PaSBat Logo

Security & Compliance Report

Network Topology

Network Topology

1. Introduction

This report summarizes the key findings from the analysis of network and system configurations, taking into account the relevant NIS2 and TISAX requirements. The configuration of NTP, password policies, syslog setups, and access lists are essential building blocks of a robust ISMS and are critical for compliance.

The network plays a pivotal role: as the "data backbone" of any organization, it largely determines how securely information can be transmitted, stored, and managed. A stable and well-secured network architecture forms the foundation for effective security measures and minimizes the risk of attacks or misconfigurations.

2. Findings Summary

  • Medium: 73
  • Warning: 51
  • Info: 52
  • High: 32
  • 3. Details per category

    NTP Timeserver Issues (71) (Click to expand/collapse)

    Device Issue Severity Recommendation Details
    MPLS-Core-FW3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-DR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-SW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW4 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site4-SW4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW7 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-FW2 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site4-FW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-DR4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-SW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-SW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-DR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-FW1 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site3-FW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW5 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-DR1 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site1-DR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW3 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site4-SW3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-FW1 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site1-FW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-FW2 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site2-FW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-FW1 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site4-FW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW1 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site4-SW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-FW2 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site1-FW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-AR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-AR3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-DR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-FW4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-DR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW8 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-DR2 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site1-DR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-R4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-DR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-R2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-AR4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-DR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-AR5 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-FW4 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site4-FW4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-AR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-SW3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-R3 No NTP server configured Warning Configure at least one external NTP server for time sync
    MPLS-Core-R3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-FW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-SW6 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-R1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-SW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-AR1 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site1-AR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    MPLS-Core-FW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-SW4 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site1-SW2 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site1-SW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-AR2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-FW3 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site4-FW3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-AR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-SW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site2-FW1 No NTP server configured Warning Configure at least one external NTP server for time sync
    Site2-FW1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site3-FW2 Only 1 NTP server(s) configured Info Add second NTP server for redundancy 4.4.4.4
    Site3-FW2 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-AR1 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client
    Site4-DR3 NTP authentication is not enabled Medium Enable 'ntp authenticate', define trusted-key, and match keys on server/client

    Password Policy Issues (48) (Click to expand/collapse)

    Device Issue Severity Recommendation Config_Line
    Site2-DR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-SW1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW4 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW7 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-FW2 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site2-SW2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-SW1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-DR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-FW1 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site4-SW5 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-DR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW3 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-FW1 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site2-FW2 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site4-FW1 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site4-SW1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-FW2 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site4-AR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-AR3 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-DR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-DR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW8 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-DR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    MPLS-Core-R4 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site2-DR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    MPLS-Core-R2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-AR4 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-DR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-AR5 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-FW4 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site3-AR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-SW3 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    MPLS-Core-R3 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-SW6 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    MPLS-Core-R1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-SW2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-AR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-SW4 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site1-SW2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site3-AR2 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-FW3 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site2-AR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site2-SW1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site2-FW1 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site3-FW2 ASA enable password without encryption High Use 'enable password encryption ' e.g. 'pbkdf2' enable password cisco encrypted
    Site4-AR1 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS
    Site4-DR3 Missing 'service password-encryption' (IOS) Warning Enable 'service password-encryption' on IOS

    Remote Access (Telnet/SSH) Findings (0) (Click to expand/collapse)

    Device Issue Severity Recommendation Config_Line

    IPSec / IKE Findings (30) (Click to expand/collapse)

    Device Issue Severity Recommendation Details
    Site4-FW2 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site4-FW2 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site4-FW2 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site3-FW1 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site3-FW1 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site3-FW1 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site1-FW1 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site1-FW1 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site1-FW1 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site2-FW2 ISAKMP / IPSec using MD5 Medium Use SHA-256 oder höher Regex found 'hash md5'
    Site2-FW2 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site2-FW2 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site4-FW1 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site4-FW1 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site4-FW1 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site1-FW2 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site1-FW2 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site1-FW2 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site4-FW4 ISAKMP / IPSec using MD5 Medium Use SHA-256 oder höher Regex found 'hash md5'
    Site4-FW4 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site4-FW4 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site4-FW3 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site4-FW3 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site4-FW3 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site2-FW1 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site2-FW1 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site2-FW1 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'
    Site3-FW2 ISAKMP / IPSec using SHA-1 Medium Use SHA-256 oder höher Regex found 'hash sha' oder 'hash sha1'
    Site3-FW2 ISAKMP / IPSec using DH group5 (1536-bit) Medium Use DH group14 oder höher (2048-bit) Regex found 'group 5'
    Site3-FW2 ISAKMP / IPSec lifetime abweichend (43200) Info Use lifetime 86400 (24h) oder passenden Wert laut Richtlinie Regex found 'lifetime 43200'

