19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

In terms of their function, switches for ATM and Token-Ring are very similar<br />

to Ethernet switches, i.e. a switch for these protocols also allows two network<br />

subscribers or segments to communicate with each other, independently of the<br />

remaining subscribers / segments. In fact, the underlying design of an ATM<br />

network makes the use of switches mandatory in such a network.<br />

During the selection of switches intended to realise a collapsed backbone, the<br />

available port density must be taken into account. A collapsed backbone<br />

should not involve the use of several switches, if these switches do not have a<br />

common (high-speed) backplane (refer to S 5.2 Selection of an appropriate<br />

network topography).<br />

Routers<br />

Routers separate or link networks on layer 3 of the OSI model. Routers thus<br />

do not operate independent from network protocols (like repeaters and bridges<br />

do, for example), but need to process the protocols in use on the network layer<br />

too. As a result, routers significantly retard the flow of data between two<br />

connected subnetworks, as they need to evaluate every packet on layer 3.<br />

Due to their ability to process protocols, routers are used mainly for LAN-<br />

LAN and LAN-WAN coupling. For example, a router can link two LANs via<br />

an ISDN line. In this case, the LAN protocol is encapsulated in its original<br />

form in the WAN protocol and then transferred. Another protocol which can<br />

be used here is the X.25 protocol. In large networks consisting of many<br />

subnetworks which are linked together via routers, one important task<br />

performed by these routers is routing between the subnetworks, i.e.<br />

forwarding of data packets between these subnetworks. A fundamental<br />

distinction can be made between two techniques here:<br />

- Static routing, which involves manual specification of routes.<br />

- Dynamic routing, which involves automatic discovery and regular updating<br />

of routes by the router. For this purpose, several algorithms and protocols<br />

are available which also ensure synchronisation between the individual<br />

routers. <strong>The</strong> most familiar protocols are RIP (Routing <strong>Information</strong><br />

Protocol), OSPF (Open Shortest Path First) and IGRP (Interior Gateway<br />

Routing Protocol). For the selection of a suitable routing protocol, also<br />

refer to S 4.82 Secure configuration of active network components.<br />

Filters can also be used to ensure access control, i.e. to specify which systems<br />

are allowed to communicate with each other via the router in which directions<br />

using which protocols.<br />

Concentrators and hubs<br />

A Hub is an element which incorporates one or more active network coupling<br />

components and allows these components to communicate with each other via<br />

an internal backplane (also refer to S 5.2 Selection of an appropriate network<br />

topography). Hubs which can incorporate several network coupling<br />

components, if required, are termed modular hubs. Accordingly, hubs which<br />

can only incorporate one coupling component are termed non-modular hubs.<br />

If it is possible to connect the backplanes of several hubs together, these hubs<br />

are termed stackable hubs. <strong>The</strong> use of a hub or concentrator results - at least to<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!