using BOOTP to generate DoS attacks.
  • HTTP: Disabling this service prevents attackers from accessing the HTTP router administrative access interface.
  • Identification: Disabling this service prevents attackers from querying TCP ports for identification.
  • NTP: Disabling this service prevents attackers from corrupting router time bases.
  • Source routing: Disabling this service prevents attackers from using source routing for malicious purposes.
  • Gratuitous ARPs: Disabling gratuitous ARPs prevents the router from broadcasting the IP address of the router interfaces.
  • Essentially, AutoSecure disables the most common attack vectors by shutting down the attacks’ associated global router services. The global services listed are high-risk attack vectors. AutoSecure enables the following router global services: AutoSecure Step 3: Creating Security Banner
    Next, AutoSecure prompts you to create a banner that appears every time someone accesses the router. Figure shows the default banner. Creating a banner here is the same as using the banner command in global configuration mode. AutoSecure Step 4: Passwords and AAA
    Next, AutoSecure proceeds to the configuration of login functionality. AutoSecure prompts you to configure the following as shown in Figure : When securing the device against login attacks, you specify the following: AutoSecure Step 5: SSH and Interface-Specific Services
    Next, AutoSecure proceeds to the SSH functionality and to interface-specific options as shown in Figure . AutoSecure asks whether you want to configure the SSH server. If you answer “yes,” AutoSecure automatically configures the SSH timeout to 60 seconds and the number of SSH authentication retries to two: During this step, AutoSecure automatically disables the following services on all router interfaces: AutoSecure Step 6: Forwarding Plane, Verification, and Deployment
    Next, AutoSecure secures the router forwarding plane as shown in Figure . AutoSecure secures the router forwarding plane by completing the following: Note
    Unicast RPF is an antispoof feature that scans the routing table information to detect and possibly block spoofed IP packets. When an incoming packet arrives on an interface, the router checks the routing entry for the source IP address of the packet. If the route points to the same interface, the packet is accepted. If the packet arrived on a different interface, the packet may have been spoofed and is the router drops the packet.
    Content 5.4 Disabling Unused Cisco Router Network Services and Interfaces 5.4.5 Display AutoSecure Configuration Finally, AutoSecure displays the changes that will be applied to the router running configuration. If you now wish to apply these changes, answer “Yes” to the “Apply this configuration to running-config?” question. The series of nine Figures to show examples of how this portion of the AutoSecure dialogue appears.