Cisco Ethernet switch Instrukcja Użytkownika Strona 77

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 84
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 76
777777
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Switch Management
¥ Management can be your weakest link
All the great mitigation techniques we talked about arenÕt worth much if the
attacker telnets into your switch and disables them
¥ Most of the network management protocols we know and love
are insecure (syslog, SNMP, TFTP, Telnet, FTP, etc.)
¥ Consider secure variants of these protocols as they become
available (SSH, SCP, SSL, OTP etc.), where impossible, consider
out of band (OOB) management
Put the management VLAN into a dedicated non-standard VLAN where
nothing but management traffic resides
Consider physically back-hauling this interface to your management
network
¥ When OOB management is not possible, at least limit access to
the management protocols using the Òset ip permitÓ lists on the
management protocols
¥ SSH is available on Cat 6K with CatOS 6.1 and Cat 4K/29XXG
with CatOS 6.3
Przeglądanie stron 76
1 2 ... 72 73 74 75 76 77 78 79 80 81 82 83 84

Komentarze do niniejszej Instrukcji

Brak uwag