Security Considerations White Paper for Cisco Smart Storage 1



Similar documents
Five Steps to Improve Internal Network Security. Chattanooga ISSA

Codes of Connection for Devices Connected to Newcastle University ICT Network

NAS 224 Remote Access Manual Configuration

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SonicWALL PCI 1.1 Implementation Guide

NetBrain Security Guidance

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Client logo placeholder XXX REPORT. Page 1 of 37

Management, Logging and Troubleshooting

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

SCP - Strategic Infrastructure Security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Penetration Testing with Kali Linux

Windows Operating Systems. Basic Security

Common Remote Service Platform (crsp) Security Concept

8 Steps For Network Security Protection

March

IBM Managed Security Services Vulnerability Scanning:

Network Security: Introduction

CTS2134 Introduction to Networking. Module Network Security

Vulnerability Assessment and Penetration Testing

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Network Management Card Security Implementation

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Cyber Essentials. Test Specification

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

IBM. Vulnerability scanning and best practices

M2M Series Routers. Port Forwarding / DMZ Setup

Topics in Network Security

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Cyber Security: An Introduction

RemotelyAnywhere. Security Considerations

Security. TestOut Modules

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

74% 96 Action Items. Compliance

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

INNOV-04 The SANS Top 20 Internet Security Vulnerabilities

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Medical Device Security Health Group Digital Output

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Hack Your SQL Server Database Before the Hackers Do

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Contents Notice to Users

WiPG Presentation Gateway

FileCloud Security FAQ

8 Steps for Network Security Protection

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

A Guide to New Features in Propalms OneGate 4.0

Avaya G700 Media Gateway Security - Issue 1.0

CYBERTRON NETWORK SOLUTIONS

Web Remote Access. User Guide

Executive Summary and Purpose

Sync Security and Privacy Brief

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

CRYPTUS DIPLOMA IN IT SECURITY

Description: Objective: Attending students will learn:

Global Partner Management Notice

Using a VPN with Niagara Systems. v0.3 6, July 2013

- Introduction to PIX/ASA Firewalls -

Achieving PCI-Compliance through Cyberoam

The Benefits of SSL Content Inspection ABSTRACT

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Ovation Security Center Data Sheet

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Internal Penetration Test

Securely manage data center and network equipment from anywhere in the world.

Best Practices for DanPac Express Cyber Security

Grandstream Networks, Inc. UCM6100 Security Manual

MN-700 Base Station Configuration Guide

Web Security School Final Exam

Firewall VPN Router. Quick Installation Guide M73-APO09-380

DiamondStream Data Security Policy Summary

How To Secure Your Data Center From Hackers

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.

Proof of Concept Guide

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

October P Xerox App Studio. Information Assurance Disclosure. Version 2.0

Setting Up Scan to SMB on TaskALFA series MFP s.

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Access Your Cisco Smart Storage Remotely Via WebDAV

HP IMC Firewall Manager

Configuring and Monitoring Bluecoat AntiVirus

Running a Default Vulnerability Scan SAINTcorporation.com

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

The Key to Secure Online Financial Transactions

GFI White Paper PCI-DSS compliance and GFI Software products

Tactical Exploitation the other way to pen-test. hdm / valsmith

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

The Self-Hack Audit Stephen James Payoff

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Transcription:

Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to provide file-based data storage services to other devices on the network. NAS can also be used to host web server, and other services (itunes, MySQL, PHP, web DAV, etc.). NAS uses protocols such as SMB/CIFS (Server Message Block/ Common Internet File System), NFS (Network File System), AFP (Apple Filing Protocol), and FTP (File Transfer Protocol). It is managed by HTTP/HTTPS and can be accessed remotely via SSH (Secure Shell). Despite its flexibility and cost benefits, deploying NAS over IP networks potentially exposes customer data to security risks. Like everything else in the IP infrastructure, the NAS must be protected from security vulnerabilities such as Denial of Service (DoS) and other malware attacks. In addition, Elevation of Privileges can also occur if guest s account is not managed properly. These security risks can result in data being stolen, corrupted, and applications not functioning properly. Because of its broad capabilities, unique security considerations must be addressed when deploying the NAS in your network. This document offers some security best practices and considerations when setting up the Cisco Smart Storage, so that these risks and vulnerabilities can be minimized. The following topics are included in this document: Typical NAS Deployments in an IP Network Introduction Hacker s Tools and Exploitations for NAS Security Best Practices and Considerations Cisco Smart Storage Security Configurations Conclusion Security Considerations White Paper for Cisco Smart Storage 1

Typical NAS Deployments in an IP Network The following illustrations show the NAS in three typical deployments. Figure 1 NAS in a DMZ (Direct Internet Connection) Deployment Internet WAN Cisco Smart Storage 279216 2 Security Considerations White Paper for Cisco Smart Storage

Figure 2 NAS in a LAN Deployment Internet LAN Cisco Smart Storage 279217 Figure 3 NAS in a WAN/LAN Deployment Internet Remote Management File Access to the NAS via FTP Port Forwarding (NAT Traversal) Enabled for Remote Management, FTP, etc. LAN Cisco Smart Storage 279218 Security Considerations White Paper for Cisco Smart Storage 3

Introduction The NSS 300 Smart Storage is a very flexible network resource that can be deployed in various environments: NAS servicing the public Internet. NAS exclusively servicing a closed LAN. NAS providing services to the public Internet from behind a router, firewall or gateway. NAS providing application service protocols. This section investigates several tools used to exploit security vulnerabilities in these various network environments. Some background is provided on the following network and system tools and how they are used to put your network at risk: Nessus Nikto Metasploit Framework Nmap Xprobe2 Amap Winfo Hping2 John the Ripper THC Hydra To harden your business network, the following recommendations can be implemented to minimize exposure to these vulnerabilities: Enable Password Strength Enforcement Disable unused process, applications, guest accounts Deploy FTP over SSL Disable Anonymous FTP Enable Network Access Protection Deploy SNMPv3 instead of SNMPv2 Deploy HTTPS for the administration functions Disable HTTP Deploy port forwarding from WAN to access LAN resources 4 Security Considerations White Paper for Cisco Smart Storage

Deploy VPN instead of port forwarding Enable WiFi security with WPA2/AES Remove Local Group = everyone on USB/eSATA Monitor the appropriate NSS logs for suspect behavior Utilize ACL to limit physical access to storage resources Details about security exploitation methodologies and best practices to prevent them can be found in detail in the next section, Hacker s Tools and Exploitations for NAS. Hacker s Tools and Exploitations for NAS These are some of the tools available for the hacker to use to exploit and identify security vulnerabilities for Network-attached storage. If the NAS is not properly secured, the end result can lead to loss of sensitive information (confidential company information, marketing strategies, etc.), correspondence (emails, contacts), or financial details. However, these risks can be minimized and the product can be secured by following the best security practices outlined in this document. Tools to identify web server vulnerabilities: - Nessus A vulnerabilities scanning tool. Hacker utilizes this tool to determine potential vulnerabilities of the NAS. This tool lists all of the potential vulnerabilities of the NAS. For example, the Apache server patch is not up-to-date, the server uses weak SSL ciphers, etc. - Nikto A web vulnerabilities scanner. This tool lists all of the potential security holes. For example, OpenSSL/0.9.8e appears to be outdated (current version should be at least 0.9.8g), etc. - Metasploit Framework A vulnerability exploitation tool. It is an advanced open-source platform for developing, testing, and using exploit code. Tools to identify open ports, services, and user accounts: - Nmap TCP/UDP ports scanning tool. Hacker utilizes this tool to determine open TCP/UDP ports on the device. For example, if FTP service is running on the NAS, the scan will indicate that TCP port 21 is open. Security Considerations White Paper for Cisco Smart Storage 5