    ASA Failover Issues (5) (Click to expand/collapse)

    Device Issue Severity Recommendation Details
    Site3-FW1 ASA failover partially configured Info Verify 'failover lan unit' or 'failover interface' config
    Site2-FW2 ASA failover partially configured Info Verify 'failover lan unit' or 'failover interface' config
    Site4-FW1 ASA failover partially configured Info Verify 'failover lan unit' or 'failover interface' config
    MPLS-Core-FW1 ASA failover partially configured Info Verify 'failover lan unit' or 'failover interface' config
    Site2-FW1 ASA failover partially configured Info Verify 'failover lan unit' or 'failover interface' config

    VRF Usage Issues (0) (Click to expand/collapse)

    Device Issue Severity Recommendation Details

    Syslog & SNMP Issues (32) (Click to expand/collapse)

    Device Issue Severity Recommendation Config_Line
    Site2-DR2 Only one syslog server configured (IOS) Info Add second syslog server for redundancy trap
    Site3-SW1 Logging trap set to 'debugging' (IOS) Info Consider using 'warnings' or 'errors' to reduce log noise logging trap debugging
    Site4-SW4 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-SW7 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site2-SW2 No Syslog server configured (IOS) Warning Use 'logging host ' or 'logging ' to enable remote syslog
    Site2-SW2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site1-SW1 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-SW5 Logging trap set to 'debugging' (IOS) Info Consider using 'warnings' or 'errors' to reduce log noise logging trap debugging
    Site4-SW3 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site2-FW2 No Syslog server configured (ASA) Warning Use 'logging host ' or 'logging ' to enable remote syslog
    Site2-FW2 No 'logging trap' level set (ASA) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-SW1 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-SW2 No Syslog server configured (IOS) Warning Use 'logging host ' or 'logging ' to enable remote syslog
    Site4-SW2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-AR2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-AR3 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-DR1 Only one syslog server configured (IOS) Info Add second syslog server for redundancy trap
    Site4-SW8 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-AR4 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-AR5 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site3-AR1 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site3-SW3 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site4-SW6 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site3-SW2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site1-AR1 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    MPLS-Core-FW1 Logging trap set to 'debugging' (ASA) Info Consider using 'warnings' or 'errors' to reduce log noise logging trap debugging
    Site3-SW4 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site1-SW2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site3-AR2 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site2-AR1 No 'logging trap' level set (IOS) Info Configure 'logging trap ' e.g. 'logging trap warnings'
    Site2-SW1 Logging trap set to 'debugging' (IOS) Info Consider using 'warnings' or 'errors' to reduce log noise logging trap debugging
    Site4-AR1 Logging trap set to 'debugging' (IOS) Info Consider using 'warnings' or 'errors' to reduce log noise logging trap debugging

    Unused Services Issues (22) (Click to expand/collapse)

    Device Issue Severity Recommendation Config_Line
    Site2-DR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site3-DR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site1-DR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-AR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-AR3 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-DR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-DR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site1-DR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    MPLS-Core-R4 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site2-DR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    MPLS-Core-R2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-AR4 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site3-DR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-AR5 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site3-AR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    MPLS-Core-R3 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    MPLS-Core-R1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site1-AR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site3-AR2 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site2-AR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-AR1 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh
    Site4-DR3 Telnet access enabled on vty High Use SSH instead: 'transport input ssh' transport input telnet ssh

    Single Point of Failure Analysis (Click to expand/collapse)

    This section shows how many flows would be lost if a specific node failed (LostFlows). A value > 0 indicates a potential Single Point of Failure (SPOF).

    Good news: Not a single flow was lost – apparently no SPOF exists.

