Configure a Time Zone Details Timezones are a source of contention in larger corporations. On one hand, if infrastructure is configured with time consistent...
Configure at least 3 external NTP Servers – ntp server Details Accurate time is a critical piece of security infrastructure. Without accurate time on all infrastructure, it is complex or...
Configure at least 3 external NTP Servers – ntp source-interface Details Accurate time is a critical piece of security infrastructure. Without accurate time on all infrastructure, it is complex or...
Configure BGP to Log Neighbor Changes Details Logging changes to the BGP peering relationships is recommended. Any logged changes will in the best case indicate a...
Configure Control Plane Policing Details Control Plane Policing is used to create a set of policies governing specific traffic. Normally this limits the volume...
Configure EIGRP log-adjacency-changes Details Logging changes to the EIGRP peering relationships is recommended. This setting is enabled by default. Rationale: Any logged changes...
Configure EIGRP Passive interfaces for interfaces that do not have peers Details EIGRP both listens on and advertises on all interfaces that have IPs in subnets that are defined as ‘networks’...
Configure HSRP protections – hsrp version 2 Details HSRP is a valuable redundancy protocol, but like many protocols discussed in this document can be attacked and compromised....
Configure HSRP protections – interface md5 Details HSRP is a valuable redundancy protocol, but like many protocols discussed in this document can be attacked and compromised....
Configure Logging Timestamps Details Timestamps are incredibly important since they drive a number of important activities in our product. Most importantly, we use...