- Xprobe2, Amap OS and application fingerprinting scanners. Hacker uses these tools to determine the version of the OS and the application version. Based on this information, the hacker can tailor the attack specific to the OS version or the application version. - Winfo Uses null sessions (guest account) to remotely retrieve information about user accounts, workstation/interdomain/server trust accounts, etc. - Hping2 A network probing utility. It is like ping on steroids. This tool is particularly useful when trying to do a traceroute, ping, or probe of a host behind a firewall. This often allows you to map out firewall rule sets. Tools to hack passwords: - John the Ripper A powerful, flexible, and fast multi-platform tool for cracking password hash. It s primary purpose is to detect weak UNIX passwords. It supports several crypt(3) password hash types which are most commonly found on various UNIX flavors, as well as Kerberos AFS and Windows NT/2000/XP hashes. - THC Hydra A fast network authentication cracker. It can perform brute force attacks or rapid dictionary attacks against more than 30 protocols, including telnet, FTP, HTTP, HTTPS, SMB, etc. Figure 4 shows a log of an attacker s usage of known logins and passwords. Figure 4 Log of Hacker Utilizes Hydra to Determine the Password 6 Security Considerations White Paper for Cisco Smart Storage

Figure 5 An Example of Hydra at Work (Hacking Password for FTP) A typical network hack includes a user running a network scanning tool such as nmap to determine the open TCP/UDP ports. After the open TCP or UDP ports are identified, the hacker then runs the THC Hydra tool, using a list of known passwords or dictionary attacks method to determine the password. A more sophisticated hacker can utilize a tool such as winfo that can quickly scan the list of user accounts on the system ( Figure 7) based on guest access. After determining the open ports and a list of user accounts, the hacker then customizes the attacks based on this information (i.e. brute force attacks or dictionary attacks to determine the passwords). It is almost impossible to prevent all of the possible attacks and make the system usable. However, by employing some of the security considerations outlined in Security Best Practices and Considerations, these vulnerabilities are minimized. Security Best Practices and Considerations Security Best Practices The following is a list of best practices that help to safeguard the NAS from hackers. Some of these are deployment model specific. Please see Deployment Model Specific Security Considerations, page 12 for more information. Security Considerations White Paper for Cisco Smart Storage 7

1. Enable Password Strength Enforcement This makes it harder for the attacker to crack the password. The strong password should utilized these rules: a. The new password contains characters from at least three of the following classes: lower case letters, upper case letters, digits, and special characters. b. No character in the new password may be repeated more than three times consecutively. c. The new password must not be the same as the associated username or the username reversed. d. The new password must not be cisco, ocsic, or any variant obtained by changing the capitalization of letters therein, or by substituting 1 or! for i, and/or substituting 0 for o, and/or substituting $ for s. For example, test123 or mom s birthday are not strong passwords. A strong password should be something like am2z!ng6 or ApD@th!nG. 2. Turn off unused processes and applications. This will minimize the exposure to unnecessary security vulnerabilities. Currently, the NAS supports services and applications such as AFP (Apple Filing Protocol), telnet, SSH, SNMP, FTP, Web Server, Web File Manager, Multimedia Station, itunes Service, and MySQL Server. For the user s protection, with the exception of SSH and Web File Manager, these services and applications are disabled by default. The idea is to only enable services and applications on an as needed basis. Users who don t need CLI access should disable SSH too. 3. Use FTPS instead of FTP FTP over SSL is more secure than FTP. 4. Turn off Anonymous FTP. 5. Enable System Connection Logs Periodically checking the logs will help determine unauthorized users and the IP addresses of violators. 8 Security Considerations White Paper for Cisco Smart Storage

