Network Security
Network WLAN AP-NIPR Platform Recomendations for Department of Defense
- WLAN must use EAP-TLS.
- The WLAN inactive session timeout must be set for 30 minutes or less.
- The site must conduct continuous wireless Intrusion Detection System (IDS) scanning.
- Wireless access points and bridges must be placed in dedicated subnets outside the enclave’s perimeter.
- The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.
- The network device must not be configured to have any feature enabled that calls home to the vendor.
- WLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.
- WLAN components must be FIPS 140-2 or FIPS 140-3 certified.
- WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.
- WLAN SSIDs must be changed from the manufacturer’s default to a pseudo random word that does not identify the unit, base, organization, etc.
- WLAN signals must not be intercepted outside areas authorized for WLAN access.
OpenSSl WPA2-Enterprise with FreeRadius
WLAN access point policy The site will conduct continuous wireless IDS scanning. Note: This requirement applies to all DoD sites that operate DoD computer networks, including sites that have no authorized WLAN systems.
Network Security Requirements Guide
Network Infrastructure Policy Security Technical Implementation Guide
Network Devices Security Technical Implementation Guide
Firewall
Linux and FreeBSD Firewalls
Firewall Security Requirements Guide
Firewall Security Technical Implementation Guide
SNMP
SNMP Messages (protocol data units)
Requests and responses exchanged between the SNMP manager (Get, GetBextm GetBuld, Set) and the SNMP agents (Trap, Response, Inform).
- Trap: A trap is an alert message—for example, a trap might alert the SNMP manager to the failure of a device. SNMP trap monitoring is crucial, as it notifies you of issues so you can address them proactively.
- Get: This is a basic information request. A Get message is the main way the SNMP manager gets information from an agent.
- GetNext: As the name implies, a GetNext message sends for the next segment of information.
- GetBulk: This lets the SNMP manager request an array of information via a sequence of GetNext requests, meaning a bigger segment of the MIB can be queried.
- Set: Set messages allow the SNMP manager to give agent instructions regarding changes to settings on a monitored device.
- Response: The response is simply the reply from the agent, acknowledging the request.
- Inform: This is the SNMP manager’s version of the response message, acknowledging receipt of a trap.
SNMP uses the UDP
port 161
of the SNMP Agent for sending and receiving requests. On the other hand, SNMP uses also port 162
of the SNMP Manager for receiving traps from managed devices.
An Introduction to SNMP (Simple Network Management Protocol)
SNMP Community Strings
SNMP v2 vs v3
SNMP v3
How to enable SNMP on your operating system
Securing SNMP
SNMP Tutorial
SNMP Command Examples Oracle
Awesome SNMP Github
SNMP Monitoring Tools