19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

does not support broadcasts or MAC addresses, which is a prerequisite for the<br />

use of most protocol stacks such as TCP/IP and SPX/IPX. Three different<br />

solutions to this problem are available:<br />

- Classical IP-over-ATM (CIP)<br />

RFC 1577 (Classical IP-over-ATM) was developed for the use of IP over<br />

ATM; this standard allows stations with a TCP/IP protocol stack to use<br />

ATM as a transfer medium.<br />

- LAN Emulation (LANE)<br />

This standard emulates all relevant LAN technologies for clients on layer 2<br />

of the OSI model. In this case, ATM is then represented as, for example, an<br />

Ethernet or Token-Ring network to the clients. This allows<br />

communications between conventional LANs and ATM.<br />

- Multiprotocol-over-ATM (MPOA)<br />

MPOA is basically an advancement of the classical ATM and LANE. In<br />

contrast to LANE, MPOA operates on layer 3 of the OSI model and uses<br />

LANE for transmission on layer 2. Consequently, MPOA implements<br />

bridging (layer 2) as well as routing (layer 3), and can thus configure a<br />

fully routed ATM network. At the same time, it offers all the advantages of<br />

ATM technology, such as guaranteed bandwidths for individual<br />

applications.<br />

Furthermore, it must be noted that no compatibility or interoperability is<br />

presently guaranteed between ATM components from different manufacturers.<br />

A corresponding check is therefore required in each case.<br />

As mentioned at the start, a general recommendation concerning the selection<br />

of a suitable backbone technology cannot be made. In addition to security<br />

requirements, influential factors here include criteria concerning future<br />

orientation, economy, scalability and the integration of existing components.<br />

Depending on the selected protocol, only certain types of cable can be used<br />

(e.g. optical fibre cables for FDDI); each cable type is restricted in length (also<br />

refer to S 5.2 Selection of an appropriate network topography).<br />

Additional controls:<br />

- Have requirements concerning the availability, bandwidth and performance<br />

of the backbone of the local network been formulated and documented?<br />

- Have all the relevant backbone technologies been considered?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!