Figure 6 Cisco Smart Storage Logs of Violator s Addresses 6. Enable Network Access Protection This automatically blocks the IP address of the violator and can be customized (block for a fixed duration or ban for life). Figure 7 Cisco Smart Storage Built-in Network Access Protection (Violator s IP Address is Blocked From Accessing the System) 7. If possible use SNMPv3 instead of SNMPv2 SNMPv3 is more secure because it uses stronger Digest algorithms such as MD5 and SHA for authentication and encryption. Security Considerations White Paper for Cisco Smart Storage 9

8. Disable Guest Account in all default shares (Public, Multimedia, etc.) This helps to prevent Elevation of Privileges attack. Figure 8 shows the example of using guest (null session) to determine the NAS system information (i.e. user accounts, shares, password policy information, etc.) Figure 8 Usage of Guest Account to Retrieve the System Information 9. Use HTTPS and disable HTTP HTTPS is more secure and offers stronger encryption and authentication methods. HTTPS refers to the administrator UI. 10. Use a router with port forwarding to allow access to a specific TCP/UDP port. Disable all other TCP/UDP ports (this provides an additional level of protection). VPN is more secure than using port forwarding and should be used if available. 10 Security Considerations White Paper for Cisco Smart Storage

Figure 9 Example of Port Forwarding On the Cisco Small Business Router 11. If WiFi is enabled in your network, ensure that the wireless network is secured with WPA2 with AES. 12.By default, all the external USB and esata disks have Local Group=everyone assigned as Read only. If your USB or esata contains sensitive information then consider removing the Local Group=everyone on these shares. 13.Monitor the system log regularly for Access Violation and take action if necessary. Block the IP address from accessing the system via IP Filtering. 14.Utilize white list and black list types of Security Level Access Control. White list is preferable because it is safer to only allow certain IP addresses, rather than allowing every IP address except those on the back list. Figure 10 Example of White List Access Control Security Considerations White Paper for Cisco Smart Storage 11

Figure 11 Example of Black List Access Control Deployment Model Specific Security Considerations Depending on the method of deployment, the security considerations for the NAS fall into one of these categories: Security considerations when the NAS is connected directly to the public Internet ( Figure 1). Security considerations for the NAS with LAN only access ( Figure 2). Security considerations when the NAS is accessible from the Internet via port forwarding on the router ( Figure 3). Security considerations when running services on the NAS (web server, MySQL server, etc.) Security Considerations When the NAS is Connected Directly to the Public Internet This is the case where the user wants to have easy access to the files on the NAS from anywhere that has Internet access. Figure 1 shows this type of deployment. The access methods are either by FTP, SMB/CIFS or Web File Manager. In this configuration, the NAS is open to the public and most vulnerable to DoS and security hacks. To minimize these threats, please consider the following: Use and enforce complex passwords for admin and user accounts. Disable telnet and SSH. 12 Security Considerations White Paper for Cisco Smart Storage

Enable FTPS instead of FTP. Also, verify that Anonymous FTP is not enabled Disable guest access on Network Share > Public. Enable Web File Manager and access the files on the NAS through a HTTPS connection. Enable Connection Log and Network Access Protection. Monitor the connection log regularly. Disable all Network Services and Applications that are not absolutely essential. In particular, the MySQL Server and Web Server applications should only be enabled if absolutely necessary in this configuration. Recommend limiting the exposure of the NAS in a DMZ to an environment using a dedicated router/firewall to minimize potential service disruption to the NAS device. Security Considerations for the NAS with LAN Only Access This is the most common and secure way for small businesses and households to deploy the NAS. Figure 2 shows this type of deployment. In this configuration, the NAS can be used as a file server or Media server. It is well shielded from the public Internet threats. In this configuration, consider employing the following: Use and enforce complex passwords for admin and user accounts. Verify that the LAN is not connected to the wireless gateway. If it is WiFi accessible, ensure that the wireless network is secured with WPA2 with AES. Enable Connection Log and Network Access Protection. Trojan horses, worms, and viruses are other forms of security threats. In any environment, it is very important to have adequate anti-virus protection software. Security Considerations When the NAS Is Accessible From the Public Internet Via Port Forwarding On the Router In this configuration, the NAS is deployed in a private LAN environment and can be accessed securely from the public Internet. Since it is exposed to the public Internet, the NAS is vulnerable if it is not properly configured. To minimize these security vulnerabilities, the following considerations are recommended: If VPN access will meet your needs, use that instead because it is more secure. Security Considerations White Paper for Cisco Smart Storage 13

