man ncat () - Network Config Audit Tool for IOS (and other) configs
NAME
ncat - Network Config Audit Tool for IOS (and other) configs
SYNOPSIS
ncat [OPTIONS] config [config ...]
DESCRIPTION
ncat reads a rules file (default /etc/ncat.conf) and checks one or more config files specified on the command line against rules found in the rules file. Rules specify that a particular chunk of text is either required or forbidden. Once all rules have been checked, a report is output listing violations.
There are some special features that apply if the file being checked is a CISCO IOS configuration. There are special rules (see below) that allow for parsing of per-interface and per-line configurations.
OPTIONS
- -r, --rules
- The CW--rules flag allows the specification of an alternate rules config file.
- -l, --limitrulesto
-
The CW--limitrulesto allows the commandline specification of a regular
expression to limit the rules that are checked. The name of the rule
must match the regexp specified or the rule is skipped. You might
try something like
--limitrulesto=finger
or--limitrulesto='finger\|syslog'
- -c, --limitclassto
-
The CW--limitclassto allows the command line specification of a regular
expression to limit the rules that are checked. The class of the rule
must match the regexp specified or the rule is skipped. You might
try something like
--limitclassto=access --limitclassto=localrules --limitclassto=access,logging,aaa --limitclassto='access\|logging\|local.*'
See the rules file for definition of rule classes. By default, only rules matching the class default are checked. all is synonym for .*. You can give a normal comma separated list of classes that you want to check because , is treated as a synonym for the regular expression or (|). - -p, --onlypass
- The CW--onlypass flag indicates flag indicates that only passing rules should be reported. It may not be combined with CW--onlyfail
- -f, --onlyfail
- The CW--onlyfail flag indicates flag indicates that only failing rules should be reported. It may not be combined with CW--onlypass
- -V, --version
- The CW--version option displays the current program version.
NCAT CONFIG FILE SYNTAX
The ncat config file or rules file (ncat.conf/ncat.conf.MASTER) contains four different types of information. Rules define rules to be checked, ConfigClass specifies groups of optional rules, ConfigLocal specified local configuration value, and ConfigGlobal specifies global configuration options.
Rules Syntax
The rules file contains a series of records defining rules to be checked. Each Record begins with RuleName:... field and continues until the next RuleName:.. field or end-of-file. Each record consists of a number of named fields. The fields begin with an alphanumeric keyword followed by a colon and then a value. Values may be continued across multiple lines by ending the line with a backslash (\). The following is the list of valid field names and permissible values. CW RuleName:unique rule name RuleClass:class[,class...] RuleVersion:regular-expression RuleContext:(Global,IOSInterface,IOSLine) RuleType:(Required|Forbidden) RuleMatch:regular-expression [RuleInstance:regular-expression] [RuleImportance:number] [RuleDescription:Text...] [RuleFix:Text...] where
* RuleName specifies a unique name for the rule.
* RuleClass specifies a class or classes to which the rule belongs. Every rule
is a member of the class "default" unless otherwise specified. A rule can
be a member of multiple classes. The list of member classes is a comma separated list.
* RuleVersion specifies a pattern that indicates which config file
version a rules applies to.
For example, if RuleVersion is "1[12].*" then the rule will apply
to all IOS 11 and 12 configurations.
* RuleContext lists the context of the rule. Possible values are
- Global - The rule must match anywhere in the config.
- IOSInterface - The rule must match in the context of an IOS interface definition
- IOSLine - The rule must match in the context of an IOS line definition.
* RuleType determines if the match should be required or forbidden
* RuleMatch specifies a regular expression to match within the given context.
* RuleInstance defines the instance of the rule that must match, for instance
"Serial0/0","Vlan\d+","vty", or "aux".
* RuleImportance specifies a number indicating the relative importance
of a rule. The higher the number, the more important it is.
* RuleDescription contains a description/justification of the rule.
* RuleFix contains text to be applied to make the config "correct"
* regular-expression is a Perl regular expression
* rules and values enclosed in "[...]" are optional.
Rules Example
Here is an example of a rules file
RuleName:enable secret
RuleClass:default,access
RuleVersion:version 1[12]\.*
RuleContext:Global
RuleType:Required
RuleMatch:enable secret \d \S+
RuleImportance:3
RuleDescription:Require enable secret.\
See rules.html#enablesecret for details.
RuleFix:enable secret EDIT-BY-HAND
RuleName:Apply VTY ACL
RuleClass:default,access
RuleVersion:version 1[12]\.*
RuleContext:IOSLine
RuleInstance:vty
RuleType:Required
RuleMatch: access-class 92 in
RuleImportance:2
RuleDescription:Require ACL 92 to be applied to VTYs\
See rules.html#ApplyVTYACL for details.
RuleFix:\
line vty 0 4\
access-class 92 in\
exit
RuleName:no ip directed broadcast
RuleClass:default,routing
RuleVersion:version 11\.*
RuleContext:IOSInterface
RuleInstance:.*
RuleType:Required
RuleMatch:no ip directed-broadcast
RuleImportance:2
RuleDescription:Disallow directed broadcasts by default.\
See rules.html#noipdirectedbroadcast for details.
RuleFix:\
int INSTANCE\
no ip directed-broadcast\
exit
In the above example, the rules have the following meaning
Rule 1 requires a global (anywhere in the config) rule matching
"enable secret" followed by a non-blank string.
Rule 2 requires that all vty lines have "access-class 92 in". It lists the commands
that need to be entered to add the rule.
