HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 3.42 Insecure configuration of RAS clients

T 3.42 Insecure configuration of RAS clients

The security of the RAS system depends both on the secure configuration of the RAS server and also on the RAS client. Even if the configuration of the server is under the full control of an administrator, the RAS clients will often be outside of the organisation. This means that the computer can only loosely be included in administrative processes. Especially where mobile RAS clients are used, users can also be given certain administrative rights to enable them to resolve problems with RAS access by changing the RAS configuration parameters, either by themselves or by being guided over the telephone.

The limited ability of the system administrators to exercise control over RAS clients may result in these being insecurely configured. Examples are:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home