19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems<br />

_________________________________________________________________________________________<br />

6.7 Heterogeneous Networks<br />

Description<br />

A local network is composed of wiring (i.e. cables and<br />

connecting elements, which are passive network components)<br />

as well as active network coupling components. Generally,<br />

various types of cable and active network components can be<br />

integrated into a LAN. Active network components require a<br />

separate power supply. Such components include repeaters,<br />

bridges, switches, routers, gateways etc. Passive network<br />

components do not require a separate power supply. Such components include cables, distributor<br />

cabinets, patch fields and plug connectors.<br />

Cabling is discussed in detail in Chapter 4.2, while Chapters 5 and 6 deal with application-related<br />

periphery. Consequently, this module focuses on the active network components, the topology<br />

underlying them, their configuration, criteria for choosing suitable components, the selection of<br />

communication protocols and the related network management.<br />

Only LAN technologies, e.g. Ethernet, Token Ring and FDDI network protocols and the related<br />

network components such as bridges, switches and routers are considered here. <strong>The</strong>se technologies<br />

can also be used in MANs. However, integration into WANs is not discussed here; this information is<br />

provided in Chapter 7.3 "Firewalls".<br />

If a LAN is to be protected adequately from the perspective of <strong>IT</strong> baseline protection, a reference to<br />

this chapter alone is not sufficient. In addition to the active network components and network<br />

management software, a treatment of the physical wiring and of the server systems present in the<br />

network is also required. For this reason, it is absolutely necessary to refer to the above-mentioned<br />

chapters as well.<br />

This chapter provides guidelines on how to analyse a heterogeneous network and use this analysis as a<br />

basis for realising and operating such a network from the perspective of <strong>IT</strong> security. Consequently,<br />

this chapter is intended for organisational departments responsible for operating networks and in<br />

possession of the corresponding technical know-how.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed as regards <strong>IT</strong> baseline protection of a heterogeneous<br />

network:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!