19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

- Automatic call-back<br />

<strong>The</strong> call-back option of the modem should be used (c.f. S 5.30 Activating<br />

an existing call-back option). If a PC gateway is used, the call-back should<br />

be started from there.<br />

- Limitation of the rights of the remote port (optional)<br />

In the event that the PBX system is to manage the rights for various ports,<br />

this can be used to prevent security-critical actions via remote access and<br />

only to allow this on-site. Many PBX systems do not have this option,<br />

however. In such cases, additional products, e.g. port controllers, can limit<br />

the transactions executed by a particular port.<br />

In order to ensure that only authorised persons within the internal network<br />

can gain access to remote accesses, the following steps must be taken:<br />

- Identification and authentication,<br />

- Challenge response procedures for authentication (optional).<br />

Securing an internal remote access via ISDN networks<br />

For practical reasons, it is recommended to equip the PC's used for network<br />

management tasks with ISDN cards. In this instance, a closed user group<br />

should be created. Here, the number of the calling party can be used (Calling<br />

Line Identification and Presentation CLIP). This could be implemented by the<br />

terminal itself using the number of the calling terminal (CLIP) provided by the<br />

network.<br />

Securing Direct Inward System Access (DISA)<br />

If possible, direct system accesses should be blocked. If this is not possible,<br />

the authorisation should be set in such a way that the direct system access can<br />

only take place via a dedicated port. In this way it is possible to run the DISA<br />

access via a gateway. An example of this is shown in the following<br />

illustration:<br />

Menu diagram: Securing a direct system access<br />

Establishment and accommodation of a network management centre<br />

<strong>The</strong> advantage of a central network management is, that besides being a<br />

convenient method of system administration, physical access to the PBX is no<br />

longer needed for everyday administration work.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!