If you’re concerned about security, one of the first places you start looking on any system is the default services that are running. Running services that haven’t been configured correctly or that are completely unneeded opens up big holes for hackers and other ne’er-do-wells out there looking to access or damage your network. Many Windows administrators have learned this the hard way, and Cisco administrators also need to know what the services are and which ones can or should be disabled.

You can download the Global Network white paper “How Vulnerable Are Your Cisco IOS Routers?” from the TechRepublic directory to get the low-down on Cisco services.

This eight-page paper, written by expert Carol Kavalla, covers services that are enabled by default, with descriptions of each and what they do, including:

  • BOOTP server
  • Cisco Discovery Protocol (CDP)
  • HTTP Configuration and Monitoring
  • Domain Name System (DNS)
  • Packet Assembler / Disassembler (PAD)
  • Internet Control Message Protocol (ICMP) Redirects
  • IP Source Routing
  • Finger Service
  • Proxy ARP
  • IP Directed Broadcast

Kavalla also covers Cisco services that are disabled by default and includes some other best practice tips for router security.

Don’t miss out on this valuable resource — download it here.