Rule 3 requires that all Vlan interfaces have "no ip directed
broadcast" set and lists the commands needed to set it. This rule applies
only to IOS version 11.
Global Config Options Syntax and Example
In addition, there are several global rules file options: CW ConfigVersion:1.3 ConfigOrganization:My Organization ConfigDocumentType:Security Audit Rules ConfigPlatforms:Cisco IOS Routers ConfigFeedbackTo:me@my.org ConfigGuide:guide.pdf ConfigGuidePath:/usr/doc /usr/local/doc ~/doc ./doc ConfigRulesAlias:my-special-audit.html ConfigIntroText:Text (html)... ConfigTrailingText:Text (html)... ConfigOutputGroups:value [value ...] ConfigLineSkip:pattern[:pattern...] where
* ConfigVersion defines the version number of the rules
* ConfigOrganziation describes the auditing organization
* ConfigDocumentType describes the type of document (e.g. "rules", "benchmark"...)
* ConfigPlatforms describes the type of systems being audited ("production routers...")
* ConfigFeedback lists contact info (e.g "me@some.place.org")
* ConfigGuide defines the name of a "configuration guide" to be symlinked into
the directory where the audits are run. This is useful because it allows the
description portion of individual rules to make hyperlinks to a document
containing a more complete justification for the rule.
* ConfigGuidePath defines the path to search for the guide.
* ConfigLineSkip defines a list of one or more patterns that causes
checking to be skipped. The default is "^ shutdown".
* ConfigRulesAlias defines an alias for the rules.html file. A symlink
from this name to "rules.html" will be created.
* ConfigIntroText defines text (HTML) to be inserted before the list
of individual rules.
* ConfigTrailingText defines text (HTML) to be inserted after the list
of individual rules.
* ConfigOutputGroups specifies groups (such as datacenter names) by which
output is grouped in index.html. The groups are space separated and
are regular expressions. The regular expressions are matched against
the names of the configurations being checked.
These global rules file options are mostly used during report generation.
Local Configuration Options Syntax
ConfigLocal options allow the specification simple text substitution macros, i.e. a string that will be replaced with a given value. The syntax is In addition, there are several global rules file options: CW ConfigLocalName:KEY ConfigLocalValue:VALUE [ConfigLocalPrereqs:CLASS_NAME[,CLASS_NAME...]] [ConfigLocalDescription:COMMENT] where
* KEY is a keyword (e.g. "EternalInterface") that will
be replaced by VALUE in the resulting config file.
* VALUE is a value ("Ethernet0") that will be substituted.
* CLASS_NAME is a list of one or more classes to which use the option
* COMMENT is a description of the option
* comments may be continued across several lines by ending
each line to be continued with "\".
Local Configuration Options Example
Here is an example of a local configuration option:
ConfigLocalName:Local_Timezone
ConfigLocalValue:GMT
ConfigLocalClassPrereq:localtime
ConfigLocalDescription:\
Specify the name of the timezone to be used. For example, GMT,EST, etc.
In the above example, the fields have the following meaning
* ConfigLocalName specifies "Local_Timezone" as the name of the local option
* ConfigLocalValue specifies the value "GMT"
* ConfigLocalClassPrereq says that this option only applies if the class
"localtime" is selected (this sets the "local" timezone to "GMT")
* ConfigLocalDescription specifies text to describe the option
Optional Rule Class Syntax
The master file may also contain ConfigClass: rules, which describe groups of configuration options. ncat_config will prompt for inclusion/exclusion of classes ConfigClass: entries. They are of the form: CW ConfigClass:CLASS_NAME [ConfigClassConflictsWith:CLASS_NAME[,CLASS_NAME...]] [ConfigClassPrereq:CLASS_NAME[,CLASS_NAME...]] [ConfigClassDescription:COMMENT] . . . where
* CLASS_NAME is the name of the rule class. It should correspond to
one rules having the same value for RuleClass.
* COMMENT is a description of the option
* Comments may be continued across several lines by ending
each line to be continued with "\".
* ConfigClassClassPrereq: is a comma-separated list of classes
that are prerequisites of the class being defined
* ConfigClassConflictsWith: is a comma-separated list of classes
that are incompatible with this class.
Optional Rule Class Example
Here is an example of a rule class:
ConfigClass:2nd_External_Interface
ConfigClassPrereq:exterior_router
ConfigClassDescription:\
Define a second external interface.
In this example
* ConfigClass specified the name of the config class as "2nd_External_Interface"
* ConfigClassPrereq says that this rule only applies of the ruleclass
exterior_router is specified.
* ConfigClassDescription describes the purpose of the second ruleclass.
RETURN VALUE
0 - success >0 - some error occurred
FILES
/etc/ncat.conf - The rules file. a config file - At least one config file on the command line (required)
CAVEATS
Rules themselves may not contain colon (:) characters.
BUGS
Yes.
AUTHOR
George M. Jones <gmj@users.sourceforge.net>
CREDIT WHERE CREDIT IS DUE
John Stewart has helped with the code in numerous ways. It's much cleaner, and the install process is better thanks to his efforts. Rob Thomas collected and wrote an excellent baseline IOS 12 secure configuration which is used as the basis for the example ncat.conf. The first version of that config provided the ah ha insight that config checking can be simple and thus the impetus for the creation of this script. Eric Brandwine has written a much more elegant and complete config checker. Some of the features of this script are inspired by his work. In particular, the size and complexity of that program inspired the (at least initial) simplicity of this one. Joshua Wright did the port for ActiveState on Windows.