19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.28 Inadequate configuration of active network<br />

components<br />

Throughan inadequate configuration of the network components, the<br />

availability of the entire network or segments of it, or the confidentiality of<br />

information and the integrity of data can be impaired. <strong>The</strong> following types of<br />

incorrect configuration need to be distinguished in particular:<br />

- Active network components used for building VLANs (virtual LANs)<br />

implement a logical segmentation of the network. An incorrect<br />

configuration could lead to the breakdown of communications within a<br />

VLAN, between individual VLANs or even between all of them.<br />

Depending on the VLAN strategy employed by the manufacturer in<br />

question, this influences the allocation of mutually communicating systems<br />

to identical VLANs, and also VLAN routing, if this is supported by the<br />

active network components.<br />

Example: In case of VLANs which can only communicate with each other<br />

via routers, the central infrastructure servers which provide file and<br />

printing services, for example, are not allocated also to the VLANs of the<br />

workstation systems. In addition to this no routers are connected. In this<br />

situation some of the workstation systems can no longer use the services of<br />

the central infrastructure servers, as these servers are located within an<br />

inaccessible subnetwork.<br />

- A network can be divided into subnetworks through the use of routers.<br />

<strong>The</strong>se routers must be configured appropriately to allow communications<br />

between the subnetworks, i.e. the routers have to keep routes between<br />

individual subnetworks in routing tables. Routing tables can be managed<br />

statically or dynamically. In both cases, any communication between<br />

individual subnetworks will not be possible, if the routing tables do not<br />

specify a route between these subnetworks. A misconfiguration can be<br />

caused by an incorrect definition of static routing tables or by an incorrect<br />

configuration of the routing protocols (for example RIP or OSPF) used for<br />

an automatic update of dynamic routing tables.<br />

Example: A router-to-router connection is configured by static entries of<br />

the IP addresses in the corresponding routing tables. This communication<br />

line will become no longer available, if there is a change in the IP address<br />

of one of these routers, or an additional router is inserted.<br />

- Active network components capable of filtering protocols and network<br />

addresses can prevent communications based on certain protocols or<br />

communications between systems having certain network addresses with<br />

this technique. Incorrect configuration of the respective filters in use can<br />

result in an undesired communications breakdown, depending on the type<br />

of incorrectly configured filters and the type of incorrect configuration.<br />

Filters configured incorrectly can also result in an establishment of<br />

connections allowing the infiltration of <strong>IT</strong> systems within the protected<br />

network. Depending on the nature of the infiltration, this might impair the<br />

availability of individual network components or even the entire network.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!