Use and enforce complex passwords for admin and user accounts. If supported, enable DoS protection on the router. Define Access Control List (ACL) on the router or the NAS. The user can either define a list of allowable IP addresses (white list) or a list of prohibited IP addresses (black list). This way, access to the NAS is controlled. Enable only FTPS (Disable FTP and anonymous FTP) for remote file access. For remote management of the NAS, enable HTTPS and disable HTTP. Monitor the access log on the router and the NAS regularly for unauthorized accesses. Security Considerations When Additional Services Are Running On the NAS (Web Server, MySQL, Media Server, etc.) The NAS has a capability of hosting a web server and other services such as MySQL, media servers (itunes Service, Multimedia Station, UPnP Media server). Because of this, the NAS introduces some unique security considerations that must also be addressed: Use and enforce complex passwords for admin and user accounts. Use a separate NAS for hosting the web server and/or Media Server. This way, if the security of the web server is compromised, the critical data is protected. Backup your web server data on a regular basis. This way, if something happens to the web server, it can always be restored. NOTE The Cisco Smart Storage offers secure remote replication for backing up data from one Smart Storage to another Smart Storage system. If your server uses MySQL to keep track of transactions, consider the following: - Change the default password for root account from admin and enforce the complex password rule on the new password. - Enforce the complex password on all user accounts. - Assign appropriate database access privilege levels (insert, add, drop, view, create, execute, etc.) to individual users. - Create a Client Access Control List for admin/root account. For example, only known list of IP addresses can access the database as root. 14 Security Considerations White Paper for Cisco Smart Storage

Use HTTPS, when accessing phpmyadmin for MySQL configurations. NOTE The Cisco Smart Storage enables HTTPS for phpmyadmin access by default. Enable Access Control and monitor the access log regularly. Cisco Smart Storage Security Configurations Enable Password Strength Enforcement To enable password strength enforcement: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 NOTE Choose Administrator > General Settings from the Navigation menu. The General Settings window opens. Select the PASSWORD STRENGTH tab. Check the appropriate password enforcement. Cisco offers the flexibility of four levels of password strength enforcements. Click Apply. This should be done when the system is first configured. Please remember that the password strength enforcements are enforced for all new users and not on previously configured users. Security Considerations White Paper for Cisco Smart Storage 15

Figure 12 Password Enforcement Configuration Disable Telnet and/or SSH To disable Telnet or SSH: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 Choose Network Services > Telnet/SSH from the Navigation menu. The Telnet/ SSH window opens. Uncheck the Allow Telnet check box. This is unchecked by default Uncheck the Allow SSH check box. Click Apply. 16 Security Considerations White Paper for Cisco Smart Storage

Figure 13 Disable Telnet/SSH Enable FTPS (Anonymous FTP Is Disabled By Default) To enable FTPS: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 NOTE Choose Network Services > FTP Service from the Navigation menu. The FTP Service window opens. Uncheck the FTP Standard check box and check FTP with SSL. Use the default values for all other parameters. Click Apply. To access the system that is configured only for FTPS, the user also needs to set the FTP client to FTPS (explicit). Security Considerations White Paper for Cisco Smart Storage 17

