Cisco Ethernet switch Manuale Utente Pagina 77

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 84
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 76
777777
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Switch Management
¥ Management can be your weakest link
All the great mitigation techniques we talked about arenÕt worth much if the
attacker telnets into your switch and disables them
¥ Most of the network management protocols we know and love
are insecure (syslog, SNMP, TFTP, Telnet, FTP, etc.)
¥ Consider secure variants of these protocols as they become
available (SSH, SCP, SSL, OTP etc.), where impossible, consider
out of band (OOB) management
Put the management VLAN into a dedicated non-standard VLAN where
nothing but management traffic resides
Consider physically back-hauling this interface to your management
network
¥ When OOB management is not possible, at least limit access to
the management protocols using the Òset ip permitÓ lists on the
management protocols
¥ SSH is available on Cat 6K with CatOS 6.1 and Cat 4K/29XXG
with CatOS 6.3
Vedere la pagina 76
1 2 ... 72 73 74 75 76 77 78 79 80 81 82 83 84

Commenti su questo manuale

Nessun commento