You may have services running by default on your Cisco routers that you only vaguely understand or even know about, which can turn into a security problem. Learn what services are enabled and disabled by default and which ones you can probably turn off if you're not using them.
If you're concerned about security, one of the first places you start looking on any system is the default services that are running. Running services that haven't been configured correctly or that are completely unneeded opens up big holes for hackers and other ne'er-do-wells out there looking to access or damage your network. Many Windows administrators have learned this the hard way, and Cisco administrators also need to know what the services are and which ones can or should be disabled.
You can download the Global Network white paper "How Vulnerable Are Your Cisco IOS Routers?" from the TechRepublic directory to get the low-down on Cisco services.
This eight-page paper, written by expert Carol Kavalla, covers services that are enabled by default, with descriptions of each and what they do, including:
- BOOTP server
- Cisco Discovery Protocol (CDP)
- HTTP Configuration and Monitoring
- Domain Name System (DNS)
- Packet Assembler / Disassembler (PAD)
- Internet Control Message Protocol (ICMP) Redirects
- IP Source Routing
- Finger Service
- Proxy ARP
- IP Directed Broadcast
Kavalla also covers Cisco services that are disabled by default and includes some other best practice tips for router security.
Don't miss out on this valuable resource -- download it here.