    NodeDown FlowsOkBefore FlowsOkAfter LostFlows

    Unused ACLs (40) (Click to expand/collapse)

    Structure_Type Structure_Name Source_Lines Is truly unused?
    extended ipv4 access-list UNUSED_ACL_2742 configs/MPLS-Core-FW3.cfg:[53, 54] Yes
    extended ipv4 access-list UNUSED_ACL_9 configs/MPLS-Core-R3.cfg:[31, 32, 33, 34] No
    extended ipv4 access-list UNUSED_ACL_4510 configs/MPLS-Core-R4.cfg:[31, 32] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site1-FW1.cfg:[43, 44, 45, 46, 47] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site1-FW1.cfg:[34, 35, 36, 37, 38, 39, 40, 41] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site1-FW2.cfg:[43, 44, 45, 46, 47] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site1-FW2.cfg:[34, 35, 36, 37, 38, 39, 40, 41] No
    extended ipv4 access-list UNUSED_ACL_3531 configs/Site1-FW2.cfg:[49, 50] Yes
    extended ipv4 access-list UNUSED_ACL_6472 configs/Site2-DR1.cfg:[40, 41, 42] No
    extended ipv4 access-list UNUSED_ACL_28 configs/Site2-DR2.cfg:[43, 44, 45, 46] No
    extended ipv4 access-list UNUSED_ACL_3798 configs/Site2-DR2.cfg:[40, 41] No
    extended ipv4 access-list UNUSED_ACL_5106 configs/Site2-DR2.cfg:[48, 49, 50, 51] Yes
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site2-FW1.cfg:[39, 40, 41, 42, 43] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site2-FW1.cfg:[33, 34, 35, 36, 37] No
    extended ipv4 access-list UNUSED_ACL_4633 configs/Site2-FW1.cfg:[45, 46] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site2-FW2.cfg:[41, 42, 43, 44, 45] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site2-FW2.cfg:[33, 34, 35, 36, 37, 38, 39] No
    extended ipv4 access-list UNUSED_ACL_1040 configs/Site2-FW2.cfg:[51, 52, 53] No
    extended ipv4 access-list UNUSED_ACL_2047 configs/Site2-FW2.cfg:[47, 48, 49] Yes
    extended ipv4 access-list UNUSED_ACL_6754 configs/Site3-AR2.cfg:[27, 28, 29, 30] No
    extended ipv4 access-list UNUSED_ACL_9685 configs/Site3-DR1.cfg:[52, 53] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site3-FW1.cfg:[42, 43, 44, 45, 46] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site3-FW1.cfg:[34, 35, 36, 37, 38, 39, 40] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site3-FW2.cfg:[43, 44, 45, 46, 47] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site3-FW2.cfg:[34, 35, 36, 37, 38, 39, 40, 41] No
    extended ipv4 access-list UNUSED_ACL_2309 configs/Site3-FW2.cfg:[49, 50] Yes
    extended ipv4 access-list UNUSED_ACL_7010 configs/Site4-AR1.cfg:[24, 25, 26] Yes
    extended ipv4 access-list UNUSED_ACL_5765 configs/Site4-AR3.cfg:[24, 25, 26, 27] No
    extended ipv4 access-list UNUSED_ACL_6157 configs/Site4-AR4.cfg:[24, 25] Yes
    extended ipv4 access-list UNUSED_ACL_3841 configs/Site4-DR2.cfg:[62, 63, 64] No
    extended ipv4 access-list UNUSED_ACL_4313 configs/Site4-DR3.cfg:[56, 57, 58] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site4-FW1.cfg:[43, 44, 45, 46, 47] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site4-FW1.cfg:[34, 35, 36, 37, 38, 39, 40, 41] No
    extended ipv4 access-list UNUSED_ACL_6435 configs/Site4-FW1.cfg:[49, 50, 51] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site4-FW2.cfg:[42, 43, 44, 45, 46] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site4-FW2.cfg:[34, 35, 36, 37, 38, 39, 40] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site4-FW3.cfg:[45, 46, 47, 48, 49] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site4-FW3.cfg:[34, 35, 36, 37, 38, 39, 40, 41, 42, 43] No
    extended ipv4 access-list ACL_DMZ_OUTSIDE configs/Site4-FW4.cfg:[43, 44, 45, 46, 47] No
    extended ipv4 access-list ACL_INSIDE_DMZ configs/Site4-FW4.cfg:[34, 35, 36, 37, 38, 39, 40, 41] No

    ACL Trace / Flow Analysis (0) (Click to expand/collapse)

    Node Filter_Name Flow Action Line_Content Trace

    4. Compliance Mapping (TISAX / NIS2)

    NTP Synchronization (TISAX requirement e.g. AL2.5 "Timestamp", NIS2 Art. 20/21): Precise and reliable time synchronization is essential for correct event logging and system integrity. Only in this way can security events be forensically correlated and cross-log analysis be performed accurately.

