04.11.2014 Views

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Network</strong> Security Issues<br />

C Security Issues<br />

A second line of defense can be thought of as damage control — how to limit the<br />

amount of damage that can be done if someone does gain unauthorized access to the<br />

system? Damage control can be provided by application restrictions.<br />

Each of these control methods is described below.<br />

Access control —<br />

network topology<br />

<strong>Network</strong> topology refers to how the DEFINITY <strong>ECS</strong> network is connected to the<br />

customer’s network.<br />

Private network<br />

One option to restrict access is to make sure that the DEFINITY <strong>ECS</strong> network is not<br />

connected to any other network; that is, the DEFINITY <strong>ECS</strong> network is private. This<br />

topology clearly solves all three access security concerns mentioned above. However,<br />

a private network is not an option <strong>for</strong> all customers.<br />

Private segment<br />

Another topology is to put the DEFINITY <strong>ECS</strong> network on a private segment, behind<br />

a router or a firewall. This approach can also solve all three concerns above by<br />

implementing packet filtering in the router/firewall such that only legitimate traffic<br />

can pass through.<br />

Open network<br />

One other topology that may be chosen is a <strong>com</strong>pletely open network, where<br />

DEFINITY <strong>ECS</strong> nodes are placed on the customer network just like any other piece<br />

of data networking equipment. An open network topology addresses none of the three<br />

security concerns above, and other methods of access control must be used <strong>for</strong> these<br />

installations.<br />

Access control —<br />

network administration<br />

Access control —<br />

authentication<br />

<strong>Network</strong> administration refers to how a DEFINITY <strong>ECS</strong> (specifically, the C-LAN<br />

circuit pack) is administered in terms of dial-up PPP ports and routing in<strong>for</strong>mation. A<br />

carefully administered system has only dialup ports in service <strong>for</strong> DCS and adjunct<br />

sessions that will be established at boot time. This means that normally there will not<br />

be any ports available <strong>for</strong> a hacker to dial into. Additionally, the C-LAN circuit pack<br />

should be administered only with routes specific to the DCS and adjunct nodes. This<br />

ensures that anyone getting into a DEFINITY <strong>ECS</strong> can only get to other DCS or<br />

adjunct nodes, not anywhere else on the customer network. Careful administration<br />

will address concerns #1 and #2 above.<br />

Note that no new access to the system access terminal (SAT), such as network-based<br />

SAT, is introduced in Release 7. As in earlier releases of DEFINITY <strong>ECS</strong>, all port<br />

and route administration can be done only via the SAT, and all changes are logged.<br />

Authentication also plays a role in providing access control to dial-up PPP ports. All<br />

of these ports can be protected by Challenge Handshake Authentication Protocol<br />

(CHAP). This provides an extra level of assurance that no unauthorized user will be<br />

able to connect to a PPP port on C-LAN.<br />

404<br />

<strong>Admin</strong>istration <strong>for</strong> <strong>Network</strong> <strong>Connectivity</strong><br />

CID: 77730 555-233-504 — Issue 1 — April 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!