Enterasys ANG-3000 Guide de l'utilisateur Page 349

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 414
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 348
XSR Users Guide 315
Chapter 13 General Security Precautions
Configuring Security on the XSR
The attacker does not send any other packet, and the state machine of the host
remains in CLOSE_WAIT state until the keep-alive timer resets it to the
CLOSED state. To protect against this attack the XSR checks for TCP packets
with both SYN and FIN flags set. With protection always enabled, these
packets are harmlessly dropped.
This feature is supported for packets destined for the XSR. Transit packets
will be checked.
General Security Precautions
To ensure security on the XSR, we recommend you take these precautions:
Limit physical access
Avoid connecting a modem to the console port
Download the latest security patches
Retain secured backup copies of device configurations
Plan all configuration changes and prepare a back-out procedure if
they go wrong
Keep track of all configuration changes made to all devices
Create a database that tracks the OS version, description of last
change, back-out procedure, and administrative owner of all routers
Avoid entering clear text passwords in the configuration script
Be sure to change all default passwords
Use strong passwords not found in the dictionary
Change passwords when the IT staff departs
Age passwords after 30 to 60 days
Grant the correct privilege levels to particular users only
Set reasonable timeouts for console and remote management sessions
If you must enable PPP on the WAN, use CHAP authentication
Disable all unnecessary router services (e.g., HTTP, if not used)
Write strict ACLs to limit HTTP, Telnet and SNMP access
Write ACLs to limit the type of ICMP messages
Vue de la page 348
1 2 ... 344 345 346 347 348 349 350 351 352 353 354 ... 413 414

Commentaires sur ces manuels

Pas de commentaire