SlideShare a Scribd company logo
1 of 3
Some important commands, useful to protect your router from layesr 1 attacks..



Disable unused interfaces.
Router (config)# interface
Router (config-if)#shutdown

2.Turn off CDP
Router (config)#no cdp run

3.Turn off Bootp
Router (config)#no ip bootp server

4.Turn off small servers
Router (config)#no service tcp-small-server
Router (config)#no service udp-small-server

5.Turn off FTP server
Router (config)#no ftp server enable

6.Turn off TFTP server
Router (config)#no tftp server enable

7.Turn off NTP server.
Router (config)#no ntp server

8.Turn off service pad
Router (config)#no service pad

9.Turn off finger service
Router (config)#no ip finger

10.Use complex password for snmp string and it must be configured as RO

11.SDM
Use https only
Router (config)#no ip http server
Router (config)#ip http secure-server

12.For the untrusted interfaces
Router (config)#interface
Router (config-if)#no ip redirects
Router (config-if)#no ip unreachables
Router (config)#no ip source-route
Router (config)#no ip domain look-up

13.Turn on keepalives.
Router (config)#service tcp-keepalives-in
Router (config)#service tcp-keepalives-out

14.Turn off gratuitous arps
Router (config)#no ip gratuitous-arps

15.Turn off proxy arp
Router (config)#interface (untrusted)
Router (config-if)#no ip proxy-arp

16.Turn off ip directed broadcast.
Router (config)#interface (untrusted)
Router (config-if)#no ip directed-broadcast



Some important commands, useful to protect your router from layesr 1 attacks.

Disable unused interfaces.
Router (config)# interface
Router (config-if)#shutdown

2.Turn off CDP
Router (config)#no cdp run

3.Turn off Bootp
Router (config)#no ip bootp server

4.Turn off small servers
Router (config)#no service tcp-small-server
Router (config)#no service udp-small-server

5.Turn off FTP server
Router (config)#no ftp server enable

6.Turn off TFTP server
Router (config)#no tftp server enable

7.Turn off NTP server.
Router (config)#no ntp server
8.Turn off service pad
Router (config)#no service pad

9.Turn off finger service
Router (config)#no ip finger

10.Use complex password for snmp string and it must be configured as RO

11.SDM
Use https only
Router (config)#no ip http server
Router (config)#ip http secure-server

12.For the untrusted interfaces
Router (config)#interface
Router (config-if)#no ip redirects
Router (config-if)#no ip unreachables
Router (config)#no ip source-route
Router (config)#no ip domain look-up

13.Turn on keepalives.
Router (config)#service tcp-keepalives-in
Router (config)#service tcp-keepalives-out

14.Turn off gratuitous arps
Router (config)#no ip gratuitous-arps

15.Turn off proxy arp
Router (config)#interface (untrusted)
Router (config-if)#no ip proxy-arp

16.Turn off ip directed broadcast.
Router (config)#interface (untrusted)
Router (config-if)#no ip directed-broadcast

More Related Content

What's hot

Лекц 15
Лекц 15Лекц 15
Лекц 15
Muuluu
 
Cisco router basic configuration commands
Cisco router basic configuration commandsCisco router basic configuration commands
Cisco router basic configuration commands
CCNAStudyGuide
 
Basic Static Route Configuration
Basic Static Route ConfigurationBasic Static Route Configuration
Basic Static Route Configuration
cstony_dreamer
 

What's hot (18)

How to shut down Netapp san 9.2 cluster mode version1
How to shut down Netapp san 9.2 cluster mode version1How to shut down Netapp san 9.2 cluster mode version1
How to shut down Netapp san 9.2 cluster mode version1
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...
 
Linux processes control and monitoring
Linux processes control and monitoringLinux processes control and monitoring
Linux processes control and monitoring
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
 
OSPF Authentication
OSPF Authentication OSPF Authentication
OSPF Authentication
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode  Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode
 
How to shutdown and power up of the netapp cluster mode storage system
How to shutdown and power up of the netapp cluster mode storage systemHow to shutdown and power up of the netapp cluster mode storage system
How to shutdown and power up of the netapp cluster mode storage system
 
Cisco router basic configuration commands
Cisco router basic configuration commandsCisco router basic configuration commands
Cisco router basic configuration commands
 
EIGRP Default Route
EIGRP Default Route EIGRP Default Route
EIGRP Default Route
 
Basic Static Route Configuration
Basic Static Route ConfigurationBasic Static Route Configuration
Basic Static Route Configuration
 
How to ride a 100GbE LAN -MEMO-
How to ride a 100GbE LAN -MEMO-How to ride a 100GbE LAN -MEMO-
How to ride a 100GbE LAN -MEMO-
 
Cisco be6000 solution
Cisco be6000 solutionCisco be6000 solution
Cisco be6000 solution
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
 
Acn Experiment No 3
Acn Experiment No 3Acn Experiment No 3
Acn Experiment No 3
 

Viewers also liked

Viewers also liked (8)

