HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.61 Use of security mechanisms offered by ISDN components

S 4.61 Use of security mechanisms offered by ISDN components

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

If ISDN cards with security functions such as those listed below have been procured for the IT system or router in accordance with S 2.106 Purchase of suitable ISDN cards, they should be used in an appropriate manner as described in S 5.46 Authentication via CLIP/COLP, S 5.47 Callback based on CLIP/COLP, S 5.48 Authentication via PAP/CHAP and S 4.34 Use of encryption, checksums and digital signatures:

A prerequisite here is that all communications partners should be in possession of ISDN cards equipped with security functions which are identical to the greatest possible extent.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home