Cisco switch security policy examples |
Author: Date:2016/9/27 17:04:46 |
Each network switches must meet the following standard:
1. The switch may not be configured user account. 2. The switches on the enable password command must be saved in a secure encrypted form. Standard 3. If the switch's MAC address to the lock, you should enable this function. 4. If in a port on the emergence of a new or unregistered MAC address, you should disable this port. 5. If the broken link again to build links, we should generate an SNMP trap. 6. Switches shall be placed in a secure location, in its physical access is limited to authorized personal. 7. The switch should be disable any Web server software, if need to use this software to maintain switches, shall start the server to configure a switch, and then disable it. All the access control administrator functions should be enabled. 8. Each switch must be clearly identified the following statement: "Note: prohibit unauthorized access to the network equipment. You must be in the case of explicit permission to access and configure the equipment. For all activities must be performed on the equipment record, in violation of the strategy will be subject to disciplinary action, and may be to go to law." These safety requirements may not be suitable for you, for your reference. |