Hardening Guidelines
Hardening Guidelines
If you consider hardening the system, you should consider the following hardening guidelines:
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Security_Guide/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/pdf/security_hardening/Red_Hat_Enterprise_Linux-8-Security_hardening-en-US.pdf
Note
The above links reference external websites and Cisco is not responsible for keeping them up-to-date. They are provided for reference only. If you find that the content is outdated or if you cannot access the links, please contact the website owner for updated information.
- Disable or block the ports that are not used by Cisco Prime Access Registrar. The Prime Access Registrar documentation outlines the default port usage.
For a list of ports used by Prime Access Registrar, see the "Ports" section in the “Overview” Chapter of the Cisco Prime Access Registrar 9.3 Reference Guide. Note that some are defaults and may have been changed during install or configuration.
Feedback