    Syslog Configuration (TISAX e.g. AL2.5 "Logging & Monitoring", NIS2 Art. 20/21): Central collection and analysis of log data supports both TISAX/ISMS and NIS2 (detection and reporting of incidents). Central syslog collection is also essential for tamper-proof long-term archiving of log data, ensuring traceability of when and where incidents occurred.

    Password Policies (TISAX AL2.1.x "Password Policies", NIS2 Art. 21 "Access Control"): Complex and enforced password policies are among the key requirements in TISAX and NIS2 regarding user and identity management. This includes minimum length, special characters, regular changes, lockout mechanisms, and multi-factor authentication (MFA) depending on risk.

    Access Lists (ACLs) (TISAX AL3 "Network Security Requirements", NIS2 Art. 21 "Segmentation"): ACLs provide segmentation and flow control within the network. Insufficient or incorrect ACL usage can create significant vulnerabilities. TISAX requires clear segmentation and access rules; NIS2 also demands adequate technical and organizational measures to protect infrastructures.

    Telnet vs. SSH (TISAX AL2.5 "Encryption in Transit", NIS2 Art. 20 "Cyber Hygiene"): Older, unencrypted protocols such as Telnet pose a major security risk. TISAX and NIS2 emphasize secure management access — i.e., SSH instead of Telnet. This ensures a basic level of encryption and protection against man-in-the-middle attacks.

    IPSec / VPN (TISAX AL2.5 or AL3.3 "Cryptography", NIS2 Art. 20/21): Secure VPN connections using IPSec (e.g., IKEv2 with strong algorithms such as AES-256 and DH Group14+) are essential to protect site-to-site or remote access communication. TISAX requires adequate encryption for data in transit; NIS2 requires effective measures against eavesdropping and tampering.

    Unused Services (TISAX AL2.x "Hardening", NIS2 Art. 20 "Cyber Hygiene"): Services or ports not needed should be consistently disabled. This minimizes the attack surface and makes it harder for attackers to exploit unnoticed vulnerabilities. Both TISAX and NIS2 require regular review and updating of system configurations to avoid security gaps.

    VRF Usage (TISAX AL3 "Network Separation", NIS2 Art. 21): Virtual Routing & Forwarding (VRF) enables logical separation of routing tables and instances. This is important when systems with different protection needs are operated. Incorrect configuration may create gaps; therefore VRF should be implemented in line with TISAX (AL3) and NIS2 segmentation requirements.

    SNMP Security (TISAX AL2.5 "Secure Management", NIS2 Art. 20): Legacy SNMP versions (v1, v2c) are insecure (e.g., plaintext community strings). TISAX and NIS2 demand modern secure protocols such as SNMPv3 (encryption, authentication) to prevent unauthorized access or manipulation.

    Single Point of Failure (SPOF) & Redundancy (TISAX AL2.10 or AL3.2 "Contingency Management", NIS2 Art. 21): In a highly available IT environment, potential SPOFs must be identified and eliminated wherever possible. TISAX requires emergency plans and redundancy concepts to ensure continued operation during failures. NIS2 also emphasizes appropriate measures for business continuity and resilience against disruptions.

    6. Extended Compliance Mapping (current ISO/IEC 27001:2022) (Click to expand/collapse)

    The following table shows how certain network and security categories map to requirements from the major standards and directives. For ISO/IEC 27001 and ISO/IEC 27002, the numbers from the new (2022) version have been used.

