Border Gateway Protocol or BGP, is a gateway protocol that enables the Internet to exchange routing information between AS or Autonomous Systems. It is used by Large Enterprise and Service Providers. Here are the recommended Best Security Practices that need to be implemented on your Juniper Routers. Authentication need to be set for all peering using MD5 set protocols bgp group <group_name> authentication-key <MD5 key> There are few supported authentication that you can use aes-128-cmac-96 Cipher-based Message Authentication Code (AES128)…
Tag: <span>best practice</span>
Here’s some Best practices that you can implement in Juniper devices in securing your SSH. 1.Remote access should be via SSH and telnet is disabled delete system services telnet 2. SSH should be version 2 or higher. Do not run v1 set system services ssh protocol-version v2 3. Configure Login Banner set system login message “\n*************************************************************************\n UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED\n\nYou must have explicit, authorized permission to access or configure this \ndevice.Unauthorized attempts and…
1.Remote access should be via SSH and telnet is disabled IOS-XR: no telnet ipv4 server Nexus OS: no feature telnet feature ssh feature tacacs+ 2. SSH should be version 2 or higher. Do not run v1. IOS-XR: ssh server v2 ssh server vrf management Nexus OS: ssh server v2 ssh server vrf management ssh timeout 60 3. Configure SSH logging IOS-XR: ssh server logging 4. Configure Login Banner IOS-XR: banner login ^C ************************************************************************* UNAUTHORIZED ACCESS TO…
Leave a Comment