Changes

Jump to: navigation, search

IT Infrastructure Security

1,800 bytes added, 18:49, 22 February 2008
Routers
== Routers ==
 
Routers are devices used to connect different network segments and operate at the OSI Network layer. Routers operate by examining each received packet and using algorithms together with routing tables to determine the optimal path for the data to reach its ultimate destination. Routers essentially form the backbone of the internet. Routing tables are either updated manually by an administrator, for configured automatically using a variety of different protocols including ''Routing Information Protocol'' (RIP), ''Interior Gateway Routing Protocol'' (IGRP), ''Enhanced Interor Gateway Routing Protocol'' (EIGRP) and Open Shortest Path First (OSPF).
 
Routers also include some security in the form of Access Control Lists (ACLs) which drop packets based on pre-defined rules, stateful-inspection and packet filtering.
 
Perhaps the biggest potential security risk for routers involves remote access to internal functions and configuration options. Due to their distributed nature all routers provide remote administration features. It is essential, therefore, that strict password conventions are used and that encrypted communications are used when logging into a remote router.
 
== Switches ==
 
Most switches operate at the Data Link layer (layer 2) of the OSI model (although newer models are now moving up to the Network Layer) and are the basis of most Ethernet based local networks. Each port on a switch is a separate collision domain making switches much more efficient than Hubs (where all ports are on the same collision domain). Routing is based on the MAC addresses of devices connect to the switch.
 
As with routers, administrative access to switch devices must be carefully controlled using strict passwords and secure communications protocols during remote access.
 
== Wireless ==

Navigation menu