    Category ISO 27001:2022 (Annex A) ISO 27002:2022 NIS2 (*1) KRITIS (DE) TISAX (VDA-ISA) NIST (SP 800-53 / CSF) CIS Controls (v8) BSI IT-Grundschutz Note
    NTP Timeserver 8.17 (Clock Synchronization) 8.17 (Clock Synchronization) Art. 20, 21 (Detection, Logging) §8a (IT-SiG) / KritisV ISMS process (AL2?), e.g. "Timestamp" AU-8 (Time Stamps), CSF: DE.CM-7 (Monitoring) Control 8 (Audit Log Management) ORP.4 (Logging), SYS.1.1 Correct timestamps are essential for log correlation, forensics and events.
    Password Policies 5.7 (Identification & Authentication),
    possibly 5.9 (Use of Privileged Access)
    5.7 (Identification & Authentication),
    5.9 (Use of Privileged Access)
    Art. 21 (Access Control) §8a (Access, Authent.) AL2.1.3 or AL2.2.2 (Password Policies) AC-2 (Account Mgmt), IA-5 (Auth),
    CSF: PR.AC
    Control 5 (Account Management) ORP.1 (Policies), SYS.1.1 (Server) Complexity, length, lockout etc. minimize brute force and unauthorized sharing of access.
    Syslog Configuration 8.15 (Logging),
    8.16 (Monitoring activities)
    8.15 (Logging), 8.16 (Monitoring) Art. 20 (Logging), 21 §8a BSI-G (Log requirements) AL2.5 (Monitoring / Logging) AU-2, AU-3 (Logging),
    CSF: DE.AE
    Control 8 (Audit Log Management) ORP.4 (Logging) Centralized logging (e.g. Syslog) ensures integrity and simplifies evaluation.
    Telnet / SSH 5.35 (Use of Secure Communication Protocols) 5.35 (Use of Secure Comm. Prot.) Art. 20 (Basic Security Measures) §8a / KritisV AL2.5 (Encryption in transit) AC-17 (Remote Access),
    CSF: PR.AC
    Control 11 (Secure Config) NET.1.1 (Secure Management) SSH instead of Telnet (unencrypted) → Secure remote access.
    Access Lists (ACLs) 8.23 (Network Security) 8.23 (Network Security) Art. 21 (Segmentation, Protection) §8a / KritisV AL3: "Network Security Requirements" SC-7 (Boundary Protection),
    CSF: PR.PT
    Control 9 (Network Ports, Protocols) NET.1.1 (Routers/Switches) Restrict ports/protocols, segmentation, minimal access rights.
    IPSec / VPN 5.31 (Use of Cryptography),
    5.35 (Secure Comm)
    5.31 (Use of Cryptography),
    5.35
    Art. 20 (Cryptography), 21 §8a / KritisV AL2.5, AL3.3 (Cryptography Requirements) SC-13 (Cryptographic Prot.),
    CSF: PR.DS-2
    Control 14 (Encryption) CON.2 (Crypto concept), NET.1.1 Secure VPN connections, strong algorithm (AES256, SHA-2, DH Group14+).
    ASA Failover 5.29 (Redundancy of Information Processing) 5.29 (Redundancy of Information Processing) Art. 21 (Risk Management, Resilience) §8a BSI-G (Availability) AL3.2 (Contingency Plan?), AL2.10 (Redundancy) CP-2, CP-10 (Contingency, Redundancy),
    CSF: PR.IP-4
    Control 12 / 13 (Service Continuity) SYS.4.1 (High Availability Concepts) Failover & redundancy are important for availability and KRITIS requirements.
    Unused Services 8.9 (Configuration Management) 8.9 (Configuration Management) Art. 20 (Cyber Hygiene) §8a / KritisV AL2.x (Hardening?), Software Security CM-7 (Least Functionality),
    CSF: PR.IP-1
    Control 2 (Inventory/Control SW) or 11 (Secure Config) SYS.1.1 (Server), NET.1.1 Disable unused services, minimize attack surface.
    Unused ACLs 8.23 (Network Security) 8.23 (Network Security) Art. 21 (Network Security) §8a / KritisV AL3 (Network Security) SC-7 (Boundary Prot.),
    CSF: PR.PT-3
    Control 9 (Network Ports, ACL) NET.1.1, OPS.1.2 (Proper Operation) Remove unnecessary ACL rules, reduce complexity, clear documentation.
    VRF Usage 8.23 (Network Security) 8.23 (Network Security) Art. 21 (Segmentation) §8a / KritisV AL3 (Network Security, Separation) SC-7 (Boundary Prot.),
    CSF: PR.AC / PR.PT
    Control 9 (Limitation & Control) NET.1.1 (Network Components) Virtual Routing & Forwarding for logical separation (tenants, security zones, etc.).
    SNMP Security 5.35 (Use of Secure Comm Protocols) 5.35 (Use of Secure Comm Prot.) Art. 20 (Secure Network Protocols) §8a / KritisV AL2.5 (Encryption in transit) AC-17 (Remote Mgmt),
    CSF: PR.PT-3
    Control 9.4 (Limit Network Prot.) NET.1.1 (Network Components) SNMPv3 with Auth and Encryption, no SNMPv1/v2c – reduce MitM or sniffing risks.
    SPOF Analysis 5.29 (Redundancy) / possibly 5.30 (Resilience) 5.29 / 5.30 (Resilience) Art. 21 (Business Continuity) §8a / KritisV AL2.10 or AL3.2 (Contingency Management) CP-2, CP-10 (Contingency),
    CSF: ID.RA / PR.IP-9
    Control 12 / 13 (Resilience, depending on version) SYS.4.1 (High Availability), DER.3 (Incident Mgmt) Identify Single Points of Failure, minimize outage risk, redundancy strategy.

