| NIST CSF Subcategory | Description | CIS Benchmark Recommendation | Configuration Command | |
|---|---|---|---|---|
| PR.AA-01 | Identities and credentials are managed and verified for authorized users and devices. | Enable AAA | Centralizes authentication, authorization, and accounting for better control. | aaa new-model |
| PR.AA-01 | Identities and credentials are managed and verified for authorized users and devices. | Set up AAA authentication for login | Uses local database or external server for user authentication. | aaa authentication login default local |
| PR.AA-02 | Privileged access is managed and restricted. | Set up AAA authentication for enable mode | Controls access to privileged EXEC mode. | aaa authentication enable default enable |
| PR.AA-01 | Identities and credentials are managed and verified for authorized users and devices. | Create local user with encrypted password | Ensures secure local authentication if external servers are unavailable. | username <name> secret <password> |
| PR.DS-05 | Protections against data leaks are implemented. | Enable SSH | Provides secure remote access to the device, preventing data exposure. | ip ssh version 2crypto key generate rsa modulus 2048 |
| PR.DS-05 | Protections against data leaks are implemented. | Set VTY lines to use SSH only | Disables insecure protocols like Telnet for remote access. | line vty 0 4transport input ssh |
| PR.AA-05 | Session lock and termination policies are enforced. | Set session timeout | Automatically logs out inactive sessions to prevent unauthorized access. | line con 0exec-timeout 10 0line vty 0 4exec-timeout 10 0 |
| DE.CM-01 | Networks are monitored to detect adverse events. | Enable logging | Captures system events for monitoring and auditing purposes. | logging onlogging host <syslog_server_ip> |
| DE.CM-01 | Networks are monitored to detect adverse events. | Set logging level | Configures the severity level of logs to capture necessary events. | logging trap informational |
| PR.PS-01 | Configuration management practices are applied. | Secure SNMP (if used) | Uses secure community strings or preferably SNMPv3 for management. | snmp-server community <string> RO(Consider using SNMPv3 for better security) |
| PR.PS-01 | Configuration management practices are applied. | Require Unicast Reverse-Path Forwarding | Verifies source addresses to prevent IP spoofing. | ip cefinterface <interface_name>ip verify unicast source reachable-via rx |
| PR.PS-01 | Configuration management practices are applied. | Forbid IP Proxy ARP | Disables proxy ARP to maintain LAN security boundaries. | interface <interface_name>no ip proxy-arp |