Mind mapping
Mind mappingMind mapping
Mind mapping
 
saving energy ecosystems and wine - closure on the cork debate
saving energy ecosystems and wine - closure on the cork debatesaving energy ecosystems and wine - closure on the cork debate
saving energy ecosystems and wine - closure on the cork debate
 
แผ่นดินไหว
แผ่นดินไหวแผ่นดินไหว
แผ่นดินไหว
 
โครงสร้างโลก
โครงสร้างโลกโครงสร้างโลก
โครงสร้างโลก
 
Modelos atomicos
Modelos atomicosModelos atomicos
Modelos atomicos
 
Nymi- Latest Technology : Wear your Password on your Wrist (authentication us...
Nymi- Latest Technology : Wear your Password on your Wrist (authentication us...Nymi- Latest Technology : Wear your Password on your Wrist (authentication us...
Nymi- Latest Technology : Wear your Password on your Wrist (authentication us...
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Some important router commands

Router Commands Overview
Router Commands OverviewRouter Commands Overview
Router Commands Overview
Muhammed Niyas
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
Anabia Anabia
 

Similar to Some important router commands (20)

Ccna command
Ccna commandCcna command
Ccna command
 
Mod11
Mod11Mod11
Mod11
 
RIP (routing information protocol)
RIP (routing information protocol)RIP (routing information protocol)
RIP (routing information protocol)
 
How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)
 
cisco ccna cheat_sheet
cisco ccna cheat_sheetcisco ccna cheat_sheet
cisco ccna cheat_sheet
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheet
 
Cisco Commands
Cisco CommandsCisco Commands
Cisco Commands
 
Router Commands Overview
Router Commands OverviewRouter Commands Overview
Router Commands Overview
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
Lan Network with Redundancy.ppt
Lan Network with Redundancy.pptLan Network with Redundancy.ppt
Lan Network with Redundancy.ppt
 
Lan Network with Redundancy
Lan Network with RedundancyLan Network with Redundancy
Lan Network with Redundancy
 
Modes of router
Modes of routerModes of router
Modes of router
 
lab1
lab1lab1
lab1
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
 
Networking Lab Report
Networking Lab ReportNetworking Lab Report
Networking Lab Report
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

Some important router commands

  • 1. Some important commands, useful to protect your router from layesr 1 attacks.. Disable unused interfaces. Router (config)# interface Router (config-if)#shutdown 2.Turn off CDP Router (config)#no cdp run 3.Turn off Bootp Router (config)#no ip bootp server 4.Turn off small servers Router (config)#no service tcp-small-server Router (config)#no service udp-small-server 5.Turn off FTP server Router (config)#no ftp server enable 6.Turn off TFTP server Router (config)#no tftp server enable 7.Turn off NTP server. Router (config)#no ntp server 8.Turn off service pad Router (config)#no service pad 9.Turn off finger service Router (config)#no ip finger 10.Use complex password for snmp string and it must be configured as RO 11.SDM Use https only Router (config)#no ip http server Router (config)#ip http secure-server 12.For the untrusted interfaces Router (config)#interface Router (config-if)#no ip redirects
  • 2. Router (config-if)#no ip unreachables Router (config)#no ip source-route Router (config)#no ip domain look-up 13.Turn on keepalives. Router (config)#service tcp-keepalives-in Router (config)#service tcp-keepalives-out 14.Turn off gratuitous arps Router (config)#no ip gratuitous-arps 15.Turn off proxy arp Router (config)#interface (untrusted) Router (config-if)#no ip proxy-arp 16.Turn off ip directed broadcast. Router (config)#interface (untrusted) Router (config-if)#no ip directed-broadcast Some important commands, useful to protect your router from layesr 1 attacks. Disable unused interfaces. Router (config)# interface Router (config-if)#shutdown 2.Turn off CDP Router (config)#no cdp run 3.Turn off Bootp Router (config)#no ip bootp server 4.Turn off small servers Router (config)#no service tcp-small-server Router (config)#no service udp-small-server 5.Turn off FTP server Router (config)#no ftp server enable 6.Turn off TFTP server Router (config)#no tftp server enable 7.Turn off NTP server. Router (config)#no ntp server
  • 3. 8.Turn off service pad Router (config)#no service pad 9.Turn off finger service Router (config)#no ip finger 10.Use complex password for snmp string and it must be configured as RO 11.SDM Use https only Router (config)#no ip http server Router (config)#ip http secure-server 12.For the untrusted interfaces Router (config)#interface Router (config-if)#no ip redirects Router (config-if)#no ip unreachables Router (config)#no ip source-route Router (config)#no ip domain look-up 13.Turn on keepalives. Router (config)#service tcp-keepalives-in Router (config)#service tcp-keepalives-out 14.Turn off gratuitous arps Router (config)#no ip gratuitous-arps 15.Turn off proxy arp Router (config)#interface (untrusted) Router (config-if)#no ip proxy-arp 16.Turn off ip directed broadcast. Router (config)#interface (untrusted) Router (config-if)#no ip directed-broadcast