    (*1) Article references (Art. 20, Art. 21) refer to the NIS2 Directive (EU) 2022/2555.

    Note: This table uses the control numbers from ISO/IEC 27001:2022 and ISO/IEC 27002:2022. If your organization is still using the 2013 version, identifiers (A.x.x) will differ.

    ISO 27001 / ISO 27002

    ISO 27001 has become the "de-facto standard" for information security. Based on the ISO 27002 controls, technical measures such as logging, cryptography, or network segmentation can be evaluated. The configuration recommendations in this report (e.g., password security, use of ACLs) are essential for successful implementation of these controls.

    CIS Controls / CIS Benchmarks

    The CIS Controls provide a prioritized list of important cybersecurity measures (e.g., inventory, access control, monitoring). The CIS Benchmarks also contain very detailed hardening recommendations for systems such as Cisco IOS, ASA, Linux, or Windows. The results and recommendations from this report (e.g., for NTP, syslog, or password policies) can be directly applied to CIS guidelines and promote consistent best practice implementation.

    NIST SP 800-53 / NIST CSF

    The guidelines from the National Institute of Standards and Technology (NIST) are especially established in the US, but are also applied internationally. The NIST Cybersecurity Framework (CSF) (with its five functions "Identify", "Protect", "Detect", "Respond", and "Recover") covers both technical and organizational security requirements. The weaknesses highlighted in this report (e.g., insecure remote access or missing log monitoring) clearly fall within the "Protect" and "Detect" categories, emphasizing the need for action.

    BSI IT-Grundschutz (specific to Germany)

    For organizations in Germany, BSI IT-Grundschutz provides a binding framework for security measures. Network components are found in modules such as NET.1.1 (Routers & Switches) and SYS.1.1 (General Servers). Secure configurations (e.g., encrypted management access, service password-encryption) significantly contribute to achieving IT-Grundschutz goals.

    PCI DSS (when processing credit card data)

    In e-commerce, the Payment Card Industry Data Security Standard (PCI DSS) is of central importance. It prescribes strict rules for logging, network segmentation, patch management, and encryption to protect credit card data. The weaknesses identified in this report (e.g., open Telnet ports or unencrypted passwords) should be fixed as quickly as possible with PCI DSS in mind.

    HIPAA (Healthcare, US data protection)

    For healthcare organizations (e.g., hospitals or healthcare IT), HIPAA (Health Insurance Portability and Accountability Act) is especially relevant. Audit trails, access protection, and strong encryption standards are critical. Insecure remote connections or missing syslog configurations can quickly lead to violations in a HIPAA audit.

    Other industry-specific standards & Critical Infrastructure

    In addition, there are numerous other requirements, including:

    "Critical infrastructure" refers to infrastructures whose failure or impairment could cause lasting supply shortages or significant disruptions to public safety. Here, particularly high requirements apply to availability and stability of IT systems, including secure network architecture and a functioning ISMS.

    5. Recommendations & Conclusion

    To address the identified weaknesses and improve IT security, you should, among other things:

    With these measures you can better meet TISAX and NIS2 requirements while also considering other frameworks such as ISO 27001/27002, CIS Benchmarks, NIST CSF, BSI IT-Grundschutz, or KRITIS. A secure and optimally configured network significantly reduces the attack surface and represents a crucial element of any effective IT security strategy.