Figure 14 FTP Configuration Enable System Connection Logs To enable system connection logs: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 STEP 7 Choose Administration > System Log Settings from the Navigation menu. The System Logs window opens. Select the SYSTEM CONNECTION LOGS tab. Click Options and check all connection types to be logged (HTTP, FTP, Telnet, SSH, AFP, SAMBA, iscsi). Check and select the Network Share to save the log file. The default share is Download. Click APPLY. Click Start Logging to start the log process. 18 Security Considerations White Paper for Cisco Smart Storage

Figure 15 Connection Login Configuration Security Considerations White Paper for Cisco Smart Storage 19

Enable Network Access Protection To enable network access protection: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Choose Administration > Security from the Navigation menu. The Security window opens. Select the NETWORK ACCESS PROTECTION tab. Check the Enable Access Protection check box. Check the desired Network Protocols and select the desired access protection parameters. For example, allowable unsuccessful attempts and blocked duration (5 minutes, 30 minutes, 1 hour, 1 day, or forever). Click APPLY. Figure 16 Network Access Protection Configuration 20 Security Considerations White Paper for Cisco Smart Storage

Enable SNMPv3 To enable SNMPv3: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Choose Network Services > SNMP Settings from the Navigation menu. The SNMP Settings window opens. Check the Enable SNMP Service check box and select the SNMP Version to be SNMPv3. If the Use Authentication method is used, check this box and enter the Authentication Protocol (HMAC-MD5 or HMAC-SHA). If the Use Privacy Method is used, check this box and enter the Privacy Password. Click Apply. Figure 17 SNMP Configuration Security Considerations White Paper for Cisco Smart Storage 21

Disable Guest Access on Network Default Shares To disable guest access on the network default shares: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 Choose Administration > Network Share > Share Folders from the Navigation menu. The Share Folders window opens. For each of the Default Network Shares (Multimedia, Public, etc.) do the following: a. Click on Access Control (the hands shake icon under the Action tab). b. Select Deny Access for Guest Access Right. c. Click APPLY. Figure 18 Access Right Configuration 22 Security Considerations White Paper for Cisco Smart Storage

Use HTTPS and disable HTTP To disable HTTP and use HTTPS: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 NOTE Choose Administration > General Settings from the Navigation menu. The General Settings window opens. Select the SYSTEM ADMINISTRATION tab. Check the Force secure connection (SSL) only check box. Click APPY. After enabling the Force secure connection (SSL) only option, the web Administration can only be connected via HTTPS. Figure 19 HTTP/HTTPS Configuration Security Considerations White Paper for Cisco Smart Storage 23

Figure 20 Example of HTTPS Access Security Level Configuration To configure the security level: STEP 1 Log in to the NAS by opening a web browser and entering the IP address of the NAS device. It is important to include the port 8080 following the IP address. For example: http://<nas IP address>:8080 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 STEP 7 Choose Administration > Security from the Navigation menu. The Security window opens. Select High if you want to implement a white list type of access. Select Medium if you want to implement a black list type of access. Click + and enter the IP Address to the list. Click Create. Click APPLY. 24 Security Considerations White Paper for Cisco Smart Storage

Figure 21 Security Level Configuration Conclusion You can t outrun the Bear but there are ways to avoid being eaten. One is to be faster than the guy next to you. The other is to make it difficult and not worth the effort for the bear to chase you. In either case, you have to do something. It is difficult to render the system bullet-proof from hackers and attacks without effecting the system usability and accessibility. The key is to consider the tradeoffs very carefully between the convenience and utility of enabling WAN based access to the NAS, and various services (MySQL, Web Server, etc.) versus the security risks. If improperly assessed, the end result can lead to loss of sensitive information (confidential company information, marketing strategies, etc.), correspondence (emails, contacts), or financial details. Cisco, Cisco Systems, the Cisco logo, and the Cisco Systems logo are registered trademarks or trademarks of Cisco and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1002R) 2010 Cisco Systems, Inc. All rights reserved. OL-23025-01 Security Considerations White Paper for Cisco Smart Storage 25