HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.82 Secure configuration of active network components

S 4.82 Secure configuration of active network components

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

In addition to the security of server systems and terminal devices, that of the actual network infrastructure together with its active network components is often neglected. Particularly central, active network components need to be configured in a careful fashion. Whereas a faulty configuration of a server system only affects persons making use of the services offered by this system, a faulty configuration of a router can lead to a failure of large subnetworks, if not the entire network, and cause data to be corrupted unnoticed.

A secure configuration of active network components must also be defined as part of the network concept (refer to S 2.141 Development of a network concept). Particular attention must be paid to the following items here:

For active network components with a routing functionality, appropriate protection of the routing updates is also necessary. These are required for updating the routing tables in order to allow dynamic adaptation to the current status of the local network. A distinction can be made here between two security mechanisms:

A suitable routing protocol must be selected to achieve a sufficient degree of protection for routing updates. RIP-2 (Routing Information Protocol Version 2, RFC 1723) and OSPF (Open Shortest Path First, RFC 1583) support passwords in their basic specification, and can also be extended to make use of cryptographic checksums in accordance with the MD5 (Message Digest 5) algorithm.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home