22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

124 Lotus Security Handbook<br />

alarming, but should never be relied on as a primary and dependable means of<br />

providing security to a business.<br />

Routers<br />

A simple description of what a router does is forward data packets from one<br />

network to another. This description conjures up images such as a ferry for<br />

passengers between two land masses. However, routers today have become<br />

extremely diverse in their range of functions and capabilities. So now the image<br />

is more sophisticated, like perhaps that of a major airline’s hub airport for<br />

passengers and cargo, with transfers to trains, buses, trucks, cars, and so forth.<br />

Routers are always the first line of defense for network traffic coming to your<br />

organization from the Internet. They are also the last point of control for traffic<br />

from your organization bound for the Internet. The router under your control that<br />

immediately connects to your Internet service provider (ISP) is often called your<br />

border router. In the times before ISPs, the telephony world called this the<br />

demarcation point. It is where the service provider’s control (and responsibility)<br />

ends and your organization’s responsibility and control begins. Note that many<br />

large organizations have more than one Internet connection and potentially more<br />

than one border router.<br />

As we discuss later, a router is typically performing at least basic packet filtering<br />

as a form of access control. Think of this access control as a traffic cop, deciding<br />

who can turn down different roads and who can’t. In this case we will identify the<br />

router as a type of firewall. Note that not all network routers can, nor should,<br />

perform filtering; just keep in mind that they can. Again, we are saying when we<br />

employ any filters on a router, it becomes a very basic type of firewall.<br />

Switches and hubs<br />

Switches and hubs provide a virtual ethernet bus, and for the most part have<br />

completely replaced ethernet using a coaxial cable physical bus architecture.<br />

The days of having to drill taps into “thick ethernet” coax are (thankfully) behind<br />

us. As previously mentioned, a security benefit of switch technology is the fact<br />

that all packets on the segment are not transmitted to all devices connected to<br />

the switch. This greatly reduces the packets that can be “seen” by a sniffer<br />

connected to one port on the switch. The exception to this is broadcast packets<br />

that some protocols use where the packets get transmitted out all the switch<br />

ports.<br />

NAT<br />

Originally, Network Address Translation (NAT) was proposed in IETF RFC-1918<br />

as a short-term solution to the problem of IP address depletion. In order to be<br />

assured of any-to-any communication on the Internet, all IP addresses have to<br />

be officially assigned by the Internet Assigned Numbers Authority (IANA). This is

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!