HostedDB - Dedicated UNIX Servers

index_62
Router Security Configuration Guide UNCLASSIFIED 62 UNCLASSIFIED Version 1.0g Finger Server The IOS finger server supports the Unix ‘finger’ protocol, which is used for querying a host about its logged in users.  On a Cisco router, the show users command may be used to list the logged in users. Typically, users who are not authorized to log in to the router have no need to know who is logged in.  The example below shows how to test and disable the finger server. Central# connect 14.2.9.250 finger Trying 14.2.9.250, 79 ... Open Welcome to the CENTRAL router.     Line     User      Host(s)            Idle Location 130 vty 0             14.2.9.6       00:00:00 goldfish *131 vty 1             idle           00:00:00 central [Connection to 14.2.9.250 closed by foreign host] Central# config t Enter configuration commands, one per line.  End with CNTL/Z. Central(config)# no ip finger Central(config)# no service finger Central(config)# exit Central# connect 14.2.9.250 finger Trying 14.2.9.250, 79 ... % Connection refused by remote host Central#                          HTTP Server Newer Cisco IOS releases support web-based remote administration using the HTTP protocol.  While the web access features are fairly rudimentary on most Cisco router IOS releases, they are a viable mechanism for monitoring, configuring, and attacking a router.  If web-based remote administration is not needed, then it should be disabled as shown below. Central# config t Enter configuration commands, one per line.  End with CNTL/Z. Central(config)# no ip http server Central(config)# exit Central# connect 14.2.9.250 www Trying 14.2.9.250, 80 ... % Connection refused by remote host Central#          Web-based remote administration is useful primarily when intervening routers or firewalls prevent use of Telnet for that purpose.  However, it is important to note that both Telnet and web-based remote administration reveal critical passwords in the clear.  Further, web-based administration imposes the requirement that users log in at full (level 15) privilege.  Therefore, web-based remote administration should be