Preventing Unauthorized Configuration Modifications
Problem
You want to ensure that only authorized devices can use SNMP and TFTP to send or receive configuration information.
Solution
You can use thesnmp-server tftp-server-list configuration
command
to restrict which TFTP servers the
router can use in response to an SNMP trigger to upload or download
configuration information:
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#access-list
92
permit
Router(config)#
172.25.1.1
access-list
92
deny
any
log
Router(config)#snmp-server tftp-server-list
Router(config)#
92
snmp-server community
ORARW
rw
Router(config)#end
Router#
Begin with IOS Version 12.3(2)T; support for standard named access lists was added:
Router2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router2(config)#ip access-list standard
Router2(config-std-nacl)#
TFTPACL
permit
Router2(config-std-nacl)#
172.25.1.1
deny any log
Router2(config-std-nacl)#exit
Router2(config)#snmp-server tftp-server-list
Router2(config)#
TFTPACL
snmp-server community
ORARW
rw
Router2(config)#end
Router2#
Discussion
By default, the router will send or receive configuration information to any TFTP server. But this can be dangerous because the SNMP request that triggers these transfers cannot be 100 percent protected. Recipe 17.6 showed how you can restrict SNMP access to a specified list of devices. But because SNMP uses UDP, it is not difficult for a malicious user to ...
Get Cisco IOS Cookbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.