cc/td/doc/product/rtrmgmt/cw2000/cw2000_d/2steditn
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Understanding CiscoWorks2000 Security

Understanding CiscoWorks2000 Security

The CiscoWorks2000 Server software provides some of the security controls necessary for a web-based network management system, but also relies heavily on the end user's own security measures and controls to provide a secure computing environment for CiscoWorks2000 applications. The CiscoWorks2000 Server provides and requires three levels of security to be implemented to ensure a secure environment:

The following sections describe the general and server security levels. Application security levels are described in the "Setting Up the CiscoWorks2000 Server" chapter.

General Security

The CiscoWorks2000 Server provides an environment that allows the deployment of web-based network management applications. Web access provides an easy-to-use and easy-to-access computing model that is more difficult to secure than the standard computing model that only requires a system login to execute applications.

The CiscoWorks2000 Server also provides security mechanisms (authentication and authorization) used to prevent unauthenticated access to the CiscoWorks2000 Server and unauthorized access to CiscoWorks2000 applications and data. However, CiscoWorks2000 applications can change the behavior and security of your network devices. Therefore, it is critical to limit access to applications and servers as followed:

Server Security

The CiscoWorks2000 Server uses the basic security mechanisms of the operating system to protect the code and data files that reside on the server. The following CiscoWorks2000 Server security control elements apply:

Server-Imposed Security

The CiscoWorks2000 Server has many dimensions:

Files, File Ownership, and Permissions

Caution Do not change the user bin password. If you change it, some important CiscoWorks2000 services will not operate correctly.

The CiscoWorks2000 Server uses the password but the bin user is never intended as a general user of the Windows NT system. No user is ever required to log on the Windows NT system as bin. All files and directories are owned by the user bin. Read and write access are restricted to the user bin and the administrator. Temporary files are created as the user bin with permissions set to read-write for the user bin. The CiscoWorks2000 Server relies on the security mechanisms of the NTFS filesystem to provide access control on Windows NT systems. If CiscoWorks2000 is installed on a FAT filesystem, most security assumptions made about controlled access to files and network management data are not valid.
Runtime
All back-end processes are executed with a umask value of 027, which means that all files created by these programs are created with permissions equal to "rwxr-x," with an owner and group of the user ID and group of the program that created it. Typically this will be "bin" and "group=bin."
CiscoWorks2000 foreground processes (typically cgi-bin programs or servlets) are executed under the control of the web server's children processes or the servlet engine which all run as the user bin.
CiscoWorks2000 uses standard UNIX tftp and rcp services. CiscoWorks2000 also requires that user bin have access to the directories that these services read and write to.
The CiscoWorks2000 Server must allow the user bin to run "cron" and at jobs to enable the Resource Manager Essentials Software Management application to run image download jobs.
These processes include:

  • Daemon manager

  • Web server

  • Servlet engine

  • Rcp/rsh service

  • Tftp service

  • Corba service

  • Database engine

CiscoWorks2000 foreground processes (typically cgi-bin programs or servlets) are executed under the control of the web server and the servlet engine which all run as the user localsystem. The localsystem user has special permissions on the local Windows NT system but has no network permissions.
CiscoWorks2000 provides several services for RCP, TFTP communication with devices. These services are targeted for use by CiscoWorks2000 applications, but can be used for purposes other than network management.
The CiscoWorks2000 Server uses the at command to run software update jobs for the Resource Manager Essentials Software Image Manager application. Jobs run by the at command run with system level privileges.
Remote Connectivity
Access to Systems Other Than the CiscoWorks2000 Server
Access Control

System Administrator-Imposed Security

To maximize CiscoWorks2000 Server security, follow these security guidelines:


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Apr 5 14:48:00 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.