Cisco IOS Routers: Auto Secure

Cisco IOS Routers: Auto Secure

February 17, 2011·Ryan
Ryan

Auto Secure is useful for small businesses or IT administrators who know how to configure a router with networking protocols, set up IP interfaces, and networks but may not have a strong understanding of router security. Cisco has implemented a script called Auto Secure, which simplifies securing a router by prompting the user with “yes” or “no” questions. Some answers may require additional network-specific details.

Getting Started with Auto Secure

To begin, enter user mode on the router, then enable privileged EXEC mode:

Router>enable

Once in privileged EXEC mode, type the following command to start Auto Secure:

Router#auto secure

AutoSecure Configuration

--- AutoSecure Configuration ---
*** AutoSecure configuration enhances the security of the router, but it will not make it absolutely resistant to all security attacks ***
AutoSecure will modify the configuration of your device. All configuration changes will be shown.
For a detailed explanation of how the configuration changes enhance security and any possible side effects, please refer to Cisco.com for AutoSecure documentation.

At any prompt you may enter '?' for help.
Use ctrl-c to abort this session at any prompt.
Gathering information about the router for AutoSecure...

Auto Secure enhances security but does not guarantee complete protection. It modifies the device configuration and displays all changes before applying them.

AutoSecure Prompts and Configuration

Internet Connection

Is this router connected to internet? [no]: yes

Number of Interfaces Facing the Internet

Enter the number of interfaces facing the internet [1]: 1

Selecting the Internet-Facing Interface

Interface              IP-Address      OK? Method Status                Protocol
FastEthernet0/0        unassigned      YES unset  administratively down down
FastEthernet0/1        unassigned      YES unset  administratively down down
Serial0/0/0           172.16.2.241     YES manual down down
Serial0/0/1           unassigned       YES unset  administratively down down
Vlan1                 unassigned       YES unset  administratively down down
Enter the interface name that is facing the internet: serial0/0/0

Disabling and Enabling Services

After identifying the internet-facing interface, Auto Secure disables unnecessary services and enables essential security features:

Securing Management plane services...
Disabling service finger
Disabling service pad
Disabling udp & tcp small servers
Enabling service password encryption
Enabling service tcp-keepalives-in
**Output Omitted**

Setting a Security Banner

Enter the security banner {Put the banner between k and k, where k is any character}:*Authorized Access Only*

Setting Enable Secret and Enable Password

Enable secret is either not configured or is the same as enable password
Enter the new enable secret: 
Enter the new enable password:

Configuring a Local User Database

Configuration of local user database
Enter the username: Username
Enter the password: password
Confirm the password: password

Enabling AAA and Login Attack Prevention

Blocking Period when Login Attack detected: #
Maximum Login failures with the device: #
Maximum time period for crossing the failed login attempts: #

Configuring SSH Access

Configure SSH server? [yes]: yes
Enter the host name: {Router Name}
Enter the domain-name: {Yourdomain-name}

Configuring CBAC Firewall

Configure CBAC Firewall feature? [yes/no]: yes

At this stage, Auto Secure generates a secure configuration:

This is the configuration generated:
!
Disabling service finger
Disabling service pad
Disabling udp & tcp small servers
Enabling service password encryption
Enabling service tcp-keepalives-in
**Output Omitted**
Apply this configuration to running-config? [yes]:

You can choose to apply this configuration immediately or review it before making changes. If any issues arise, you can reload the router without saving the configuration to revert to its previous state.

For further details, visit Cisco.com and explore the official Auto Secure documentation.